Week2-8
txt
keyboard_arrow_up
School
Ashford University *
*We aren’t endorsed by this school
Course
301
Subject
Information Systems
Date
Dec 6, 2023
Type
txt
Pages
1
Uploaded by maddog4055
Hello Everyone,
Research the Internet and locate information on the importance of organizations
having physical security to help protect against cyberattacks.
After some research, the most common reason for an organization to have physical
security is to minimize the risk to information systems and the information itself.
What are some physical security measures that can help protect against cyber
threats?
A few ways to have physical security for your organization is to hire security
guards and ID scanners at the main entrance and ones for sensitive information
areas.
How can physical security be integrated into an overall cybersecurity strategy?
The physical security can be integrated with cybersecurity by implementing access
control systems that are integrated with the cybersecurity.
What are some common physical security vulnerabilities that organizations should be
aware of?
Tailgating is one of the biggest threats to cybersecurity. Tailgating is when an
unauthorized person follows an authorized personnel into a secure area. One way to
prevent this is with anti-tailgating doors. The next one is the theft of documents
which happens when sensitive documents are left in uncontrolled areas. The best way
to prevent this is with a clear desk policy.
How can physical security vulnerabilities be mitigated through best practices and
risk management?
This can be done through a few steps.
1. Develop a plan and define its scope
2. Identify threats and vulnerabilities
3. Assess the impact and likelihood
4. Review the current state of your physical security
5. Implement or update mitigation measures
6. Establish a regular cadence for reassessment
What are some consequences of physical security breaches for an organization, its
customers, and its stakeholders?
A tarnished reputation is one of the biggest because it can lead to mistrust from
your customers and stakeholders.
References
Ahola, M. (2019, September 10). Top 5 physical security risks - and how to protect
your business. Usecure.Io. https://blog.usecure.io/physical-security-risks
O’Brien, K. (2022, January 27). Cyber & physical security: Why you need
both. Compassitc.com. https://www.compassitc.com/blog/cyber-physical-security-why-
you-need-both
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help