Network and physical security best practices
Because all the company’s devices are connected by a network to a central server, the organization’s CSO emphasizes the need to explain the best security practices used by the company. A data network is a group of two or more computing devices connected by a type of communication technology (Terri Richard, Lecture 1, 2018). The network connection includes hardware infrastructure, like computers, printers, scanners, cables, fiber optic, wireless media, and logical / software technology used to transport the data across the physical media. In order to maintain the integrity of the hardware and data exchange over the network, physical and software security measures are in place. Based on those security measures, the access to network data will be granted only for authorized employees. The logical security access to the organization’s data is maintained thru a password and two-factor authentication process for each user account. The physical security access inside of the organization is very complex. The implementation of this system took into consideration all of the organization’s particular and critical risks. Protecting the company from equipment theft, vandalism, natural disasters, or a terrorist attack is very vital to business continuity. Every employee has a badge to get access to the company’s building associated with an individual access pin. Software controlled surveillance cameras are posted in strategic places outside and inside of the company, along with a security system connected to the local authorities. Smoke detectors and firefighting systems are in place to prevent loss in case of fire. Access control to server rooms is made thru a complex device that requires employee badge, access pin, and biometric readers, and it’s limited to few authorized employees. Physical access to printed documentation is done thru employee badge and pin access code.
Overall, the physical security of the organization follows normal practices known in today’s industries, with adjustments to business particularities taking into consideration future security threats.
Because all the company’s devices are connected by a network to a central server, the organization’s CSO emphasizes the need to explain the best security practices used by the company. A data network is a group of two or more computing devices connected by a type of communication technology (Terri Richard, Lecture 1, 2018). The network connection includes hardware infrastructure, like computers, printers, scanners, cables, fiber optic, wireless media, and logical / software technology used to transport the data across the physical media. In order to maintain the integrity of the hardware and data exchange over the network, physical and software security measures are in place. Based on those security measures, the access to network data will be granted only for authorized employees. The logical security access to the organization’s data is maintained thru a password and two-factor authentication process for each user account. The physical security access inside of the organization is very complex. The implementation of this system took into consideration all of the organization’s particular and critical risks. Protecting the company from equipment theft, vandalism, natural disasters, or a terrorist attack is very vital to business continuity. Every employee has a badge to get access to the company’s building associated with an individual access pin. Software controlled surveillance cameras are posted in strategic places outside and inside of the company, along with a security system connected to the local authorities. Smoke detectors and firefighting systems are in place to prevent loss in case of fire. Access control to server rooms is made thru a complex device that requires employee badge, access pin, and biometric readers, and it’s limited to few authorized employees. Physical access to printed documentation is done thru employee badge and pin access code.
Overall, the physical security of the organization follows normal practices known in today’s industries, with adjustments to business particularities taking into consideration future security threats.
Read more about the physical and network security:
Physical and Network Security: Better Together in 2014
Physical and Network Security: Better Together in 2014