Discussion 2

docx

School

University of the Cumberlands *

*We aren’t endorsed by this school

Course

ISOL 634

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

2

Uploaded by DoctorFly2464

Report
Identifying potential physical dangers is an important stage in planning and designing new or existing security systems. The concept of physical security is the cornerstone for all security initiatives. It includes protecting buildings, equipment, and the information and software contained within them from theft, destruction, natural or man-made disasters, and accidental harm. As part of any good risk management program, it is critical to conduct a thorough risk analysis, analyze system vulnerabilities, and face potential threats. This diagnostic method include analyzing the potential effects and hazards connected with these risks, with the ultimate goal of developing a cost-effective security approach. (Subburaj, 2023). Fundamentally, threats take advantage of vulnerabilities in order to gain access to assets. Therefore, it is important to clearly identify and document an organization’s critical assets. Asset identification starts with people and includes tangible goods such as facilities and equipment. However, it is important not to forget intangible assets such as reputation and intellectual property. Risk reduction activities focus on addressing vulnerabilities to reduce a threat’s access to these assets. Architectural, operational, and technological countermeasures and mitigation measures can be applied to address the vulnerabilities in order to lower the residual risk (Rickerson, 2022). The risk analysis method seeks to establish an economic balance between the cost of losses and the security measures designed to handle them. Impact conservation methods should not exceed the maximum risk linked with the cost of controlling any risk. However, the decision to implement counter measures is motivated by the significance of the system or its data. After examining each loss, estimations are established about the finances that will be allocated to lower the expected annual losses. While determining the safety measures to be implemented, substantial losses need to be prioritized. Countermeasure strategy needs to be in accordance with the likelihood and severity of the threat (Fennelly, 2016). There are several possible metrics that can be used in combination to achieve a complete picture of overall system effectiveness. Some metrics are useful for both new and existing security facilities, and others are only applicable to existing facilities. Metrics usable for both proposed and existing security programs include vulnerability/countermeasure matrix and adversary sequence diagrams. While the metrics usable only for existing security programs include security events logs, patrol logs and annual risk analysis. Adversary Sequence Diagrams relate to a specific type of threat actor that use intrusion to gain access to their target asset. While the vulnerability/countermeasure matrix is a spreadsheet of vulnerabilities and various types of countermeasures (Norman, 2010). Every facility must be assessed for risk and appropriate countermeasures should be implemented to mitigate any identified risks. In a typical organization, a decision matrix is used to evaluate the mission criticality of a given facility, the sensitivity of the activities performed by people working at the facility, the potential for threats to the facility, the population of people working and visiting there, and other intangible factors. The results of these risk assessments assist authorities in making decisions about where to put resources to strengthen security and improve the levels of protection for every individual structure (Marshall, 2021). References
Su Subburaj. 2023. Optimizing your physical security program. https://getsiteowl.com/optimizing-your-physical-security-program/ David Rickerson. 2022. Physical Security. Risk Mitigation. Where to Begin? https://jdsupra.com/legalnews/physical-security-risk-mitigation-where-1794547/ Lawrence J. Fennelly. 2016. Chapter 11. Effective Physical Security. Thomas L. Norman. 2010. Physical security risk and countermeasures: Effectiveness metrics. https://www.csoonline.com/article/524616/physical-security-risk-and-countermeasures- effectiveness-metrics.html Greg Marshall. 2021. State of Physical Security: Assessing & Mitigating Risk. https://www.hstoday.us/featured/state-of-physical-security-are-you-looking-the-right-way/
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help