Discussion 2
docx
keyboard_arrow_up
School
University of the Cumberlands *
*We aren’t endorsed by this school
Course
ISOL 634
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
2
Uploaded by DoctorFly2464
Identifying potential physical dangers is an important stage in planning and designing new or existing
security systems. The concept of physical security is the cornerstone for all security initiatives. It includes
protecting buildings, equipment, and the information and software contained within them from theft,
destruction, natural or man-made disasters, and accidental harm. As part of any good risk management
program, it is critical to conduct a thorough risk analysis, analyze system vulnerabilities, and face
potential threats. This diagnostic method include analyzing the potential effects and hazards connected
with these risks, with the ultimate goal of developing a cost-effective security approach. (Subburaj,
2023). Fundamentally, threats take advantage of vulnerabilities in order to gain access to assets. Therefore, it is
important to clearly identify and document an organization’s critical assets. Asset identification starts
with people and includes tangible goods such as facilities and equipment. However, it is important not
to forget intangible assets such as reputation and intellectual property. Risk reduction activities focus on
addressing vulnerabilities to reduce a threat’s access to these assets. Architectural, operational, and
technological countermeasures and mitigation measures can be applied to address the vulnerabilities in
order to lower the residual risk (Rickerson, 2022).
The risk analysis method seeks to establish an economic balance between the cost of losses and the
security measures designed to handle them. Impact conservation methods should not exceed the
maximum risk linked with the cost of controlling any risk. However, the decision to implement counter
measures is motivated by the significance of the system or its data. After examining each loss,
estimations are established about the finances that will be allocated to lower the expected annual
losses. While determining the safety measures to be implemented, substantial losses need to be
prioritized. Countermeasure strategy needs to be in accordance with the likelihood and severity of the
threat (Fennelly, 2016).
There are several possible metrics that can be used in combination to achieve a complete picture of overall system effectiveness. Some metrics are useful for both new and existing security facilities, and others are only applicable to existing facilities. Metrics usable for both proposed and existing security programs include vulnerability/countermeasure matrix and adversary sequence diagrams. While the metrics usable only for existing security programs include security events logs, patrol logs and annual risk analysis. Adversary Sequence Diagrams relate to a specific type of threat actor that use intrusion to gain access to their target asset. While the vulnerability/countermeasure matrix is a spreadsheet of vulnerabilities and various types of countermeasures (Norman, 2010).
Every facility must be assessed for risk and appropriate countermeasures should be implemented to mitigate any identified risks. In a typical organization, a decision matrix is used to evaluate the mission criticality of a given facility, the sensitivity of the activities performed by people working at the facility, the potential for threats to the facility, the population of people working and visiting there, and other intangible factors. The results of these risk assessments assist authorities in making decisions about where to put resources to strengthen security and improve the levels of protection for every individual structure (Marshall, 2021).
References
Su Subburaj. 2023. Optimizing your physical security program. https://getsiteowl.com/optimizing-your-physical-security-program/
David Rickerson. 2022. Physical Security. Risk Mitigation. Where to Begin? https://jdsupra.com/legalnews/physical-security-risk-mitigation-where-1794547/
Lawrence J. Fennelly. 2016. Chapter 11. Effective Physical Security.
Thomas L. Norman. 2010. Physical security risk and countermeasures: Effectiveness metrics. https://www.csoonline.com/article/524616/physical-security-risk-and-countermeasures-
effectiveness-metrics.html
Greg Marshall. 2021. State of Physical Security: Assessing & Mitigating Risk. https://www.hstoday.us/featured/state-of-physical-security-are-you-looking-the-right-way/
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help