Physical security is a fundamental component of any secure infrastructure but it is the form of
network security that is most frequently overlooked. Why would that be the case? Are there
existing technologies that obviate the need for physical security?
Solution
Physical security is the protection of personnel, hardware, software, networks and data from
physical actions and events that could cause serious loss or damage to an enterprise, agency or
institution. This includes protection from fire, flood, natural disasters, burglary, theft, vandalism
and terrorism.
Physical security is often overlooked -- and its importance underestimated -- in favour of more
technical threats such as hacking, malware, and cyber espionage. However, breaches of physical
security can be carried out with brute force and little or no technical knowledge on the part of an
attacker.
Physical security has three important components: access control, surveillance and testing.
Obstacles should be placed in the way of potential attackers and physical sites should be
hardened against accidents, attacks or environmental disasters. Such hardening measures include
fencing, locks, access control cards, biometric access control systems and fire suppression
systems. Second, physical locations should be monitored using surveillance cameras and
notification systems, such as intrusion detection sensors, heat sensors and smoke detectors.
Third, disaster recovery policies and procedures should be tested on a regular basis to ensure
safety and to reduce the time it takes to recover from disruptive man-made or natural disasters.
The internet of things (IoT) is widening the sphere of physical security as smart devices
connected to business systems via the internet may be located outside of established secure
perimeters. Isolating these smart devices can't be achieved in the same way as those within an
organization's physical borders, so device location will play a key role in keeping equipment
safe, secure and fully functional in the outside world. Appropriate safeguards such as tamper-
resistant ID tags are often enough to deter the opportunist thief and can increase the chances of
an item being returned. Motion sensors, tracking signals and tamper-proof locks can provide
additional security for higher value or mission-critical devices.

More Related Content

PDF
The Role of Technology in Modern Security Services Trends and Innovations.pdf
PDF
Perimeter Security: Explore the Importance of Security, Future Trends and Eme...
PDF
4. Define communication security, information security, network secu.pdf
PPTX
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
PDF
Looking into the future of security
PPTX
Types of Security in Industrial Security
PPTX
Computing safety
PDF
An Empirical Study on Information Security
The Role of Technology in Modern Security Services Trends and Innovations.pdf
Perimeter Security: Explore the Importance of Security, Future Trends and Eme...
4. Define communication security, information security, network secu.pdf
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
Looking into the future of security
Types of Security in Industrial Security
Computing safety
An Empirical Study on Information Security

Similar to Physical security is a fundamental component of any secure infrastru.pdf (20)

PPTX
Access Control Segment in Madrid 2022.pptx
DOCX
Physical security.docx
PPT
MIS chap # 9.....
DOCX
11What is Security 1.1 Introduction The central role of co.docx
PPTX
Security of IOT,OT And IT.pptx
PDF
Cyber Security Intelligence
PDF
Cybersecurity Roadmap Development for Executives
PDF
Security Audits & Cyber
PDF
Security Audits & Cyber
DOCX
When a traffic camera is installed in a designated community, driv.docx
DOCX
When a traffic camera is installed in a designated community, driv.docx
PPTX
security IDS
PDF
Fundamental Areas of Cyber Security on Latest Technology
PPT
The-Role-of-Digital-Forensics-in-Unraveling-Modern-Cybercrimes-_1_.ppt
PDF
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
PDF
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
PDF
what is cybersecurity.pdf
DOC
Information security
PDF
Inria - Cybersecurity: current challenges and Inria’s research directions
PDF
Cyber Security Intelligence
Access Control Segment in Madrid 2022.pptx
Physical security.docx
MIS chap # 9.....
11What is Security 1.1 Introduction The central role of co.docx
Security of IOT,OT And IT.pptx
Cyber Security Intelligence
Cybersecurity Roadmap Development for Executives
Security Audits & Cyber
Security Audits & Cyber
When a traffic camera is installed in a designated community, driv.docx
When a traffic camera is installed in a designated community, driv.docx
security IDS
Fundamental Areas of Cyber Security on Latest Technology
The-Role-of-Digital-Forensics-in-Unraveling-Modern-Cybercrimes-_1_.ppt
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
what is cybersecurity.pdf
Information security
Inria - Cybersecurity: current challenges and Inria’s research directions
Cyber Security Intelligence
Ad

More from feelinggift (20)

PDF
A) Which of the following element is seen in all organic molecules Si.pdf
PDF
Given an ArrayList, write a Java method that returns a new ArrayList.pdf
PDF
Write an MSP430g2553 C program to drive a continually scrolling mess.pdf
PDF
Which of the following is NOT a financial measurement needed to see .pdf
PDF
Which process uses chemiosmosis A. Pyruvate oxidation B. Electron .pdf
PDF
What motives do corporate executives have that force them to embrace.pdf
PDF
when are business cases or project charters overkillSolutionP.pdf
PDF
True or False The Congressional Budget Office projects that approxi.pdf
PDF
Using the space provided compose an ESSAY concerning the following qu.pdf
PDF
We continually hear about interest groups in the news. Understanding.pdf
PDF
View transaction list Journal entry worksheet 6 9 The company receive.pdf
PDF
TrueFalse Verilog is case-insensitive TF Verilog has constructs.pdf
PDF
This is a homework assignment that I have for my Java coding class. .pdf
PDF
The Jannuschs operated Festival Foods, a busi- ness that served conc.pdf
PDF
The first thermodynamic law for a system of charged molecules in elec.pdf
PDF
show all of your work to arrive a final result Simple Interest Simpl.pdf
PDF
Terms from which students can chooseMacrophages; •Only one.pdf
PDF
Simulate the Stakeholder deliverable for the development of an onlin.pdf
PDF
I want to write this program in java.Write a simple airline ticket.pdf
PDF
Research how voting is conducted for the following event. Descri.pdf
A) Which of the following element is seen in all organic molecules Si.pdf
Given an ArrayList, write a Java method that returns a new ArrayList.pdf
Write an MSP430g2553 C program to drive a continually scrolling mess.pdf
Which of the following is NOT a financial measurement needed to see .pdf
Which process uses chemiosmosis A. Pyruvate oxidation B. Electron .pdf
What motives do corporate executives have that force them to embrace.pdf
when are business cases or project charters overkillSolutionP.pdf
True or False The Congressional Budget Office projects that approxi.pdf
Using the space provided compose an ESSAY concerning the following qu.pdf
We continually hear about interest groups in the news. Understanding.pdf
View transaction list Journal entry worksheet 6 9 The company receive.pdf
TrueFalse Verilog is case-insensitive TF Verilog has constructs.pdf
This is a homework assignment that I have for my Java coding class. .pdf
The Jannuschs operated Festival Foods, a busi- ness that served conc.pdf
The first thermodynamic law for a system of charged molecules in elec.pdf
show all of your work to arrive a final result Simple Interest Simpl.pdf
Terms from which students can chooseMacrophages; •Only one.pdf
Simulate the Stakeholder deliverable for the development of an onlin.pdf
I want to write this program in java.Write a simple airline ticket.pdf
Research how voting is conducted for the following event. Descri.pdf
Ad

Recently uploaded (20)

PPTX
Virtual and Augmented Reality in Current Scenario
PDF
Hazard Identification & Risk Assessment .pdf
PDF
Race Reva University – Shaping Future Leaders in Artificial Intelligence
PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
PPTX
Module on health assessment of CHN. pptx
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PPTX
Core Concepts of Personalized Learning and Virtual Learning Environments
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
PDF
My India Quiz Book_20210205121199924.pdf
PPTX
Education and Perspectives of Education.pptx
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
semiconductor packaging in vlsi design fab
PDF
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Virtual and Augmented Reality in Current Scenario
Hazard Identification & Risk Assessment .pdf
Race Reva University – Shaping Future Leaders in Artificial Intelligence
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
Uderstanding digital marketing and marketing stratergie for engaging the digi...
Module on health assessment of CHN. pptx
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Introduction to pro and eukaryotes and differences.pptx
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
AI-driven educational solutions for real-life interventions in the Philippine...
Core Concepts of Personalized Learning and Virtual Learning Environments
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
My India Quiz Book_20210205121199924.pdf
Education and Perspectives of Education.pptx
Cambridge-Practice-Tests-for-IELTS-12.docx
semiconductor packaging in vlsi design fab
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf

Physical security is a fundamental component of any secure infrastru.pdf

  • 1. Physical security is a fundamental component of any secure infrastructure but it is the form of network security that is most frequently overlooked. Why would that be the case? Are there existing technologies that obviate the need for physical security? Solution Physical security is the protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution. This includes protection from fire, flood, natural disasters, burglary, theft, vandalism and terrorism. Physical security is often overlooked -- and its importance underestimated -- in favour of more technical threats such as hacking, malware, and cyber espionage. However, breaches of physical security can be carried out with brute force and little or no technical knowledge on the part of an attacker. Physical security has three important components: access control, surveillance and testing. Obstacles should be placed in the way of potential attackers and physical sites should be hardened against accidents, attacks or environmental disasters. Such hardening measures include fencing, locks, access control cards, biometric access control systems and fire suppression systems. Second, physical locations should be monitored using surveillance cameras and notification systems, such as intrusion detection sensors, heat sensors and smoke detectors. Third, disaster recovery policies and procedures should be tested on a regular basis to ensure safety and to reduce the time it takes to recover from disruptive man-made or natural disasters. The internet of things (IoT) is widening the sphere of physical security as smart devices connected to business systems via the internet may be located outside of established secure perimeters. Isolating these smart devices can't be achieved in the same way as those within an organization's physical borders, so device location will play a key role in keeping equipment safe, secure and fully functional in the outside world. Appropriate safeguards such as tamper- resistant ID tags are often enough to deter the opportunist thief and can increase the chances of an item being returned. Motion sensors, tracking signals and tamper-proof locks can provide additional security for higher value or mission-critical devices.