Preview

An effective security is deemed to be the one which can delay, deter, deny, detect and destroy a threat. how security in depth is achieved

Good Essays
Open Document
Open Document
372 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
An effective security is deemed to be the one which can delay, deter, deny, detect and destroy a threat. how security in depth is achieved
What is Security?
Security is the degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable asset, such as a person, dwelling, community, nation, or organization. Establishing or maintaining a sufficient degree of security is the aim of the work, structures, and processes called "security."
Also security provides "a form of protection which helps to delay, deter, deny, detect and destroy a threat."
Sensible management of security risk will involve finding the most appropriate and cost-effective way of minimising risk through a combination of procedural, personnel and physical measures. This mix establishes a series of barriers that prevent or restrict unauthorised access or harm to resources. This is known as ‘security-in-depth’. It also puts in place mechanisms to detect and respond to security breaches within an acceptable timeframe.

Although actual security can be quite complex, they generally conform to the basic principles of Physical Security:

• Deter
• Deny
• Detect
• Delay

However for the above to be achieved, Security needs to be detailed and effective.

For most organisations the recommended response will involve a sensible mix of general good housekeeping alongside appropriate investments in CCTV, intruder alarms and lighting that deter as well as detect – measures that will also protect against other criminal acts such as theft and vandalism and address general health and safety concerns.
In some locations these measures may already be in place to some degree. However, external and internal threats to organisations (and their staff) will constantly evolve and so all procedures and technology should be kept under constant review.
Furthermore it is up to security designers, architects and analysts to come up with a well-designed system, these features must complement each other. There are at least four layers of physical security:
• Environmental design
• Mechanical, electronic and procedural

You May Also Find These Documents Helpful

  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Due in Week Five: Outline the Physical Security Policy. Merkow and Breithaupt (2006) state, “an often overlooked connection between physical systems (computer hardware) and logical systems (the software that runs on it) is that, in order to protect logical systems, the hardware running them must be physically secure” (p.165).…

    • 650 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. Information security is necessary for protecting confidentiality, privacy, integrity of processing, and availability of information resources. (Correct. As Figure 8-2 shows, security is the foundation for achieving the other four components of system reliability.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Better Essays

    Qcf 643

    • 1083 Words
    • 5 Pages

    | Describe the organisational security procedures for tools, equipment and personal belongings in relation to site, workplace, company and operative.…

    • 1083 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Protect the work and its surrounding area from damage in accordance with safe working practices and organisational procedures.…

    • 552 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    We will need to secure the grounds and the building of each facility, along with other items, protections of the information system infrastructure and the data contained therein. There are three way to control the physical entry to the facility. Entries to the facilities need to be controlled at a granular level, physical access controls will help to accomplish this. Then there is the physical security of the facilities needs to be handled by a small private security force. The last way to secured the facility is keeping areas of common access or frequent unsecured access separate form secured areas is a requirement for the continued security of the…

    • 717 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    btec ict level 3

    • 870 Words
    • 4 Pages

    Security – This is when there are numbers of different ways to secure customers and websites information, this should make sure that they are able to adopt this to reassure their customers.…

    • 870 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Statistics Lab week 6

    • 3844 Words
    • 14 Pages

    Security Principles 3. Threats, Vulnerabilities, Control Measures and Information Assurance 4. Achieving Information Security: Administrative, Physical, Technical Safeguards Security is achieved by addressing its components: confidentiality, integrity, availability and accountability. 1. Confidentiality is the property that data or information is not made available or disclosed to unauthorized persons or processes.…

    • 3844 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    To understand the importance of physical security is the security of people and technology. The use of physical security consists if a series if actions that are used to protect someone against unwanted or illegal invasion. There are three levels of physical security which are the security practitioner should be concerned with. They are the outer perimeter, inner perimeter, and the interior.…

    • 707 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Miss

    • 2737 Words
    • 11 Pages

    Security and theft- You can improve the physical security of your organisation or service by installing electronic security systems such as cctv, intruder alarms and security lights. Improving perimeter security installing barriers, screens, using security personnel and contractors will also minimise risks of security breaches and theft.…

    • 2737 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Cypcore 3.7

    • 573 Words
    • 3 Pages

    Stay safe. This is promoted by safeguarding. All staff are trained to notice things that might not be quite right and then will do everything they can to make it right.…

    • 573 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It is important to have secure systems in place in respect of information handling in order to…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    There are several ways that you can contribute to a safe and secure environment being maintained.…

    • 311 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    The Meaning of Security

    • 994 Words
    • 4 Pages

    In the Article “Redefining Security”, Richard H. Ullman argues that it would be much more beneficial in the long run, if governments were to put more focus on non-military issues, rather than military issues. He states that defining national security merely (or even primarily) in military terms conveys a profoundly false image of reality (Ullman 1983, 129). Ullman states that, a significant disadvantage when a government’s main focus is on the military threats and they disregard non-military threats is that the total security of a nation gets reduced (Ullman 1983, 129). He argues in his article that non-military threats should be given greater attention. Ullman also goes on to state that when a nation only focuses on making their military strong, this act causes pervasive militarization, which eventually causes global insecurity between nations (Ullman 1983, 129).…

    • 994 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    NEURAL NETWORK

    • 2214 Words
    • 9 Pages

    Security refers to the ability of the system to withstand the impact of disturbance (contingency). The system is said to be secure if no security limit is seriously violated in the event of contingency. The process of investigating whether the system secure or insecure in a set of proposed contingencies is called Security Analysis.…

    • 2214 Words
    • 9 Pages
    Powerful Essays