Explanation of the
countermeasures of Business process that is under risk, software or logical
part of the information store of organization.
Programs of physical security must be implemented and planned for both
off-working and regular working hours in an organization. All security and
safety mechanisms in-sync with surveillance and monitoring controls must be
triggered by the personnel of security during the hours of off-working. Dealing
with it will be more complex during hours of office since there is a need to
differentiate between unauthorized users and authorized ones. Monitoring and security
controls should be more restricted on the basis of access controls based on
role (Malatesti 2008).
Delaying controls: It can be said that the key objective of
delaying control is all about slowing down intruders from achieving their
malicious intents. Access of controlled elevator, control cards access, and
locks etc. are actually good examples of delaying controls. Such types of
controls are normally limited to and individual in specific and must be
tapped or swiped for authenticating into a system. A drawback is that they
can be stolen easily and utilized with knowledge of user (Malatesti
2008).
Biometrics: Physical
traits are utilized by biometrics like retina scan, face recognition etc. for
identifying a user. Because of the high cost of implementation, lack of
reliability of such devices and other concerns of employee privacy,
biometrics are classified as a measure which is yet to be accepted widely (Giannoulis and Northcutt 2007).
User Awareness: User awareness is the most significant
aspect of any program of security. Employees must be made aware and briefed
that strangers don’t have the authority of accessing workplace unless they
are escorted by a reliable worker all the time. Programs of awareness should
be directed at encouraging and training workers for approaching unidentified
individuals if they need help, if observed or found (Giannoulis and Northcutt 2007).
Laptop Locks: Physically, these cables are connected to
laptops which are attached to the user desk as well. For unlocking the cable,
a key is utilized. Implementation of this measure on mobile and removable
devices is desirable even if they can be cut as well
(Giannoulis and Northcutt 2007).
OS Hardening: DVD/CD drives and ports of USB must be
disabled on all desktops and laptops so unauthorized and illegal access to
sensitive information can be prevented. Hence, information cannot be simply
tampered or transferred by an external user (Giannoulis and Northcutt 2007).
Proper Auditing System: It is significant to maintain audit logs
which record areas with physical access restriction. Verification of a
document identification of all workers including contractors, consultants,
and vendors must be practised before access is granted. A person could be
identified uniquely from audit logs in case there is an attempt of fraud or
suspicious activities identified. In addition, these logs could be maintained
and reviewed regularly for determining the accountability for each and every
option, particularly during hours of off-work (Malatesti 2008).
Alert & Monitoring Systems: Actually, systems of monitoring will be
useful in early incident detection. Fire and smoke alarms, motion detectors,
and CCTV surveillance are some good example of this system (Malatesti
2008).
Procedures and policies: They seem to create a foundational block of
a program of physical security. Security controls are defined by them that
must be in place and thus be utilized as a reference for filling control gaps
which are identified during the assessment of risk. Procedures and policies
must be developed according to the present regulations and law of the corporate
domain. Legal aspects like employee safety and accountability issues must be
also be addressed by it (Malatesti 2008).
Separate all critical programs: Critical systems should be stationed
separately from the general systems. It involves prioritizing both software
and hardware components on the basis its part in processing important data. They
should be safeguarded and stored in secured areas (NCES, 2015).
It is critical to make routine checks for evaluating and ensuring the effectiveness
of programs of physical security and control systems. Inefficient periodic
checks would only hinder the aim of applying a physical security layer.
|