Physical Security Measures: A Case Study of Extreme Corporation

Verified

Added on  2023/06/12

|12
|1005
|438
AI Summary
This presentation explores the physical security measures taken by Extreme Corporation, a world leader in advanced tactical drones. It discusses the physical security risks faced by the corporation, including theft and terrorism, as well as insider threats by system engineers and data warehouse admins. The presentation also outlines the physical security measures used by the corporation, including access control, security patrols, and encryption. It concludes with recommendations for improving security and preventing natural disasters.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
PHYSICAL SECURITY MEASURES: A CASE STUDY OF EXTREME CORPORATION

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
INTRODUCTION
Physical security designed to deny unauthorized access to the
facilities, equipments in addition to resources from damage
and harm.
Based on physical security measures for Extreme Corporation,
which is world leader into advanced tactical drones.
As the corporation is produced of state-of-the-art military
equipments, then its new complex consists of security
measures.
Document Page
PHYSICAL SECURITY RISKS IN EXTREME CORPORATION (EC)
The physical security is important for the
corporation as it demands of hardware assets as
well as infrastructure as its operation demands that
the infrastructure they run should be kept away
from anything which would hinder its functions.
It includes of tampering by the unauthorized
personnel.
Document Page
PHYSICAL SECURITY RISKS
Theft of military equipments: EC may be at greater risk of the
physical security attacks as compared to hackers, as data value
and value of the physical equipments provide criminals as dual
motivation (Wang, Hao, & Hanzo, 2016).
Terrorism: It is use of violence to create terror among the
masses of people into and outside of the building.
Unauthorized access: The employees of corporation gains of
unauthorized access to the data backup facilities (Xie et al.,
2016).

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
INSIDER THREATS BY SYSTEM ENGINEERS AND DATA
WAREHOUSE ADMINS
The insider threat is related to data breach and violation of data
storage policies.
The incidents of data breaches involve with insider profile which
is results of taking of information outside from the office.
The insider losses of the media storage devices and the data
breaches cause damage throughout corporate espionage.
Document Page
PHYSICAL SECURITY MEASURES
Access control: This control prevents the physical attacks which prevents
from unauthorized access to the physical data to secure areas as well as
prevent from the physical theft.
Security lightning: It is one of the effective physical security measures
where the intruders are less entered well into the lightning area for being fear
to be seen.
Security patrols: As the company is produced of military equipments,
therefore there should be strict security patrols management software which
offer them possibility to send of immediate alerts in case there is danger
(Win, Tianfield, & Mair, 2014).
Document Page
PHYSICAL SECURITY MEASURES
(CONTD.)
Encryption: It is a process to encode the message as well as information in a
way where only the authorized person can access to the data and information
which are sensitive in addition to confidential (Puthal et al., 2015).
Alarm system: This security measures help to design deny unauthorized
access to the facilities, equipments as well as resources for protecting the
personnel as well as property from being damage and harm.
Building access control barriers: It consists of electronic management to
enter the building throughout the door and gates (Sahai & Waters, 2014).

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
PERCENTAGE SECURITY MEASURES USED BY
EXTREME CORPORATION
Controlled access to the buildings
Security lightning
Security patrols
Encryption
Alarm system
Building access control barriers
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
90%
50%
30%
89%
78%
70%
Percentage of security measures used by Extreme Corporation
Document Page
RECOMMENDATIONS
There should be security measures to assist into detecting,
tracking as well as monitoring of the intruders.
The organization should implement of physical security
policies that the building site should safeguard in such a way
that it minimizes risks of resources theft as well as destruction.
The natural disaster should be prevented, controlled as well as
minimized for extending feasible by use of detection of
equipments such as sensors.
Document Page
CONCLUSION
There is controlled access to the building for everyone.
The conference and sales area requires controlled
access. There are secured area for the system
designers and area to house the data center.
It helps to provide secure transfer of backup data from
one computer to other, as well as they are secured
access to the internet for the employees.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
REFERENCES
Wang, X., Hao, P., & Hanzo, L. (2016). Physical-layer authentication for wireless
security enhancement: current challenges and future developments. IEEE
Communications Magazine, 54(6), 152-158.
Xie, Y., Xue, X., Yang, J., Lin, Y., Zou, Q., Huang, R., & Wu, J. (2016). A logic
resistive memory chip for embedded key storage with physical security. IEEE
Transactions on Circuits and Systems II: Express Briefs, 63(4), 336-340.
Win, T. Y., Tianfield, H., & Mair, Q. (2014, December). Virtualization security
combining mandatory access control and virtual machine introspection.
In Utility and Cloud Computing (UCC), 2014 IEEE/ACM 7th International
Conference on (pp. 1004-1009). IEEE.
Sahai, A., & Waters, B. (2014, May). How to use indistinguishability obfuscation:
deniable encryption, and more. In Proceedings of the forty-sixth annual ACM
symposium on Theory of computing (pp. 475-484). ACM.
Puthal, D., Sahoo, B. P. S., Mishra, S., & Swain, S. (2015, January). Cloud
computing features, issues, and challenges: a big picture. In Computational
Intelligence and Networks (CINE), 2015 International Conference on (pp. 116-
123). IEEE.
Document Page
THANK YOU…
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]