Logical And Physical Security Essay

1645 words - 7 pages

CONVERGENCE OF LOGICAL AND PHYSICAL SECURITY SYSTEMS
INTRODUCTION
Up to now, majority of organizations have their physical and logical access systems operating as independent structures, with each being run by a totally separate department. The information technology security system, which controls access to information technology infrastructure including mail servers, the internet, database applications and web servers was managed by the department of information technology. The physical security system, which incorporates door access into buildings, systems of life support such as CCTV and Fire, and the badging process of employees, was run by the department of facilities (Mehdizadeh, Y, ...view middle of the document...

The use of one data repository enables data that enters the system once to be reproduced throughout the entire organization. This enables common administration for users, credentials and privileges across both the physical and the IT fields; hence less effort and reduced possibilities of omissions or oversights when an employee leaves, is contracted or gets some change of access permission(Eugene, E.E, 2007, p.83).
Another advantage of this convergence is the reduction of cost. A combined security system abolishes the necessity of local security guards; rather, guards can monitor the security system throughout using a central location. From the same central location, burglar alarms are monitored, thus obviating the need for outside contracts made with other third parties (Slater, D, 2009). Video recording is also done on server disks rather than on digital video recorders, which are far much more expensive. Elimination of the guards and moving the systems used to monitor security and burglary in-house saves a lot of money (Slater, D, 2009).
The system’s audit trail is yet another important benefit of the convergence. This audit trail can be greatly helpful in forensic investigations. For instance, in a security event, a detailed security log shows the computer that was used, the password and username, and the person who had access to the building. Moreover, a centralized data repository is helpful for real time systems monitoring (Mehdizadeh, Y, 2003).
Another benefit of this consolidation is the development of the corporate badge, which is a form of common identity used in corporate mergers. This badge provides “global roaming” in which one card enables access to all facilities worldwide in accordance to the granted authorization (Mehdizadeh, Y, 2003).
The convergence also gives the organization a much more versatile staff. This is because the system enables cross-training of the agents in an organization, thus making them aware of fields that were not in their job categories before. Employees who are assigned to certain projects become cross-trained while doing the job. This improves security and response time and enables the staff to cover each other, lowering staffing costs and giving the team members higher career opportunities (Slater, D, 2009).
The convergence of IT and physical security systems also comes with disadvantages. One such disadvantage is that the security system requires knowledge which is beyond the domain of security. Most of the elements necessary for integration of logical security systems have complex setup and configuration steps which have to be carried out by a knowledgeable individual. Security departments must therefore rely on IT departments for assistance with several security project aspects. However, there exists a big communication gap since the personnel of each of the departments lacks knowledge of the other department’s domain. Solving this problem is difficult due to existence of the fear of...

Other Papers Like Logical and Physical Security

Disaster Recovery Plan Essay

590 words - 3 pages . Training 6 IX. Conclusions 7 Introduction Access Control Layers The Access Control Perimeter Asset Containers Workplace Perimeter Access Control Methods and Technical Strategies Identification, Authentication, and Authorization Logical Access Controls Network Architecture Controls Remote Network Access Security Network Ports Encryption PKI Compliance Requirements Passwords, Pins, and Other Forms of Access Physical Access

Impact Of A Data Classification Standard

454 words - 2 pages network. 3. Local Area Network Domain – This is where all of Richman Investments workstations connect to each other or another communal local medium. Once data passes this domain it is no longer on an internal standard. This is because it will leave your local network and be on the wide area network. A LAN is comprised of both physical and logical elements. This includes all company data, systems, and applications (they are all on the LAN

Internal Control and Risk Evaluation

845 words - 4 pages for employees Kudler reduces the occurrence of non-compliance and disloyal employees. Computer Access Physical access versus logical access; Physical access is just simply the ability to touch, see, and modify computer installations; physical access usually does not have the tight controls. Logical access is the access to networks through intranet or Internet. Most logical access requires some type of password combination to confirm identity

Computer Science Xyz Company

1026 words - 5 pages the security of the system; they have not taken any security awareness training. They have read the rules of behavior for the system but they are not following it practically. Users who have direct access to the system have not gone for any background investigations.There are no clearly defined duties between programmers and administrators. 7. Physical Security The Physical security is being provided to the system by manpower and by using

It Audit Guide

4838 words - 20 pages Operating Procedures; • Incident Response Plan; and • General controls. Other documents that may reflect the effective control, development and operations of a system’s security are: • Statement of Applicability (Controls); • Site Security Plan; • Procedures detailing proper completion of tasks; • Logical /Infrastructure Architecture diagram/s; • List of critical configurations; • Security Calendar to

It Security

2097 words - 9 pages interruption This test is definitely necessary and should be run at the least once a year. Physical Security Policy Security of the building facilities Physical entry controls Systems put in place to physically guard-These physical controls will consist of Security Cameras, Security Guards along with magnetic locks. This is necessary as a barrier against physical attacks. Security offices, rooms and facilities These is where physical

Is3440 - Unit 1 Lab Assessment Sheet

503 words - 3 pages ? Explain. It is a text-based database of information about users who may log into the system or other operating system identities that own running processes. It contains seven fields. 8. Why create a Logical Volume Manager (LVM) partition? LVM creates a logical physical volume and then a logical volume as a group on top of the physical volume. If disk space becomes an issue, LVM can allocate more disk space to volumes from other partitions within the LVM without risking disk loss. Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual

Network Addressing

638 words - 3 pages Network Addressing In standard computer networking there are two different addresses associated with each host on the network; they are termed logical and physical addresses. The physical hardware address is a 48-bit , 12-digit number that is burned into the memory of each network interface card, and it works on the data link layer of the OSI model. An example of this “hexadecimal” number is 02-C3-7E-3D-0A-B4. This MAC address is

Risk Assesment

2541 words - 11 pages , what they CANNOT do, what they MUST do, and what their RESPONSIBILITIES are. A policy states what should be done. Procedures define how to implement the policy. There are many sub information security policies that can help in secure the organization system like data classification policy, physical security policy, audit and control policies, telephone and network administration policies, business continuity plans, disaster recover policies

Information Security

3941 words - 16 pages millions of customers globally. Canon has huge customer data which need to be secured. Risk Management Plan Information security is very important for Canon. Canon has established a good system to prevent the confidentiality, integrity and availability of its information by maintaining high standard logical security and physical security. Canon has an information security committee which manages the issues. The committee has experts in the field

Risk Managment

769 words - 4 pages , guidelines and procedures. • Analyze assets, threats and vulnerabilities, including their impacts and likelihood (See sheet # 1) • Assess physical protection applied to computing equipment and other network components. • Conduct technical and procedural review and analysis of the network architecture, protocols and components to ensure that they are implemented according to the security policies. • Review and check the configuration

Related Essays

Cyber Security: Physical And Digital Security Measures

3505 words - 15 pages Cyber Security: Physical and Digital Security Measures Abstract Due to the issues associated with cyber security and the appropriate application thereof, this paper will strive to address different cybersecurity measures that may be employed, both physically and digitally. It will identify what cyber security is, measures that may be taken, the tools needed to ensure implementation, and provide information regarding the different resources

Access Control Methods For Companies Essay

614 words - 3 pages . All employees must have security clearances, and they communicate mainly using BlackBerry devices and email. For this scenario I implemented Administrative controls to assign security clearances to the appropriate employees. Logical/technical controls as well as Software for the BlackBerry and computer use. I would also apply Physical controls to protect the servers for the company. Mandatory Access Control should be used also because it secures

Cap Study Guide Essay

5295 words - 22 pages sectors have policies, procedures, standards and guidelines that must be followed – the Payment Card Industry (PCI) Data Security Standard required by Visa and Master Card is such an example. Other examples of administrative controls include the corporate security policy, password policy, hiring policies, and disciplinary policies. Administrative controls form the basis for the selection and implementation of logical and physical controls

Memory Management Essay

641 words - 3 pages , sharing, logical and physical organization. The main memory of a multiprogramming system is commonly shared by many processes. Programmers do not typically know what other programs will be in the main memory at the time of their program initiation. Address mapping and relocation are key to boosting operation. After a program or app is created and loaded into the memory, it is ready for use. For the operating system to dispatch the app the