physical security

 


 

physical security is data that is held physically on paper or on another physical form, such as a Post-it note. There are a few ways in which physical data can be properly secured. These are as follows physical code lock. This has the advantage of being resilient to any technological failures, perhaps the disadvantage that you can only have one code, meaning that if someone left an organization or was otherwise considered to be a security risk for any reason, the code would have to be changed and reissued to everybody else. Also, if there are multiple deals with codes on them, this may take time to change, meaning the physical code locks are not suitable for large organizations in most cases electronic code for most organizations. This is the preferred solution, as it not only means that every user has a unique access token, these systems are also capable of making any attempt to access secure areas, meaning that if something were to go wrong, it would be easy to find out who is responsible and more importantly, help to prove that innocent people were not responsible for a specific event. CCTV This is something that I would highly recommend for any organization as it provides for testing for physical code locks and also acts as a backup for electronic locks. Should human nature come into play, i.e. if an employee learns their swipe card to another person, which, although often against policy in most companies, still happens on a regular basis in my experience, in most cases, one or more security methods are used in combination with each other. There are real world examples in which all three of these are used, mostly when all the secured areas have previously had a physical lock and then electronic security has been added on for the highest level of security, i.e. as would be needed at a data center run by an Internet service provider. Electronic security is usually the best solution. Finally, whichever security solution is used to protect physical data, this should be reviewed on a regular basis to ensure that it is still suitable for your organization's needs. Although in most cases, security requirements will change very often unless a new building is added or there is a company take over at some point in the future. Now that we've gone over physical security, let's move on to logical security.

Post a Comment

Previous Post Next Post