Preview

Physical Security

Good Essays
Open Document
Open Document
724 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Physical Security
After reviewing several articles on the Internet, I chose the topic of physical security and an article entitled “Lock IT Down: Don 't overlook physical security on your network”. This particular article peaked my interest because it addresses the various aspects of physical security that can often be overlooked in a world that is so highly focused on threats of cyberterrorism, virus attacks, hacking, application and network security. What caught my attention was the line, “If the server is sitting in the middle of your office where anyone can get to it, you might as well not have any security at all.” (Bogue, 2003) The article discusses the fact that because computers of all types are susceptible to a physical attack, there should always be some measure of security in place that physically restricts access to the computers. When there is physical access to the computer, there is no limit to the damage that can be done, either intentionally or unintentionally. Lack of physical security can allow top secret information to be downloaded, access to the computers hard drives, allows someone to set up a way for an unauthorized person to enter the system, in addition to allowing “passwords to be reset, server software-based security can be easily bypassed, and user passwords can be cracked and stolen.” (Bogue, 2003) I was amazed at all the problems that can occur when there is a lack of physical security within an organization. I was not aware that locks can play such an important role when it comes to physical security. This particular article brought to light for me the need to use a security system that can provide an audit trail that allows a recordation of all authorized persons who enter the secure area. Within my own organization, we use the secure card access system. I never realized exactly how much my card was doing until I read this article. With my secure access card, I am allowed to enter the building, the server room, and the computer


References: Bogue, R (2003,08,11). Lock it down: don 't overlook physical security on your network. TechRepubic, Retrieved 09012008, from http://articles.techrepublic.com.com/5100- 10878_11-5054057.html

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    Unauthorized access to data centers, computer rooms and wiring closets, servers must be shut down occasionally for maintenance causing network downtime, data can be easily lost or corrupt and recovering critical business functions may take too long to be useful.…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    The following document outlines Richman Investments security measures for IT infrastructure. There are many components that make up the Richman Investments network, and so there should be a multi-layered security solution to protect it. The server room has been located in the central part of the building, and will be physically protected by electronic door locks with keypad combination access. There are a limited number of personnel who will have access to this room in order to decrease the potential for tampering. Each of these personnel will have their own access code, and a digital log will be kept of all access.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Due in Week Five: Outline the Physical Security Policy. Merkow and Breithaupt (2006) state, “an often overlooked connection between physical systems (computer hardware) and logical systems (the software that runs on it) is that, in order to protect logical systems, the hardware running them must be physically secure” (p.165).…

    • 650 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Paquet, C. (2013, February 5). Security Policies > Network Security Concepts and Policies. Retrieved from http://www.ciscopress.com/articles/article.asp?p=1998559&seqNum=3…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Internet and network security are a primary concern for many businesses. In today 's world, the number of hacks and leaks of data is continuing to rise, which is what makes security the primary concern. What may or may not be apparent is that many breaches of data tend to be caused by internal users ' errors that may not even have been meant to be malicious. Liaskos and Sandy quote a study by Roman which revealed…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    Oppliger, R. (1997, May). Internet security: firewalls and beyond. Communication of the ACM Volume 40 Issue 5, pp. 92-100.…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    All servers equipment and network must be kept secure at all times, limited access room or closet to ensure the physical security of the equipment. The servers will be in a locked room with climate control. The network equipment, such as hubs and routers, will be locked in a closet to prevent tempering ad access except by authorized personal.…

    • 717 Words
    • 3 Pages
    Good Essays
  • Good Essays

    operations in organisations and business environments. Security threats on the remote machines can always be averted easily and their impacts are not as serious compared to threats on the central computer system (Kaufman et al, 2002).The central computer system is a valuable resource that must be secured to ensure continued operation in the organisation. Securing a central computer network is the key to ensuring network security in any institution (Kaeo, 1999).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Good Essays

    To understand the importance of physical security is the security of people and technology. The use of physical security consists if a series if actions that are used to protect someone against unwanted or illegal invasion. There are three levels of physical security which are the security practitioner should be concerned with. They are the outer perimeter, inner perimeter, and the interior.…

    • 707 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Physical Security

    • 272 Words
    • 2 Pages

    This paper is to outline Riordan Manufacturing’s existing Information Security Systems, determine their weaknesses, and develop solutions to those weaknesses by addressing security issues in the areas of physical, network, data, and the web.…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In this paper, I will give the Department of Defense (DoD) definition of accountability and responsibility while explaining the importance of maintaining positive physical security of a Common Access Card (CAC) which is a piece of the “intelligence puzzle” and vital to Operational Security (OPSEC). The paper will give examples of how the lack of positive security of a CAC can, not only, diminish a soldier’s ability to perform daily tasks, but also limit their access to information pertinent to the mission at hand.…

    • 743 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Digital security….the term is almost a paradox in that there is no such thing as security when it comes to secure computing. At best, threats to digital security can be lessened and sometimes prevented but there is no such thing as an impenetrable defense. Corporations are constantly plagued by computer viruses and hacker attacks are on the rise leaving corporate networks vulnerable. It is estimated that 90% of all businesses every year are affected by security breaches to the tune of some $17 billion. Beyond the enormous costs that can easily wipe out a company’s IT budget, there are far-reaching business repercussions. Day-to-day business operations can be disrupted, customers alienated and a Company’s once good reputation tarnished. With the emerging security threats from a Company’s insiders to the sophisticated cyber terrorist, security breaches are clearly on the rise.…

    • 1133 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    “Securing a computer system has traditionally been a battle of wits: the penetrator tries to find…

    • 3842 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    Why: Physical security must be maintained, because no matter what logical measures are taken, if an unauthorized person is able to gain hands-on access directly to a workstation, they can wreak havoc on the organization’s systems. Since we never know who may be around, it is equally as important to lock or logout of a workstation when leaving the desk, and never leave passwords near it. IT Staff needs to ensure all systems have the appropriate software for both day-to-day operations, as well as workstation security are installed to prevent the need to download more additional software, and prevent malware from being loaded into the system.…

    • 545 Words
    • 2 Pages
    Satisfactory Essays