Physical Security Survey

Read Complete Research Material


Physical Security Survey

Physical Security Survey

This paper is based on a case study involving a firm that is threatened by security issues. The firm selected for this particular case study is called “Secure Bytes”, a emerging firm that provides network security services to its clients. Headquartered in Chicago, Illinois, this firm has been in operation for the last three years. Recently, the security management team of the company is finding it hard to tackle certain security issues that have hinder the performance of the firm for the last six months or so. I have been hired in the firm as a Senior Network Security Personnel to look into the matter and provide a just solution to the persisting problem.

After thorough analysis of the problem, I have come to notice that there are serious concerns that need to be addressed diligently thus maintaining the so-called integrity of network operations within the firm.

Identifying Assets and Vulnerabilities to Known Threats

Assessing an organization's (Secure-Bytes in this case) security needs also includes finding out its vulnerabilities to known threats. This assessment entails recognizing the types of assets that Secure-Bytes has, which will suggest the types of threats it needs to protect itself against. Figure 1 in Appendix A depicts a security strategy methodology entailing proactive and reactive strategies (Andress, 2007).

Identifying Likely Attack Methods, Tools, and Techniques

The first step for Secure-Bytes is to find out the attacks that can be expected and ways of defending against these attacks. It is impossible to prepare against all attacks and, therefore, prepare for the most likely attacks that the organization can expect. It is always better to prevent or minimize attacks than it is to repair the damage after an attack has already occurred (Davis, 2008).

To reduce attacks, the various threats that cause risks to systems, ...
Related Ads