Week 10 Chapter 9 - Justin Anderson Dr Barnes CSC 382...

This preview shows page 1 - 4 out of 8 pages.

Justin Anderson Dr. Barnes CSC 382 November 8, 2016 Chapter 10 1. What is physical security” What are the primary threats to physical security? How are they manifested in attacks against the organization? Physical security addresses the design, implementation, and maintenance of countermeasures that protect the physical resources of an organization. This means the physical protection of the people, hardware, and the supporting system elements and resources associated with the management of information in the state of transmission, storage, and processing. The primary threats to physical security include the following: inadvertent acts, potential acts of human error or failure, potential deviations in quality of service by service providers, power irregularities, deliberate acts of espionage or trespass, acts of information extortion, acts of sabotage or vandalism, acts of theft, software attacks, and compromises to intellectual property, acts of God, and technical errors. 2. What are the roles of IT, security, and general management with regard to physical security? All three entities can play a very important part in physical security. The security department would have the most direct responsibility for the physical security program and would establish security policies, implement physical security systems, enforce security procedures, and investigate security breaches. The IT department is primarily responsible for computer and network security. However, many of today's physical security systems (cameras, card
Image of page 1
readers,etc.) are now network based and IT plays an increased role in the deployment and maintenance of these systems. The general management of the company is ultimately responsible for the protection of the company's assets. Both the security department and IT department work to help senior management achieve this goal, but in the end, it is general management's job to assure that the company's assets are secure. 3. How does physical access control differ from logical access control, which is described in earlier chapters? The difference between a logical and a physical control is that logical controls use software and data to monitor and control access to information and computing systems such as passwords, network and horde based firewalls and network invasion recognition systems. Physical controls monitor and control the atmosphere of the work place and computing services such as doors, locks, heating and air conditioning and video cameras. Both logical and physical controls are expressions of administrative controls in information security. 4. Define a secure facility. What is the primary objective of designing such a facility? What are some secondary objectives of designing a secure facility? A secure facility is a physical location that has in place controls to minimize the risk of attacks from physical threats. Primary objective of a secure facility is its location so it can use its natural terrain, local traffic flow, and surrounding development to enhance its physical security. A secondary objective would require protection with mechanisms such as fences, gates, walls, guards, and alarms.
Image of page 2
5.
Image of page 3

Want to read all 8 pages?

Image of page 4

Want to read all 8 pages?

You've reached the end of your free preview.

Want to read all 8 pages?

{[ snackBarMessage ]}

Get FREE access by uploading your study materials

Upload your study materials now and get free access to over 25 million documents.

Upload now for FREE access Or pay now for instant access
Christopher Reinemann
"Before using Course Hero my grade was at 78%. By the end of the semester my grade was at 90%. I could not have done it without all the class material I found."
— Christopher R., University of Rhode Island '15, Course Hero Intern

Ask a question for free

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern