Premium Essay

Physical Security Operations

In:

Submitted By DarkBrown53
Words 717
Pages 3
PHYSICAL SECRUTITY OPERTIONS RESEARCH PAPER
Faye A. Smith
Sec/320
October 29, 2012
Terence Hunt, MSS, CPP

INTRODUCTION
To understand the importance of physical security is the security of people and technology. The use of physical security consists if a series if actions that are used to protect someone against unwanted or illegal invasion. There are three levels of physical security which are the security practitioner should be concerned with. They are the outer perimeter, inner perimeter, and the interior.
OUTER PERIMETER
Your actual property line defines the outer perimeter. In controlling the outer you must control who can drive/walk onto your property. You can use barbed wire fence, a guard shack. You need to weigh the risk of an intruder entering your property and the cost of the available physical security measure.
There are two concepts involved in perimeter security, which is Natural Access Control and Territorial Reinforcement. Natural Access Control is the use of building and landscaping features to guide the people as they and enter/exit a space. You all also want to discourage intruders to close any and all potential exits. potential (1) Clearly defined entrances the first thing to the access control is the approach to your area. That is can a car drive onto your property without it being notice? If this does happen that means you need to consider of using curbs, barriers, gates to direct the traffic to a single control area. A guard shack would be a good deterrent to any intruder. Now there is the foot traffic to consider now. Can an unauthorized person walk into your building without being noticed? There should be at least one entrance to the building and the foot traffic should be direct to a receptionist or guard shack. Roof access is another problem are for the building. The only ones that should direct access to the roof is the

Similar Documents

Premium Essay

Philippe Francois

...Part 2 Student SSCP® Domain Research Paper Security Operations means the process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and other activities to: 1. Identify those actions that can be observed by adversary intelligence systems; 2. Determine indicators that hostile intelligence systems might obtain that could be interpreted or pieced together to derive critical information in time to be useful to adversaries; and 3. Select and execute measures that eliminate or reduce to an acceptable level the vulnerabilities of friendly actions to adversary exploitation. [1] The need to connect and collaborate with partners, suppliers, customers, and employees anytime and anywhere has increased the difficulty of managing network and systems security. Organizations are challenged with the difficult and overwhelming task of securing and managing network systems, and keeping their desktops and servers up to date. Organizations want easy and efficient ways to maintain network security, manage updates, and, at the same time, reduce total costs for security management. When addressing security management and operations, administrators need to consider the following: • Security: Employees not only work from corporate offices, but from branch offices, home offices, or from the road. Managing access policies and security for remote connectivity requires flexibility to apply security policies to different sets of users and groups...

Words: 528 - Pages: 3

Premium Essay

Securing Your Network

...malicious activity that could interfere with their daily business needs? There are various methods of protecting these networks which will be examined in this paper on the advantages and disadvantages of protecting your networks and enhancing operational security in today’s business world. There are various ways for a business or an organization to protect their network that would include management controls, operational controls, and technical controls that are in place to ensure any network meets certain security requirements. Various security protection methods fall into these categories which will be examined in this paper. Reviewing audit logs can be time consuming but it is an effective process that cannot be overlooked when protecting your networks. Security-relevant events, which meet audit requirements, should be collected, processed, and stored by automated means. These events should be available for analysis that can be performed by using a combination of automated and manual techniques. Network operations security staff in conjunction with system administrators should follow the below guidance in regards to auditing requirements. All audit information should be made available to Network Operations Security Staff within 24 hours. By reviewing these audit logs in an efficient manner with a sense of urgency should help mitigate any suspicious or malicious...

Words: 295 - Pages: 2

Premium Essay

Is316

...Week 3 Lab - Assessment Worksheet Design Your DMZ and LAN-to-WAN Security Solution Overview This lab will demonstrate how to properly design a LAN-to-WAN DMZ given functional and technical business requirements. Students will transform the design requirements into a block diagram design of a DMZ with LAN-to-WAN security appliances. Lab Assessment Questions & Answers 1. Describe how creating zones is helpful in the design of a DMZ and security solution for the LAN-to-WAN Domain. The purpose of a DMZ is to add an additional layer of security to an organization's local area network. an external attacker only has direct access to equipment in the DMZ, rather than any other part of the network 2. How many zones does your design incorporate? Do you think an additional zone may be needed if the e-commerce server was implemented? Explain why or why not. 2 zones, I would implement a zone due to the costly nature of the e-commerce server I would want the added sevurity. 3. While supporting IP-SEC VPNs provides a secure, remote-access solution for mobile employees, it does not scale and requires stringent security operations and management procedures. What alternatives would you recommend for a scalable remote-access VPN solution for your design? SSL because almost all web browsers support ssl it provides extra security without any additional software needed 4. As per the functional and technical requirements, where must you...

Words: 582 - Pages: 3

Premium Essay

Cool

...ACCESS CONTROL IN SUPPORT OF INFORMATION SYSTEMS SECURITY TECHNICAL IMPLEMENTATION GUIDE Version 2, Release 2 26 DECEMBER 2008 Developed by DISA for the DoD UNCLASSIFIED Access Control in Support of Information Systems STIG, V2R2 26 December 2008 DISA Field Security Operations Developed by DISA for the DoD This page is intentionally blank. ii UNCLASSIFIED Access Control in Support of Information Systems STIG, V2R2 26 December 2008 DISA Field Security Operations Developed by DISA for the DoD TABLE OF CONTENTS Page SUMMARY OF CHANGES...................................................................................................... IX 1. INTRODUCTION................................................................................................................. 1 1.1 1.2 1.3 1.4 1.5 1.6 1.7 2. Background ..................................................................................................................... 1 Authority ......................................................................................................................... 2 Scope............................................................................................................................... 3 Writing Conventions....................................................................................................... 3 Vulnerability Severity Code Definitions ........................................................................ 4 STIG Distribution .......

Words: 38488 - Pages: 154

Premium Essay

Physical Security

...Physical Security Table of Contents INTRODUCTION III ELEMENTS AND DESIGN III EXAMPLES OF PHYSICAL SECURITY III PHYSICAL SECURITY ELECTRONIC ACCESS III CASINOS AND GAMING III EDUCATION III TRANSPORTATION III Goggle Search iii Dictionary Search iii Introduction This paper examines Physical Security from the perspective of perimeter such as gates/guards, building access controls, room access controls, enforcement options, auditing approaches, risk determination for physical attack vectors, etc. Physical Security describes measures that prevent and/or deter attackers from accessing a facility, resource, or information stored on physical media. It can be as simple as a locked door or as elaborate as multiple layers of armed guardposts. In the Global world, Physical Security is the most common mechanisms for access control on doors and security containers. They are found in the vast majority of residences, commercial businesses, educational institutions, and government facilities, and often serve as the primary protection against intrusion and theft. Elements and design The field of security engineering has identified three elements to physical security: 1. obstacles, to frustrate trivial attackers and delay serious ones; 2. alarms, security lighting, security guard patrols and closed-circuit television cameras, to make it likely that attacks will be noticed; and 3. security response, to repel, catch or frustrate attackers when an attack is...

Words: 2139 - Pages: 9

Free Essay

Logical and Physical Security

...CONVERGENCE OF LOGICAL AND PHYSICAL SECURITY SYSTEMS INTRODUCTION Up to now, majority of organizations have their physical and logical access systems operating as independent structures, with each being run by a totally separate department. The information technology security system, which controls access to information technology infrastructure including mail servers, the internet, database applications and web servers was managed by the department of information technology. The physical security system, which incorporates door access into buildings, systems of life support such as CCTV and Fire, and the badging process of employees, was run by the department of facilities (Mehdizadeh, Y, 2003). Currently, security operations involve the guarding of buildings and equipment in addition to protection of networks, taking care of issues of privacy, and risk management. The interrelation between the aspects of the security initiatives necessitates consolidation of the two security systems. Such a convergence of the IT and physical security functions is important in achieving an efficient security system (Mehdizadeh, Y, 2003). However, such an operation is also lined up with disadvantages. This paper looks at the pros and cons of combining the IT and physical security functions in a medium to large-size firm with complex IT system requirements and a global footprint. It also analyzes the fundamental components of an IT security system and explains how their integration supports...

Words: 1624 - Pages: 7

Premium Essay

Sec 402 Request for Proposals (Rfp)

...Summary Details The Board of Directors request that their information security strategy be upgraded to allow greater opportunities of secure cloud collaboration. Also dress the concerns on the recent number of hack visit attacks that have caused the network to fail across the enterprise. The organization has know brand products across the world and expects top-secret methods for safeguarding proprietary information on its recipes and product lines Note to Proponents: Please be sure to review the RFP document in its entirety before submitting proposals. Submission Format 1. Letter of Introduction • Preferably a one page document introducing the proponent and proponent’s submission. • It should include a brief history of your company and how long you have been in business. 2. Proposed Approach, Project Resources, Costs • An outline of the proposed project approach, process, procedures and timelines in other to meet the objectives of the project. If you have a lengthy document please provide a summary no more than 3 pages. • Performance measures for each of the key result areas (objectives.) • One of the key roles and equipment that needs to be monitors is our servers that monitor our security software on it. This would detail a 24 hours monitoring. • To provide 24 hours support in our Data Center on the QDX servers and threads. • Identification of the project manager and key project support personnel. Include a brief resume of the persons providing the services. • Identify...

Words: 1200 - Pages: 5

Premium Essay

Maximum Security in Database Management

...Maximum Security in Database Management Maximum Security in Database Management Rackspace Introduction In the current world there people and organization experience un-eventualities and risk of their confidential information. My organization, Rackspace, is a hosting and cloud system organization. For this company it is vital that information is stored in data bases that are run by organizations, locally hosted on personal computers. Intruders can access this information if it is not properly secured. Therefore the purpose of this study is to inform about the current savvy technologies that can be applied to completely thwart intruders from accessing such delicate information within Rackspace. Part 1: Project Identification and Business Environment For this project to go on in a smooth and effective manner different individuals must carry on certain specified task. For Rackspace, this means that every person must hold on to a responsibility to properly and pursue it to the end. Some of the responsibilities are interdepended and other are depended. In case of an interdependent responsibility there will be a proper communicated channel of events that will ensure that information is traversed from one source to another to smoothen up events. Therefore, the following a list of responsible individuals who will implement the process of securing the database of an organization. Company Chief Executive Officer Responsible for overseeing the success of...

Words: 3927 - Pages: 16

Premium Essay

Physical Security Survey

...Physical Security Survey Report for: Magnolia Utility Citizens’ Cooperative Prepared for: Janet Garret, Director of Security By: Top Notch Security Specialist Jake Johnson Date of Survey: 6 January 2012 Introduction My company conducts physical security surveys and we were hired to perform an evaluation on Magnolia Utilities Citizens’ Cooperative. I was given access to many personnel throughout the organization and was able to receive tangible data to conduct a thorough survey. Mr. Gorsky was in charge of the security check point at the vehicle yard. Mr. Videtti is the warehouse supervisor. Mr. Williams is the tool and equipment distribution center supervisor. Interviewing these personnel gives me an inside look to the physical security layout. The Magnolia organization currently employees 32 personnel and business is conducted within two separate locations. Cash management area, Electric Way hours are conducted between 10AM to 12PM and 2PM to 5PM. Cash Management Area South Street functions are conducted between 8AM and 6PM. Warehouse tool and equipment distribution center is opened from 5Am to Midnight. The provided information and information gathered throughout the survey has led me to an evaluation which concentrates on areas that need improvement. After interviewing all employees it is evident that not all of them receive security training on a regular basis. In order to maintain a highly secure working environment all employees regardless of...

Words: 1217 - Pages: 5

Premium Essay

Research - Ports

...identified in 14 CFR 139. Security systems, methods, and procedures within the construction and operational process are the obligation of TSA. The Federal Security Director (FSD) is the designated TSA official that approves the required Airport Security Program (ASP) document, the document identifies how the airport will meet security requirements. The FSD and local FAA Airports Division officials should be consulted during all phases of the project. Airport operators must integrate a Safety Management System process into their overall plan in accordance with FAA rules. Airports must establish hazard reporting systems, a risk assessment process, and a risk mitigation and assurance process with the participation of airport management. The best way to implement security in a facility is through advance planning and continuous monitoring throughout the project. Selecting, constructing, or modifying a facility without considering security for the general public, the facility, passengers, and airport and air carrier personnel can result in costly modifications. All physical security upgrades should be based on applicable Federal, State, and local laws, regulations, and policies to ensure the protection of all persons and assets (including information systems and data). At a minimum,a physical security approach should include: 1. A vulnerability assessment, including a check of regulatory compliance (refer to Appendix A) to evaluate the existing security at an operational airport...

Words: 6328 - Pages: 26

Free Essay

Cjs 250 Full Course - Introduction to Security

...CJS 250 Full Course - Introduction to Security http://www.learnyourcourse.com/cjs-250/83-cjs-250-full-course.html CJS 250 Full Course - WEEK 1 CJS 250 Week 1 CheckPoint - Historical Laws and Security CJS 250 Week 1 Assignment - Allan Pinkerton CJS 250 Full Course - WEEK 2 CJS 250 Week 2 DQ: - 1 - Security gaps analysis for real-life locations CJS 250 Week 2 DQ: - 2 - Consider the definition of security given on pp. 71-72 of the text. Can any target environment ever be 100% stable or 100% predictable? Why or why not? Why does the author stress that security efforts for any target environment will be a “never-ending process” and that security objectives will change over time? How can complacency pose a problem for security professionals? CJS 250 Week 2 Appendix B - Threat and Risk Assessment CJS 250 Full Course - WEEK 3 CJS 250 Week 3 CheckPoint [Appendix C] - Risk Management CJS 250 Week 3 Assignment - Security Objective Components CJS 250 Full Course - WEEK 4 CJS 250 Week 4 DQ: - 1 - While it may be ideal for security planners to utilize or install the latest technology, it may not always be practical. How do you think a security professional can balance the limitations, such as budget or space, of a particular environment with the need for keeping abreast of the latest industry technology and trends? How much knowledge of technology do you think security professionals should have? How broad or detailed should that knowledge be? CJS 250 Week 4 DQ: -...

Words: 679 - Pages: 3

Premium Essay

Security Policy Document

...1.0 Purpose The purpose of this policy is to describe the security requirements for Global Distribution, Inc. (GDI). It is important that GDI protects the confidentiality, integrity and availability of information that is essential for day-to-day business operations. This policy will apply to all information that is electronically stored, received, typed, printed, filmed, and generated. Information technology systems are critical for Global Distribution, Inc. interrelationship between data and operations. GDI’s 3,200 employees and contractors are all responsible for protecting information from being accessed by unauthorized persons, modification, disclosure and destruction. An effective security policy sets the guidelines of an organization’s approach to security. The policy varies from a plan, in that a plan is a call to action, while a policy defines the goals of the plan. 2.0 Acceptable use Policy Global Distribution’s network administrator plans to provide a reasonable level of privacy to it users, but all users must note that all data that is created on the corporate WAN and remote facilities (warehouses) is property of GDI (SANS Institute, 2006). In order to protect the network of GDI, any information or data stored on company devices are subject to management monitoring and therefore confidentiality cannot be guaranteed. An audit of the network can be conducted at anytime to ensure that users are in compliance with policies. It is requires that all employees understand...

Words: 2146 - Pages: 9

Premium Essay

It/244 Final

...Information Security Policy Gennie Diamond Axia College of University of Phoenix IT/244 – Intro to IT Security October 10, 2010 Executive Summary The goals of this information security policy will be to state the principles and guidelines for protecting the confidentiality, integrity, and availability of sensitive information and resources for XYZ Energy. This policy will set forth requirements for securing the network’s confidential information and data communications infrastructure, in addition to defining detailed policies in the areas of physical security, access control, and network security. Assumptions of the security plan defines physical security at each site for the environment around the network including entry control at each facility, the need and responsibilities of security staff, and issues around security in common areas. Information system security defines workplace protection and guidelines for storage, protection, and maintenance of hardware and network equipment. Access control policies address user enrollment and all network access privileges, along with identification and authentication process policies. Finally, network policies are defined for granting and managing network access while still protecting sensitive company data. Project constraints can include, but are not limited to, availability of resources needed to provide appropriate security for each defined security goal; time restraints for meeting these goals;...

Words: 1790 - Pages: 8

Premium Essay

Cyber Security

...CYBER SECURITY INTRODUCTION It is also known as “Computer Security or IT security”. It is applied to the security of computer, computer network and the data stored and transmitted over them. Today the computer system are used in wide variety of “smart devices, including Smartphone’s,  televisions and tiny devices as part of the Internet of Things, and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other networks. Computer security covers all the processes and mechanisms by which digital equipment, information and services are protected from unintended or unauthorized access, change or destruction and the process of applying security measures to ensure confidentiality, integrity, and availability of data both in transit and at rest. There are the various elements of the cyber security which are as: 1. Application Security 2. Information Security 3. Network Security 4. Mobile Security 5. Internet Security 6. Cyberwarfare One of the most problematic elements of cybersecurity is the quickly and constantly evolving nature of security risks. The traditional approach has been to focus most resources on the most crucial system components and protect against the biggest known threats, which necessitated leaving some less important system components undefended and some less dangerous risks not protected. "The threat is advancing quicker than we can keep up with it. The threat changes faster than our idea of the risk. It's no longer...

Words: 3559 - Pages: 15

Premium Essay

Data Center Operation

...1. The company I work for is a federal forensics lab for a major metropolitan area. The organization deals with many different investigations dealing with all types of computer crimes. Therefore the organization must have a very robust operations security because the criminals have extensive resources and are very savvy in computer techniques that might enable them to access the evidence if not protected properly. Also, the other possibility of high level corporate embezzlement where employees may be approached by individuals who may bribe them into tampering or destroying incriminating evidence. 2. The organization is a 24 hour a day operation, so many security controls need to be put in place to protect the assets and evidence located in the facility. Operations security focuses on the processes, personnel and technology and is needed to protect assets from threats during normal use. These controls are: -Preventative controls -Detective controls -Corrective controls -Deterrent controls -Application controls -Transaction controls The three most common controls are Physical, Administrative, and Technical (Johnson, 2011). The first step when hiring employees would be a pre employment screening to eliminate anyone who could possibly be a risk. The next step in personnel would be employ principle of least privilege. If they do not have a need to access the evidence to do their job, they should not have access. Separation of duties is another personnel control...

Words: 555 - Pages: 3