Physical Security

Topics: Physical security, Security engineering, Access control Pages: 3 (848 words) Published: December 2, 2010
Physical Security Policy
IT-244

James Dutcher

Axia College of University of Phoenix
2010
Terrence McRae
Physical Security Policy 10/7/2010

Security of the Building Facility
Physical entry controls

Scenario
The Bloom Design Group is a company that offers interior design services to businesses and individuals throughout the world. Bloom has a corporate office in New York and a second office in Los Angeles. The company’s Web site features a virtual decorating tool, which offers clients the chance to play with different color and design schemes. This tool allows their clients to get an idea of what a design project would look like once it is completed, before actually making color and design decisions. The Web site also gives interior designers access to their client files and company style guides, as well as the ability to electronically process orders for design materials and furniture. The designers use a secure login and a password to gain access to the Web site and its features. The company's workforce spends all its time working remotely and accessing the corporate network using a secure VPN.

Security of building Facilities
Physical entry controls
Physical entry controls are provisions implemented to prevent unauthorized access to restricted areas of organizations premises and infrastructure, or to protect against loss, damage, and interruptions of critical operations. Physical controls should reflect not only on external threats, but also on internal threats alike; inside breaches are very likely. Physical security controls should include educating personnel, locked doors, key codes, security cameras, guards, biometrics (fingerprint authentication) , and if possible motion sensors to detect any person without permission from gaining access to sensitive areas. Security also considers natural disasters, such as earthquakes, tornadoes, fire,...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Border Security Essay
  • 7 Layers of Lotu Security Essay
  • Gsm Based Portabel Vehicle Security System Essay
  • jail security automation using android mobile Essay
  • Essay on Windows Workgroup vs. Windows 2003 Security Models
  • Statement of Research Problem on Aviation Security Essay
  • Home Security Vulnerability Essay
  • Atm Security Essay

Become a StudyMode Member

Sign Up - It's Free