Comprehensive Report: Effective Physical Security for Organizations
VerifiedAdded on 2021/04/21
|6
|802
|144
Report
AI Summary
This report focuses on effective physical security, emphasizing its importance in protecting data and assets from theft and unauthorized access. It discusses various types of physical security measures such as intrusion detectors, smart cards, and CCTV, along with the barriers that organizations face i...
Read More
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: Effective Physical Security
Effective Physical Security
Effective Physical Security
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

2
Table of Contents
Abstract................................................................................................................................3
Need For Physical Security ................................................................................................4
Types of Physical Security...............................................................................................4
Barriers of Physical security........................................................................................4
References............................................................................................................................6
Table of Contents
Abstract................................................................................................................................3
Need For Physical Security ................................................................................................4
Types of Physical Security...............................................................................................4
Barriers of Physical security........................................................................................4
References............................................................................................................................6

3
Abstract
Effective Physical Security is used for assessing the vulnerabilities and
encompasses components for prevention of crime and loss. It refers to security of the
environment by using physical device, to secure the data and the entire system from theft
attacks. Physical security is very important for small business as well as it focuses on
entrance of the organization to check that valid user enters the premises. Physical security
reduces the level of risks by eliminating the authorized users. It can be in the form
advanced doors, alarm, and CCTV or card access control which is turn keep the
important document safe from hackers. Physical security has reduced the crime and it act
is a barrier between the attack reaching to the target system. It is a most fundamental part
of protection as it uses some physical controls to protect the site or premises. Physical
measures need to be designed beforehand to accomplish strong level of protection.
Abstract
Effective Physical Security is used for assessing the vulnerabilities and
encompasses components for prevention of crime and loss. It refers to security of the
environment by using physical device, to secure the data and the entire system from theft
attacks. Physical security is very important for small business as well as it focuses on
entrance of the organization to check that valid user enters the premises. Physical security
reduces the level of risks by eliminating the authorized users. It can be in the form
advanced doors, alarm, and CCTV or card access control which is turn keep the
important document safe from hackers. Physical security has reduced the crime and it act
is a barrier between the attack reaching to the target system. It is a most fundamental part
of protection as it uses some physical controls to protect the site or premises. Physical
measures need to be designed beforehand to accomplish strong level of protection.

4
Physical Security: Why it is important
Physical security is mostly unheeded and the only focus in terms of security is on
information security or protecting the system from hackers. Physical security should not
be overlooked and implemented correctly to prevent hackers from gaining access to
devices. It is all about keeping the network, software, organization’s assets and data
confidential (Ghai, Sharma & Jain, 2015). The data in is very important and should not be
misused as it would be a great loss for the organization. For these reasons physical
security cannot be overlooked (Fennelly & Perry, 2016).
Types of Physical Security
Various security measures are used for assuring strong connectivity and reducing
chances of threats. Like intrusion detectors, smart cards, guards, suppression systems,
intrusion alarm, motion detectors, physical access, RFID tags, barbed wire and much
more (Lee, 2017). These devices provide protection to system software, hardware,
physical actions, data form and events that can cause serious damage to the institution. It
helps in ensuring that only authorized person access the functions that serve as individual
layers of protection.
Barriers of Physical security
Physical security is fundamental concern for confidence especially in small
businesses or at home as an important step in preventing data loss or service interruption.
But in case of large organizations internet of things are majorly used for security
Physical Security: Why it is important
Physical security is mostly unheeded and the only focus in terms of security is on
information security or protecting the system from hackers. Physical security should not
be overlooked and implemented correctly to prevent hackers from gaining access to
devices. It is all about keeping the network, software, organization’s assets and data
confidential (Ghai, Sharma & Jain, 2015). The data in is very important and should not be
misused as it would be a great loss for the organization. For these reasons physical
security cannot be overlooked (Fennelly & Perry, 2016).
Types of Physical Security
Various security measures are used for assuring strong connectivity and reducing
chances of threats. Like intrusion detectors, smart cards, guards, suppression systems,
intrusion alarm, motion detectors, physical access, RFID tags, barbed wire and much
more (Lee, 2017). These devices provide protection to system software, hardware,
physical actions, data form and events that can cause serious damage to the institution. It
helps in ensuring that only authorized person access the functions that serve as individual
layers of protection.
Barriers of Physical security
Physical security is fundamental concern for confidence especially in small
businesses or at home as an important step in preventing data loss or service interruption.
But in case of large organizations internet of things are majorly used for security
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

5
parameters as identification of physical security is difficult for both at time of
construction and later on changing security measures (Orojloo & Azgomi, 2017)
Steps every organization should take for Physical security
Setting up the Surveillance
Protecting the portables/devices
Use of biometrics
Installing proactive defense
Getting security certifications
Using Port/ Vulnerability scanners
Inserting Network sniffer
Measures undertaken for security
Security Measure helps in detecting or denying the attacker to penetrate in the
system for accessing the resources. Other network protection methods like intrusion
detection systems and firewalls are of no use if somebody can enter in the system and
steal the data or sensitive information (Yang & Wu, 2018). In short, physical security is a
filter that integrates people and events for the defense of assets from attacks and other
malicious accomplishments (CPNI, 2018).
parameters as identification of physical security is difficult for both at time of
construction and later on changing security measures (Orojloo & Azgomi, 2017)
Steps every organization should take for Physical security
Setting up the Surveillance
Protecting the portables/devices
Use of biometrics
Installing proactive defense
Getting security certifications
Using Port/ Vulnerability scanners
Inserting Network sniffer
Measures undertaken for security
Security Measure helps in detecting or denying the attacker to penetrate in the
system for accessing the resources. Other network protection methods like intrusion
detection systems and firewalls are of no use if somebody can enter in the system and
steal the data or sensitive information (Yang & Wu, 2018). In short, physical security is a
filter that integrates people and events for the defense of assets from attacks and other
malicious accomplishments (CPNI, 2018).

6
References
CPNI, (2018), Physical Security, Retrieved on 23 February From
<https://www.cpni.gov.uk/physical-security>.
Fennelly, L, Perry, M, (2016), Physical Security: 150 Things You Should
Know ,Butterworth-Heinemann.
Ghai, V., Sharma, S., & Jain, A. (2015). U.S. Patent No. 9,111,088. Washington, DC: U.S.
Patent and Trademark Office.
Lee, R., Marlatt, S., Adam, M., Wightman, R., Magolan, G., & Martz, A. (2017). U.S.
Patent No. 9,602,582. Washington, DC: U.S. Patent and Trademark Office.
Orojloo, H., & Azgomi, M. A. (2017). A method for evaluating the consequence
propagation of security attacks in cyber–physical systems. Future Generation
Computer Systems, 67, 57-71.
Yang, L & Wu, D, (2018), Information Security and privacy , International Journal of
Information Security and Privacy (IJISP), vol. 13, no. 4
References
CPNI, (2018), Physical Security, Retrieved on 23 February From
<https://www.cpni.gov.uk/physical-security>.
Fennelly, L, Perry, M, (2016), Physical Security: 150 Things You Should
Know ,Butterworth-Heinemann.
Ghai, V., Sharma, S., & Jain, A. (2015). U.S. Patent No. 9,111,088. Washington, DC: U.S.
Patent and Trademark Office.
Lee, R., Marlatt, S., Adam, M., Wightman, R., Magolan, G., & Martz, A. (2017). U.S.
Patent No. 9,602,582. Washington, DC: U.S. Patent and Trademark Office.
Orojloo, H., & Azgomi, M. A. (2017). A method for evaluating the consequence
propagation of security attacks in cyber–physical systems. Future Generation
Computer Systems, 67, 57-71.
Yang, L & Wu, D, (2018), Information Security and privacy , International Journal of
Information Security and Privacy (IJISP), vol. 13, no. 4
1 out of 6
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.