Preview

Physical Security Policy Paper

Good Essays
Open Document
Open Document
717 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Physical Security Policy Paper
Associate Level Material
Appendix E

Physical Security Policy

Student Name: Vivian Hillard

University of Phoenix

IT/244 Intro to IT Security

Instructor’s Name: Bryan Berg

Date: 5/6/12

Physical Security Policy

Due in Week Five: Outline the Physical Security Policy. Merkow and Breithaupt (2006) state, “an often overlooked connection between physical systems (computer hardware) and logical systems (the software that runs on it) is that, in order to protect logical systems, the hardware running them must be physically secure” (p.165).

Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your
…show more content…
There will be further recommendations’ that will isolate the delivery and loading area and the reasoning for such recommendations. There is also a recommendation for securing other work place within the facility, such as protection of the workstation, unused ports and cabling, network and server equipment, network equipment maintenance and security portable computing equipment.

2 Security offices, rooms and facilities

We will need to secure the grounds and the building of each facility, along with other items, protections of the information system infrastructure and the data contained therein. There are three way to control the physical entry to the facility. Entries to the facilities need to be controlled at a granular level, physical access controls will help to accomplish this. Then there is the physical security of the facilities needs to be handled by a small private security force. The last way to secured the facility is keeping areas of common access or frequent unsecured access separate form secured areas is a requirement for the continued security of the
…show more content…
Maintaining and implementing of the security policies is one way that this can be accomplished, it is important the everyone knows their role in overall information security within the company.

2 Unused ports and cabling

All unused ports must be secured at all times. If the ports are for future expansion than the must be disconnected until needed. If the ports are used for transient purposes, such as a sales or executive employee visits a facility, then they need to give notice to the information security department to ensure that they will have access.

3 Network/server equipment

All servers equipment and network must be kept secure at all times, limited access room or closet to ensure the physical security of the equipment. The servers will be in a locked room with climate control. The network equipment, such as hubs and routers, will be locked in a closet to prevent tempering ad access except by authorized personal.

4 Equipment

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lock the servers into their own room with keycard or fingerprint access only. Only authorized IT staff shall have access. Management, vendors and all other authorized guest shall be escorted by an authorized IT staff member. Video surveillance should be maintained and monitored at all access…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    The following document outlines Richman Investments security measures for IT infrastructure. There are many components that make up the Richman Investments network, and so there should be a multi-layered security solution to protect it. The server room has been located in the central part of the building, and will be physically protected by electronic door locks with keypad combination access. There are a limited number of personnel who will have access to this room in order to decrease the potential for tampering. Each of these personnel will have their own access code, and a digital log will be kept of all access.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Finally, the system/application domain would require virtual testing of everything before any implementation, hardening of all servers, and keeping up with patches and updates regularly after testing has been completed. Some of the more efficient ways to implement better access controls in a company would start with the proper level of authorization policies including physical controls for facilities. The authorization policy would appropriate entry system access controls that specify what areas are to be locked at all times and what type of locking mechanism should be implemented. It would also include the implementation of secondary locks on specific equipment and storage cabinets…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    A priority to the LAN domain is proper security of physical equipment. Only authorized personnel are allowed to gain access into...…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Block all ports that are not in use by our network and monitor all inbound and outbound traffic, keeping a close eye on the inbound to detect threats before they become a threat. Place firewalls and anti-malware software at this point and route all workstation traffic through main servers to better protect the network as a whole.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the workstation domain, we need to make sure that each of the workstations, whether desktop or laptop, has to have antivirus and malware protection installed on them. Express strict access control polices and standards. And mandate annual security awareness training for all employees…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    INDP Part 3

    • 1311 Words
    • 4 Pages

    One vital venture in securing servers is to stop as well as cripple any administrations that are redundant for that specific server. Running administrations keep ports open which programmers can use to obtain entrance to the server and network. Utilizing burrowing and encryption conventions when getting to the servers remotely will likewise help keep them secure. Utilizing strategies like single sign on, constraining certain IPs and client access to the servers will likewise help secure the network and information. Firewalls come furnished with programming that is programmable to permit and piece information from entering and leaving the network. Utilizing encryption programming, for example, Secure Socket Layer can shield information being exchanged starting with one Kudler area then onto the next. SSL does not ensure data won 't be grabbed by a programmer in travel or while being entered on a site, it will however verify the information is futile to the programmer. The utilization of restricted hashing calculations can help keep information honesty by checking the information for uprightness, encoding the information, and confirmation in sending and getting to the information. Introducing antivirus programming is another approach to secure Kudler areas. It is utilized to stop assaults, for example, malware, Trojans, and worms by distinguishing and expelling them from the network or contaminated PC before they cause mischief to the network overall. The utilization of WPA2 will shield the WLAN from access from anybody outside the organization or network. It uses upgraded client confirmation alongside the Extensible Authentication convention, EAP, to lessen and recognize programmers. Utilizing a VPN association with every area over the WAN will likewise help lessen or take out undesirable access to the networks. VPNs permit correspondence between networks in a protected and solid path over the Internet. Utilizing VPN rather than rented lines will likewise permit the organization to extend effortlessly. VPN associations are secure, quick, and conceal your transmissions from any other individual on the Internet.…

    • 1311 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. By enabling password protection on all workstations and implementing a three try timeout/lockout on an un-successful entered password, you can protect your company from unauthorized users trying to gain access by password hacking.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 4 Assignment 1

    • 333 Words
    • 1 Page

    In the given network diagram, several domains need to be considered. This diagram includes the User, Workstation, LAN, and LAN-to-WAN domains. Security controls and their implementation are discussed below.…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Access Control Policy

    • 833 Words
    • 3 Pages

    Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems…

    • 833 Words
    • 3 Pages
    Powerful Essays
  • Better Essays

    This is a multi-layered security system that consists of the user’s domain. The user is the first and the weakest link in any system. The security is only as strong as the user’s ability to understand what can go wrong. We can implement a training program session for security awareness. Another security measure is to implement a policy to stop employees from bringing in CD’S, DVD’S, and USB’S or other personal devices into the work place that can connect to the network and possibly harming the system. The work station domain is where users first access the system, applications, and the data. The system should be password coded for authentication purposes. Applications and data ought to be monitored and permissions set accordingly. Downloading should also be limited to only those people with the proper permissions. The LAN domain is a collection of computers all connected to a central switch configured to run all of the company’s data. The LAN would have all the standards, procedures, and guidelines of all the users. I would insure all information closets, demark locations and server rooms are locked and secured at all times. Only those with proper ID or authorization would be allowed to access these locations. The LAN to WAN domain contains both physical and logical designs of the security appliances. For this layer you want to apply security protocols on file transfers, scans, and unknown files. The WAN connects the system to remote locations, such as other PC’s on your system i.e. the other 7 locations on our network. URL filters implemented on the system may ensure limited access to the web sites that are undesirable for business use. “The Remote Access Domain connects users to the organization’s IT infrastructure. Remote access is critical for staff members who work in the field or from home.” It is…

    • 775 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    In preparing your work area, you should make sure you have adequate space for your computer, printer, fax, and storage. For security reasons, your working area should be off limits to your family and friends.…

    • 253 Words
    • 2 Pages
    Satisfactory Essays