Physical Security Risks, Failures, and Security Measures Report

Verified

Added on  2022/08/17

|4
|832
|27
Report
AI Summary
This report examines physical security, focusing on real-world examples of breaches and failures. It discusses the importance of security risk assessment and the implementation of various security measures such as CCTV, facial recognition, and encryption. The report highlights incidents such as the potential Chinese access to the US grid system and the AHMC Healthcare data breach, emphasizing the consequences of inadequate physical security. It concludes with recommendations for improving security, including routine checks, monitoring systems, and the adoption of security management systems. The report emphasizes the significance of protecting both physical devices and data from potential threats.
Document Page
3/4/2020
Running Head: PHYSICAL SECURITY 0
Physical Security
Report
Student name
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
PHYSICAL SECURITY 1
Physical security has required to secure assets of an organization. According to Ralph
(2016), a physical security breach is a huge issue in front of an organization, which makes a
huge impact on the process of managing all the things. The article has discussed about the
seven different examples, which are based on physical security failures. In addition, the PJM
gives Chinese spy access to the US grid system. Information should be secured using
monitoring and controlling all the processes. In addition, security risk assessment is necessary
to avoid such types of security failures (Fences, 2019).
In addition, there are many different reasons for the failure of physical security. Based
on the information of the CIA’s director, James Woolsey that a person had a few questions
about the grid system of the USA, which was from China. The gentleman has access to all of
the information, which has related to the grid system. There was a plan behind that man to
share the grid system information. There is various command decurted in the network of the
grid system after that incident. That person has accessed the information from different
sources and Woolsey said that ‘we do not know; we will never know’. It is a good example
of a physical security breach in which a person has been accessed the grid information of the
US and no one identifies that person as well (Harpham, 2016).
In conclusion, it is necessary to monitor all the employees using different monitoring
systems including CCTV and facial recognition systems. It will secure the system from such
type of incidents in the future as well. In addition, routine checking is necessary to avoid such
types of incidents in the future as well (Mehl, 2018).
According to Ouellette (2014), AHMC Healthcare Inc.’s data has breached from the
two laptops of administrative offices on 12 October 2013. In that breach, 729000 patient’s
data have been stolen in that data breach. Moreover, the organization has compromised with
the six-hospital data. It is the best example of security risk assessment ignorance. However,
the encryption policy can secure all the processes (Ouellette, 2014).
In addition, laptops are under surveillance of CCTV, but the thieves broke into the
office and stole laptops. In that breach, more than 10% of patients had their SSN numbers.
Moreover, there is much information on those laptops, which has included name, diagnosis,
payment, insurance, and many more (Rouse, 2018). Thus, it is a huge risk for all the patients
as well from financial and health point of view. In addition, the security management system
(SMS) should be adopted by the firms for their data and other things. It is necessary to
improve the security of the whole system (Ralph, 2016).
Document Page
PHYSICAL SECURITY 2
In conclusion, security risk assessment is necessary to secure the data and information
of customers. It can be possible to use encryption technologies. Moreover, physical security
is needed for physical devices. It will secure the data and hardware. Moreover, laptops,
servers, and data centers. Moreover, there are many changes in the security system for better
outcomes. There are many benefits of encryption techniques, which are necessary for
managing all the things. Firewalls and IDS systems can be used for securing data as well.
Moreover, physical security is needed for servers and other hardware devices.
Document Page
PHYSICAL SECURITY 3
References
Fences, M. (2019, April 4). 5 TYPES OF PHYSICAL SECURITY BARRIERS. Retrieved from
https://www.vulcanmetalworks.ca: https://www.vulcanmetalworks.ca/fence-gate-
news/5-types-physical-security-barriers/
Harpham, B. (2016, February 23). Physical security has many holes to be plugged. Retrieved
from https://www.csoonline.com:
https://www.csoonline.com/article/3033956/physical-security-has-many-holes-to-be-
plugged.html
Mehl, B. (2018, June 19). Types of Physical Security Threats You Should Know. Retrieved
from https://www.getkisi.com: https://www.getkisi.com/blog/types-of-physical-
security-threats
Ouellette, P. (2014, March 13). AHMC Healthcare reports 729,000-patient data breach.
Retrieved from https://healthitsecurity.com: https://healthitsecurity.com/news/ahmc-
healthcare-reports-729000-patient-data-breach
Ralph. (2016, April 4). 7 Biggest Security Fails Of All Time. Retrieved from
https://unitedlocksmith.net: https://unitedlocksmith.net/blog/7-biggest-security-fails-
of-all-time
Rouse, M. (2018, July 12). physical security. Retrieved from
https://searchsecurity.techtarget.com:
https://searchsecurity.techtarget.com/definition/physical-security
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]