Tuesday, February 4, 2020

Physical security Term Paper Example | Topics and Well Written Essays - 2000 words

Physical security - Term Paper Example How these threats occur and what techniques an intruder may use to enter into and hack a system, has been given a consideration. Next, the approaches that can be used for the determent of physical attacks and the security measures that can be taken to secure the hardware, network and the power supply, have been discussed in detail. Suggestions have been given to improve measures to deter political security threats which are growing in today’s world of increasing violence. Proper monitoring of physical security systems is also very important and has been talked about. This report provides a good and basic understanding of the field of physical security and its importance in sustaining livelihood and success of an organization or a home-made business with a foolproof system to avoid physical access of the enemy. Physical security is generally defined as the measures taken to ensure the security of workforce, system devices and equipment, resources, documents and sensitive information stored on physical media (like hardware programs and networks) from damaging proceedings like unauthorized access, fire, espionage, burglary, theft, vandalism, accidental loss or intentional crime that could cause severe harm to an activity, organization or establishment. In addition to this, physical security also provides assistance on scheming of such structures which help in deterring hostile operations. In terms of computers and internet, physical security is defined as a blockade placed about a computing system using secured operating systems and other protective measures to prevent unauthorized access to the information stored on it. This kind of physical security can also be referred to as computer security or cyber security or logical security in which information is protected by operating systems and special softwares from unauthorized access. Moreover, the physical security of hardware has to be made

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.