Physical Security Policy Implementation

Verified

Added on  2020/05/28

|4
|753
|158
AI Summary
This assignment examines the crucial role of physical security policies in safeguarding personal assets from damage and misuse. It emphasizes the need for comprehensive security measures such as server protection, access control, alarm systems, surveillance, and employee awareness. The paper highlights key considerations for designing and implementing a robust physical security policy tailored to specific industries and organizational needs.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: PHYSICAL SECURITY POLICY
PHYSICAL SECURITY POLICY
Name of the student
Name of the university
Author note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1PHYSICAL SECURITY POLICY
Policies designed for the protection of the personal asset from physical damage
commonly known as physical security policy is the subject of discussion for the paper
(Fennelly, 2016). The hardware manufacturers are designing the devices to keep the data of
the device safe from any remote attacks (like hacking, malware and other cyber-attacks). The
former does not take much consideration of the physical damages that can hamper or potential
misuse of the data of an individual. To avoid any such instance from being originating
physical security policy should be implemented.
The firm should keep the following points in mind while designing their physical
security policy.
Server protection: Business giants who have their dedicated personal servers should
give utmost importance to their protection (Buckley et al., 2014). The servers should
be installed inside a closed and protected room, and limited persons should have the
authority to access the room.
Protection from trespassing: Trespasser can prove to be an unexpected threat to the
physical security of any firm. So, the firm should make sure to avoid any trespassing
by installing security protocols for the entry at the doors (Reiners, Van Lerberghe &
Van Gulijk, 2015). It can be achieved by installing the security doors and
implementing accessing cards or accessing codes for the entry of the employees.
Alarming system: Protection against any trespassing have been discussed in the point
above, but it is also necessary to keep in mind that the security team should arrive at
the time of any break in (Reiners, Van Lerberghe & Van Gulijk, 2015). Hence, to
pursue the same purpose alarm systems should be installed in the secure zones. It
Document Page
2PHYSICAL SECURITY POLICY
would enable the security team to arrive at the time and avoid any physical damage
from happening.
Surveillance: Surveillance helps the security team to stop any physical damage from
happening and also provides the evidence in case of any security tampering (Reiners,
Van Lerberghe & Van Gulijk, 2015). It also discourages the individuals who are
planning to tamper with the security.
Peripherals security: it is essential to have a security plan for the security of the
equipment (Paczkowski et al., 2016). The desired results can be achieved by limiting
the use of the equipment (like USB ports and CD Drive can be removed from the
system to avoid any leakage of data). The systems can be protected by equipping
security cables.
Secure storage room: A separate and secure storage room should be used to keep the
unused system (after removing them from the network).
Aware employee: The most significant asset to a firm is their employees, and in the
case of physical security they can prove to be the biggest threat. Hence the firm needs
to ensure that they know which area is accessible to them and which are not
(Paczkowski et al., 2016).
The physical security policy of any firm should be designed taking the basis of the points.
Though, there can be alterations in the points depending on the industry type and its need.
Document Page
3PHYSICAL SECURITY POLICY
References:
Buckley, O., Nurse, J. R., Legg, P. A., Goldsmith, M., & Creese, S. (2014, July). Reflecting
on the ability of enterprise security policy to address accidental insider threat.
In Socio-Technical Aspects in Security and Trust (STAST), 2014 Workshop on (pp. 8-
15). IEEE.
Fennelly, L. (2016). Effective physical security. Butterworth-Heinemann.
Paczkowski, L. W., Parsel, W. M., Persson, C. J., & Schlesener, M. C. (2016). U.S. Patent
No. 9,268,959. Washington, DC: U.S. Patent and Trademark Office.
Reniers, G., Van Lerberghe, P., & Van Gulijk, C. (2015). Security risk assessment and
protection in the chemical and process industry. Process safety progress, 34(1), 72-83.
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]