Instructions For this week, you are to complete the following components: Describe at least three threats and vulnerabilities associated with physical security. Define at least two physical security...

1 answer below »

Instructions


For this week, you are to complete the following components:



  • Describe at least three threats and vulnerabilities associated with physical security.

  • Define at least two physical security strategies for protecting each of the following categories in the company:

    • Data.

    • Human resources.

    • Hardware.



  • Describe strategies for protecting the company's network perimeter from external threats.

  • Describe strategies for protecting the company's internal and external network traffic, and identify at least two network security tools you would consider utilizing.

  • Define at least two policies or guidelines that you recommend including in the organization's physical security manual.

  • You are encouraged to provide resources and citations. Any references should be formatted according to APA style (seeEvidence and APAfor more information).


Additionally, this week's assignment must be completed using theCourse Project Template [DOCX].


Refer to the scoring guide to ensure that you meet the grading criteria for this assignment. Submit your document in the assignment area.

Answered 1 days AfterJul 25, 2021

Answer To: Instructions For this week, you are to complete the following components: Describe at least three...

Neha answered on Jul 27 2021
139 Votes
Question 1
The most common threat for the physical network is to have uncounted visitors. If the responsible person doe
s not know who was present in the workplace at any specific time, then it will be impossible to keep the high level of physical security (Weingart, S. H). The uncounted visitors can be a major risk as we will not be able to know if they were present at the time of incident. Another risk is theft of documents. Each of the organization has documents and papers which lie around at different places, from the printer stations to the desk. The sensitive documents can be easily unaccounted and fall into the wrong hands. The third rest is tailgating. In this the unauthorised person follows authorised person to enter the secure area.
Question 2
Data
We need to keep the hard copy files secure. The files may have sensitive information and it should be kept secure in locked cabinet.
The sensitive documents should always be thrown in the shredded format.
Human Resources
Keep the entry points safeguarded (Weingart, S. H). It will be responsibility of the employees to monitor and control the entry of people in workplace and they should not share access keys.
They should be...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here