User:Cyber Awareness Crew

Physical Security of Personnel, Equipment, and Information. 1.	What is Physical Security “Physical security is the most fundamental aspect of protection. It is the use of physical controls to protect the premises, site, facility, building, or other physical assets". It is the plan and execution of the plan that will keep assets whether it is equipment, personnel, or information secure.  In information technology, security is the protection of information assets through the use of technology, processes, and training. 2.	Why is it important

Physical security is needed to protect assets the organization deems important to protect. Those assets may include personnel, equipment, and information. In today’s operating environment, the potential for unauthorized access is becoming more of an issue, whether it is direct or indirect attacks. An unauthorized user has many ways to complete a direct or indirect attack to the organization. Unauthorized users can gain access through insider opportunities. Once access to a secure room is completed, attackers can utilize hand held devices to upload malicious programs, or physically steal and damage equipment.

3.	Ways to implement physical security

Obstacles

Notification

Recovery

External obstacles may include perimeter walls, security cameras, and roving guards. Internal obstacles may include access cards, sign in rosters, and significant bio-metrics such as iris scans, or fingerprint scanning. Notification protocols may include a security administrator being alerted when specific access is being granted, or specific locations are being visited. Recovery is important to the organization and may include implementing an incident response team. This team would utilization disaster recovery programs that would help understand the source and time of the attack (s) and a complete analysis of total assets damaged and or lost during the attack.

Sources

Fennelly, Lawerence J. (2012-01-01). Effective Physical Security. Butterworth-Heinemann. ISBN 9780124158924

Friedman, Seth (02/13/2013). Building the Ideal Web Hosting Facility:  A Physical security Perspective. SANS Institute.

Pike, John. “Chapter 1”. www.globalsecurity.org. Retrieved 2016-03-06

Assignment Links:

Page1-National Cyber Security Alliance:National Cyber Security Alliance

Page2-Access Control: Access control

Page3-Physical Security:User:Cyber Awareness Crew