IT Security Report: Analysis of Perimeter Security

Verified

Added on  2022/08/17

|3
|411
|19
Report
AI Summary
This report delves into the critical aspects of perimeter security, emphasizing its importance in safeguarding assets. It highlights the three main categories: physical, technological, and psychological security, and their roles in deterring unauthorized access. The report emphasizes the need for a well-defined perimeter, often marked by fencing and warnings, to protect assets effectively. Moreover, it stresses that different network assets necessitate varying levels of security protection. The report references key sources to support its analysis, providing a comprehensive overview of perimeter security strategies and their practical applications. The report emphasizes the importance of perimeter security to prevent unauthorized access to assets. The report also explains the different types of security, including physical, technological and psychological security and the importance of these types of security.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running Head: IT SECURITY
0
IT Security Priority
Perimeter Security
(Student Details: )
2/2/2020
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
IT SECURITY
1
Perimeter Security
This discussion is containing the importance of perimeter security (PS) while
covering the three categories of the PS as technological, psychological, and physical. In
general, Perimeter security is typically designed with the purpose of keeping intruders out or
captives contained inside the field the boundary surrounds (Tun et. al., 2018). In other words,
both manmade and natural barriers can easily serve as perimeter security in this era.
All of the three types of PS include physical, technological and psychological are
majorly important as they all separate the assets from the external surroundings (Baker &
Benny, 2016). In addition, the major purpose of these types of securities is to detect, deter,
deny and delay unauthorized access to the assets in the perimeter. From the writer’s
viewpoint, three of the PS are equally important because they are purposed for different
categories of assets. For example, physical security is essential for buildings whereas
technological security is highly important for computer networks (Tun et. al., 2018). On the
contrary, psychological security is for all the people living on this earth. In this way, these
three perimeter security systems typically employ diverse techniques and tools but the
purpose is the same in every case (Baker & Benny, 2016).
Thus, it has been found that network management practices should always recognize
that different network assets typically require diverse levels of security protection. In addition
to that, effective physical perimeter security always needs an apparent and well-defined
perimeter which is marked by fencing or warnings for further keeping out unless authorized.
Document Page
IT SECURITY
2
References
Baker, P. R., & Benny, D. J. (2016). -Perimeter Protection. In The Complete Guide to
Physical Security (pp. 102-119). Auerbach Publications.
Tun, H., Lupin, S., Linn, H. H., & Lin, K. N. Z. (2018). Selection the perimeter protection
equipment in security systems. In 2018 IEEE Conference of Russian Young
Researchers in Electrical and Electronic Engineering (EIConRus) (pp. 1504-1508).
IEEE.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]