Monday, May 20, 2019
Physical Security â⬠Essay Essay
In the United States everyone is concerned about safety in their platefuls and in his or her workplace. Individuals go to great lengths to get word that all their possessions that they own could non be stolen from them. According to the 1999 FBI furnish Crime Reports, nationwide 408,217 robberies were committed with the estimated amount of losses being reported at $508 million in losses. Many measures can be put in place to prevent much(prenominal) losses. This paper leave alone discuss physical security system measures and other components such as building security, grounds security, access turn back systems, perimeter security, information systems, and technology security. physiologic SecurityAccording to Search Security (2011), Physical security is Physical security is the protection of personnel, hardw ar, programs, networks, and data from physical circumstances and events that could piss serious losses or damage to an enterprise, agency, or institution. This includes p rotection from fire, natural disasters, burglary, theft, vandalism, and terrorism. Physical security can be described as measures taken to prevent and to deter intruders or attackers from take ining access to facilities, resources, or information stored on physical media. Physical security also provides guidance on ways to design structures to resist various hostile acts. As physical security can vex seemed to be this elaborate task, exactly can be a round-eyed act of locking a stead or business door and not attached an easy access to an intruder. To keep souls, families, or employees safe one has to think about the things that atomic number 18 big to them and the things one also wants to protect.Ground SecurityGround security can be looked at as ways to protect argonas around airports. Since September 11, 2001, airports have gone through many changes to ensure that their passengers are safe and all bags and equipment are safe before the leave the ground and enter the airpl ane. Before that tragic event at that place were no major security measures in place except screenings but lot could just have and go as they please. As a result of the hijackings security wasbeefed up tremendously. Passengers are screened more closely. People are not allowed to carry liquids into the airport and not like before sole(prenominal) passengers with boarding passes may enter the terminal. According to USAToday reporter Blake Morrison (2002), Flight attendants report that many ground workers such as airport mechanics, caterers and ramp workers still have access to planes without going through any checkpoints as long as the have their swipe cards. approach path Control SystemsAccess control systems are super used at most businesses to keep self-appointed people out of places they do not belong. Access control systems are thought of as electronic card readers were badges are needed to unlock a doors, lets individuals gain access to an elevator, or garage. Access contr ol systems also can be as simple as possessing a security guard to stop people from entering a certain range. thither are levels of access controls there is the basic system that allows systems to respond to a pin or a card number, there is an intelligent system that controls access to doors locks and also has the capability to store information.The most prevalent breach of this system is that people allow individuals without badges to slip in behind them. For example, nowadays many apartment building or condo complexes have main entrances were they must badge in or have a key to unlock the door. There is always roundone waiting at the door to gain entry, and most people will just open the door and let him or her in neer thinking that this person should not have access. The person who is let in could be an intruder there to do harm. For this reason many companies/residence complexes stress that authorize exploiters should not let anyone enter unless he or she have followed the appropriate procedure for visitors.Access cards have been proven to have some vulnerability. Hackers are very intelligent and have found ways to copy the cards information. Hackers have do so accomplished that they have created portable readers t hat can capture the card number. No security method can ever be listed as 100% effective. security deposit SecurityPerimeter Security can be described as a boundary that separates an area from the rest of the world. The spirit of the perimeter security is to deter,detect, delay and deny unauthorized access to a perimeter without the owners consent to avoid theft, vandalism, or other criminal acts. Many things are used to prevent individual from gaining access to his or her property. Fences or gates are right-hand(a) starting points to protect property. Gates that are high enough and locked keeps intruders out. Another line of defense is security lights. Having an area with good lighting is exact to a security system because people are less credibly to commit a criminal offence in a place if they feel they can be seen by someone. Most criminals look for an area that does not have good lighting and is away from by passers. Good lights around a internal and an area not hidden by overgrown trees and shrubs provides some protection.Lighting can protect a home or a business from intruder because it provides trickery. Many homes have installed motion sensor lights that come on when someone walks or moves in a certain perimeter around his or her home or business. If the intruder were to set off the sensor and lights come on they will most likely run away as they are not sure if someone is watching either from the home he or she is intruding or from the neighbors house. Criminals are also deterred from homes or businesses with outdoor(a) lighting because they think that if you took the time to install good lighting, this home also has the potential of having an alarm system. too if it is a business that is being intr uded good lighting also helps the use security cameras, if the lighting is good clearer images could be captured.Information Systems and Technology SecurityInformation security means protecting information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording, or destruction. Most companies and homes have intrusion detection systems on their computers. Intrusion detection systems allow companies to supervise unwanted attempts to gain access to their systems. According to Webopedia (2010) these detection devices allow managers to see all activity succeeding(prenominal) and outgoing. Intrusion detection is important to keep information systems safe from hackers, disgruntled employees, and others who may want to cause the company trouble or damage their IT systems. Safety dough uses a Reactive Intrusion undercover work system. The reason the passive system is used because it logs all activities and then sounds an alert.A reactive system not onlylogs the traffic and suspicious use then alerts administrators, but it also logs off a user after suspicious activity is detected (Net Security, 2010). Safety Net feels the passive method is just not protective enough in monitoring suspicious activity. Allowing managers to know who has conducted such activity is great but Reactive stops the activity. The detection system utilized by Safety Net is a legions Intrusion Detection System rather than the Network Intrusion Detection System.ConclusionPhysical security is the protection of personnel, hardware, programs, networks, and data from physical circumstances and events that could cause serious losses or damage to an enterprise, agency, or institution. Individuals have the responsibility to make sure that they protect themselves from harm. All measures have to be weighed and applied to ensure that security cannot be breached.ReferencesRobbery. (2011). Retrieved fromhttp//www2.fbi.gov/ucr/cius2009/offenses/violent_crime/robbe ry.html Morrison, Blake. (2002) Attendants question ground security. Retrieved on January 7,2011 from http//www.usatoday.com/news/nation/2002/04/04/ground-security.htm Intrusion Detection. (2012). Retrieved on January 7, 2011From http//www.webopedia.com/DidYouKnow/Computer_Science/2005 Net Security. (2011). Retrieved on January 7, 2011From http//netsecurity.about.com/cs/hackertools/a/aa030504_2.htm
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.