Whitman (2015) describes physical security as the protection of physical items, objects, or areas from unauthorized access. Not only is this defined but Whitman (2015) also lists seven major sources of physical loss. They are extreme temperature, for example heat or cold. Next is a gas, which may be war gases, commercial vapors, humid or dry air, and suspended particles. Then, we move on to liquids that may be water (duh), or chemicals. Living organisms could be a major source of loss, in terms of viruses, bacteria, people, animals, and insects. One that is less likely than the rest but still major is projectiles. This includes tangible objects in motion, and powered objects. Also movement such as collapse, shearing, shaking, vibration, liquefaction, flow waves, separation, and slide can cause loss. Finally, energy anomalies, for example, electrical surge or failure, magnetism, static electricity, aging circuitry, radiation from sound/light/atomic, are big factors for physical loss. Many threats listed can also be classified as threats to information security. An organizations policy should guide the planning for physical security throughout the development life cycle (Whitman, 2015 469, 499).
Key physical security systems, such as surveillance, help with monitoring security that humans or animal security may miss says Whitman (2015). Many users are...
... middle of paper ...
...ntial to a company’s physical security in a few ways. Ground and amperage ensures that the returning flow of current is properly discharged to the ground. To help ensure this is constant, computers and other electrical equipment should become a ground source. Power supply to a company’s computer system must have an uninterrupted source in order to prevent damages. Uninterruptible power supply helps organizations use the most critical computing systems by maintaining a constant flow of electrical power with no interruptions. For natural events, an environment must be able to manage the power flowing to a system. Most computer rooms and wiring closets have emergency power shutoffs that are able to do this. This ability to shut off power helps with the recovery of water damaged devices that did not have an electrical current running through them (Whitman, 2015 489-493).
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Information security (IS) in modern organizations is of vital importance. Modern era of technology brings certain threats to information security but mostly are from internal factors. Enterprises ensures the need of safeguarding information by analysing information security risk for the business. The risk is managed by defining and implementing information security policies. The paper highlights that support from the senior management is essential in almost all decisions for securing information resource.... [tags: Security, Information security, Computer security]
1368 words (3.9 pages)
- Pursuit of knowledge has always been my obsession and the propelling force behind all my achievements. I intend to pursue a Ph.D. in cybersecurity and my career aspiration is to become a professor and a researcher. My research interests include Insider threats, Malware and Botnets, Network security, security of IoT, Cyber warfare, Identity and integrity, social Engineering, physical Infrastructure security, Industrial control system security, usable security, Cybercrime and the underground economy, cybersecurity Risk Management, international corporation on cybercrime and cyber terrorism, end-user security, Economics of information security, Privacy and freedom issues, Soc... [tags: Security, Computer security, Saudi Arabia]
765 words (2.2 pages)
- Why this communication skill is the least important in the special education needs setting. Use of technical language / Practitioner to Client This communication skill may be the least important because during the lesson, the children may become confused about what the special educational needs teacher is trying to teach them. This may make the children begin to lose concentration and become bored with the task (reducing stimulation). This is because they are not paying attention and they will not be, learning what is needed in case it helps them improve (reduced occupation).... [tags: Teacher, Special education, Education]
1588 words (4.5 pages)
- In this paper I will argue that the inclusion of Human Security in the UN mandate does not necessarily make UN Missions more successful. In order to do this, I have considered two UN Missions in the Congo. I have compared the two interventions that the UN had to make in Congo, first in 1960 when the Human Security framework did not exist and later in the period after 1997-2006 when Human Security became an important consideration. I have also analyzed the role of other states that were involved in the Congo during the two interventions in the context of Realism and assessed if the generalizations contained therein were applicable in this situation.... [tags: Congo, Security]
2873 words (8.2 pages)
- I was raised by different parents than my older siblings. They weren’t different parents biologically, they were different parents economically. For years they struggled to get by with very little education. But once their children were all in school, they decided to make a change. A few years before I was born, my parents earned their college degrees. What this meant for me was a world of security, provision, and opportunity that far surpassed that of my brother and sisters. My story is very similar to that of Angela Whitiker, a former single mother who effectively pulled herself and her family out of poverty by achieving her nursing degree.... [tags: Importance of Education]
2032 words (5.8 pages)
- Policy analysis National Security Concept of Estonia The National Security Concept (NSC) sees international co-operation as the primary source of security, since “NATO serves as the cornerstone of European security and defence.” [p.4] Therefore, I will first analyse the NSC using the regional framework. In addition, I will use the sectoral approach to analyse the main areas affecting both internal and international security environment, which according to the NSC are “political, military, economic, technical, societal and environmental spheres." [p.5] International and regional security The NSC sees security as the “objective and outcome of international co-operation” [p.3].... [tags: policy analysis]
1408 words (4 pages)
- Hardware, software and the data that resides in and among computer systems must be protected against security threats that exploit vulnerabilities. Organizations must therefore impose appropriate controls to monitor for, deter and prevent security breaches. Three areas have been considered, in a typical sense, as the basic critical security requirements for data protection: confidentiality is used to assure privacy; principles of integrity assure systems are changed in accordance with authorized practices; and, availability is applied to maintain proper system functions to sustain service delivery (Dhillon, 2007, p.... [tags: Information Technology ]
1931 words (5.5 pages)
- ... It is up to the organization to determine what levels of access or levels of restriction should be in place on employees and contractors post-hire. These levels should be identified prior to the hiring process to drive how thorough the candidate screening should be. The amount of background checks and reference checks for a waiter at a restaurant may not be as thorough as those of a candidate for a network engineering role in the restaurant’s corporate headquarters IT department. Once a position’s scope of work and access has been determined, the job must be posted to receive responses from interested candidates.... [tags: organization's human resource department]
994 words (2.8 pages)
- Elements of Network Security Introduction The primary objective of a network security system is to, in a cost effective manner, balance convenient access to legitimate users and inaccessibility to attackers. In a nutshell, the goal is to prevent connectivity to anyone intending to cause harm to the network. The harm to which this paper refers can come in the following forms: 1. Application-level security threats, such as e-mail viruses and attachments. 2. Threats to network infrastructure devices.... [tags: Networks Telecommunications]
1625 words (4.6 pages)
- The importance of communication Doubtlessly, good communication is imperative to successful business, mainly in Global Business. Nowadays, the global trade is strongly increasing and sometimes the companies need to hire an interpreter not just to ensure the success of their business deal but to send a message to their future partner that they respect the language differences and deal with this issue with professionalism. “Interpreters must not only have outstanding language skills, but must also be well versed in business terminology, understand their client 's trade and have an accurate grasp of technical terms in both languages” ( Arc Communications, 2015, para 1).... [tags: Nonverbal communication, Communication]
1064 words (3 pages)