Access Control Policy

Topics: Security, Physical security, Computer security Pages: 4 (722 words) Published: May 20, 2012
Associate Level Material
Appendix E

Physical Security Policy

Student Name: Vivian Hillard

University of Phoenix

IT/244 Intro to IT Security

Instructor’s Name: Bryan Berg

Date: 5/6/12

Physical Security Policy

Due in Week Five: Outline the Physical Security Policy. Merkow and Breithaupt (2006) state, “an often overlooked connection between physical systems (computer hardware) and logical systems (the software that runs on it) is that, in order to protect logical systems, the hardware running them must be physically secure” (p.165).

Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.

These controls may include the following:

• Physical controls (such as perimeter security controls, badges, keys and combination locks, cameras, barricades, fencing, security dogs, lighting, and separating the workplace into functional areas)

• Technical controls (such as smart cards, audit trails or access logs, intrusion detection, alarm systems, and biometrics)

• Environmental or life-safety controls (such as power, fire detection and suppression, heating, ventilation, and air conditioning)

1 Security of the building facilities

1 Physical entry controls

A physical security policy will detail the physical security of the facilities by defining the physical entry controls to be used, outlining the requirements of the security force and their facilities requirements. There will be further recommendations’ that will isolate the delivery and loading area and the reasoning for such recommendations. There is also a recommendation for securing other work place within the facility, such as protection of the workstation, unused ports and cabling, network and server equipment, network equipment maintenance and security portable computing equipment.


References: Cite all your references by adding the pertinent information to this section by following this example.
American Psychological Association (2001). Publication manual of the American Psychologial Associatin (5th ed.). Washington DC: Author.
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Information Security Policy – Bloom Design Group Essay
  • it control Essay
  • Information Security Policy Essay
  • Access Control Policy Essay
  • Essay about Access Control Policy
  • It 244 Access Control Policy Appendix F Essay
  • Lab3 Enabling Windows Active Directory and User Access Controls Essay
  • Access Control FInal Project Essay

Become a StudyMode Member

Sign Up - It's Free