AllFreePapers.com - All Free Papers and Essays for All Students
Search

Outline Five Different Methods of Physical Security Including the Costs, Advantages, Disadvantages Etc.

Autor:   •  November 25, 2011  •  Essay  •  693 Words (3 Pages)  •  3,254 Views

Page 1 of 3

1. Outline five different methods of physical security including the costs, advantages, disadvantages etc.

There are numerous ways to implement physical security in any organization, but I will outline five different methods that I think that are a must have. I will start with #1) being to lock up the server room, you want to make sure that there are very good locks on the server room door so there are no issues there. A disadvantage to this method is simple not using the locks properly because you can have the best lock in the world but it does no good if it isn't used. I would set a policy that states the doors should be locked at all times when the room is unoccupied and only the required people will have a key or key code to get in.

#2) I would say know that you have your door locked and that is a good first step but what if someone manages to break in or someone who has authorized access misuses that authority, you will have a problem so I would make sure that you have a log book so that personnel can sign in and out but one disadvantage here is that the person who is doing the crime could simply just ignore it. So to remedy that you can set up an authentication system that is incorporated into the locking devices, which is great because you will need a smart card, or biometric scan to unlock the doors, the advantage here is that a record is made of the identity of each person who enters the room.

#3 A video surveillance camera is also a great option, you need to have it installed in a placed where it would be very difficult to tamper with or disable. the camera should provide a good view of people entering and leaving which will work great with your log book to help keep track of things. A big advantage here is that the cameras can monitor continuously or they can use motion technology and even be set up to notify someone by email or by phone when motion is detected when it shouldn't

...

Download as:   txt (3.7 Kb)   pdf (68.8 Kb)   docx (11.2 Kb)  
Continue for 2 more pages »