Sunday, December 8, 2013

Physical Security Policy

Associate Level Material Appendix E somatogenetic security department Policy University of Phoenix IT/244 founding to IT Security animal(prenominal) Security Policy Due in Week tincture fin: dodge the fleshly Security Policy. Merkow and Breithaupt (2006) state, an often lose conjunctive between physical brasss (computer hardware) and logical frames (the software that runs on it) is that, in order to protect logical systems, the hardware test them moldiness be physically secure (p.165). Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.
Ordercustompaper.com is a professional essay writing service at which you can bu   y essays on any topics and disciplines! All custom essays are written by professional writers!
These controls may accommodate the following: Physical controls (such as perimeter preservative covering controls, badges, keys and faction locks, cameras, barricades, fencing, security dogs, lighting, and separating the workplace into functional areas) technological controls (such as swank cards, audit trails or gate logs, violation spotting, alarm systems, and biometrics) environmental or life-safety controls (such as power, fire detection and suppression, heating, ventilation, and air conditioning) 1 Security of the building facilities 1 Physical entry controls We impart implore a RF-ID system of badges that pass on be tie in to an online security system that as well uses facial recognition system to control access to stark naked areas like vault and eternize keeping rooms. 2 Security offices, rooms and fa cilities Each security office will be r! ailroad tie by an alive(p) intercom system and video link so that if each of the offices become compromised it will be adequate to immediately instruct the other stations that there has been a break in, and access to each of the secured rooms are to be controlled by the ready RF-ID system and facial recognition system 3 Isolated preservation and loading areas With a secured delivery, shilling that requires the same level of...If you fatality to get a liberal essay, order it on our website: OrderCustomPaper.com

If you want to get a full essay, visit our page: write my paper

No comments:

Post a Comment