Physical Security Perimeter Policy

Read Complete Research Material

PHYSICAL SECURITY PERIMETER POLICY

Physical Security Perimeter Policy



Abstract

The paper describes the importance of security perimeter and its implications. As the main objectives of perimeter security systems are to detect and apprehend the offender before its interception. The paper also describes its principle and components of the security perimeter.Perimeter security is actually the programmatic security and of physical security and policies which provides the levels of protection against the remote malevolent activities. Thus, one necessary role that is highlighted in the research is to build, maintain and design the perimeter for overall security of the network at an acceptable level. This will provide an environment which supports the business operations of an organization.

Physical Security Perimeter Policy

Introduction

With the vast majority of mission-critical data now being consumed and created on mobile devices outside most corporate security perimeters, data security experts globally have realized that fixed data embattlements are necessary but insufficient component of a comprehensive enterprise data protection strategy. Thus with any institution whether it is a business or government needs a "security perimeter in order to protect against accidents or natural human attacks.

However, the platform of information systems (computers and networks) in the physical security perimeter, computerization has brought a new security perimeter, less obvious: data, operating systems and computer programs are indeed in "cyberspace" or "logical space". As the networks give it ubiquity geographical protection can no longer be provided by buildings, doors and locks (Rebecca,2011).

Discussion and Analysis

The security of the network access a protected resource is not sufficiently guaranteed by the mere identification of the authors. On a LAN of the Ethernet type where the data link layer functions it is possible broadcast to a third party to capture the data transmission. If the transmission is made through the Internet, data moves similarly to a postcard, that is to say that at least the factor and the caretaker have access.

Main Objective

The main objectives of perimeter security systems are to detect and apprehend the offender before its interception. Ideally, the security perimeter the following tasks:

To detect a possible intruder before it can enter into the protected zone;

Ensure the minimum time an alarm from the penetration of the offender;

Difficult to overcome the boundaries of the offender

Thus, perimeter security is not sensitive to the external factors - weather, electromagnetic interference, etc.

Service design and installation of perimeter security systems

In addition to the supply of security equipment, many company offers all kinds of work on maintenance and setting up security systems for any relief and perimeter: for design, installation and commissioning, maintenance and repair of security equipment, installation of metal fences and concrete barriers, upgrading of existing systems. Thus, Perimeter security is actually the programmatic security and of physical security and policies which provides the levels of protection against the remote malevolent activities (Phil, 2008). Perimeter security is thus enforced in the following areas:

Physical Access Control

The security devices and policies that are enforced for physical access control prevent the spread of viruses through portable storage devices; ...
Related Ads