10 Oct 2022

89

The Best Cyber Security Finals of 2021

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 1436

Pages: 5

Downloads: 0

Question One 

IT security infrastructure is a multi-discipline that requires a number of skills and knowledge for anyone to understand how it works. The most important key area that any specialists is required to be knowledgeable at is how IT security infrastructure can be used to implement a comprehensive physical security in any institution or building. IT security infrastructure is important in the planning of physical security and protection because of a number of reasons (Stallings, 2014). 

First and foremost, physical security comprises of taking measures such as installing surveillance cameras, alarms, gates, and other security tools that are meant to protect people and property from any danger, harm, or theft. Over the years, the advancement in technology has allowed IT security infrastructure has allowed organizations and residence areas to incorporate this infrastructure into their strategies of improving physical security. For example, in any workplace, security personnel with the help of IT experts can install systems that require proximity cards on entry (Stallings, 2014).This card would be used at the entrance of the building to monitor who accesses the building or the offices. It also sets off an alarm that goes off when there is a case of an unauthorized entry into the building. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Video surveillance cameras have also become quite a common feature that has been used to enhance physical security in homes and workplaces. Not only do these devices monitor the environs, but they also detect any possible threats and enable a forensic review. With the rapid enhancement of technology, some of these surveillance cameras go off once a threat is detected, informing the home or building owner, or the nearest police station (Stallings, 2014). 

These are just but a few examples of how IT security infrastructure has enhanced physical security. Instead of using the traditional form of physical security whereby a guard monitors who access the building manually, the IT infrastructure has made this job easier and more effective (Stallings, 2014). Since IT security infrastructure was introduced, there has been a tremendous improvement in physical security. This is because unlike the traditional measures of physical security (e.g. whereby guards are expected to protect property) which are easy to bypass, it is quite difficult to bypass IT security infrastructure. 

Question Two 

To run a successful company, one is required to have a deep understanding of how to serve their clients despite the changing market conditions. A business continuity plan helps to keep the company running despite cases of natural disasters, bad publicity, or economic downturns. A business continuity plan is, therefore, a very important requirement for any successful business to run smoothly (Snedaker, 2007). 

One major significance of having a business continuity plan is that it gives the company an added advantage over other companies that do not have one. It ensures that when every other business is suffering from the aftermath of a natural disaster such as a hurricane, the companies with a continuity plan are better placed and are in a position to recover from the natural calamity faster than the rest (Snedaker, 2007). Therefore, as the other companies stay out of business as they try to come up with ways of recovering from the setback, the company that had a continuity plan carries on with the business as if nothing happened, and in addition, gets the clients of the affected companies. 

Due to climate change, natural calamities have become quite a common phenomenon all over the world. As much as companies are insured from these calamities by their insurance company, it is of great significance that they also have a business continuity plan that will guide them through such times. Unlike insurance covers that only cater for the reconstruction of the company after such calamities, a business continuity plan covers more than just the reconstruction (Snedaker, 2007). It guides the employees and everyone who is involved on how to act during such times. It also gives guidelines on how they will jumpstart their business once the calamity is over. It helps the company and the employees to have a strategic way of dealing with such disasters. Having a business continuity plan and training the employees on how to follow it to the letter in cases of natural calamities helps the company have a sense of direction unlike in cases where there is none, and each employee has to do what they think is right. 

Having a business plan is very important for any business. Many people dismiss this because they feel that it is a waste of time, or that insurance will take care of the losses incurred, or when disaster strikes, they will know what to do. However, this is not the case because having a business continuity plan is actually an investment because it gives the company a direction and a plan B in case of such scenarios. Unlike a disaster plan, a business continuity plan is more comprehensive because it not only gives the guidelines of recovering from calamities but also focuses on the future of the company even after the calamity (Snedaker, 2007). 

Question Three 

Physical site surveys are a very fundamental tool when it comes to ensuring that the physical-security program of any organization is fully implemented and that it works. The surveys are meant to measure and identify how ready the physical-security program is and provide the person in charge with a complete posture of the status of the system. There are several steps that are taken during the survey. 

First and foremost, during the survey, one must first identify what sorts of crime are prone in the given area, the possible targets in the area, and the risks of the given organization being a target, by doing taking this measure, one is able to identify the best measures to take in a bid to reduce crime in the area (Sample Office Building, 2009). Second, one has to check for the areas of weakness in the given building. This is done by ensuring that all points of entry are covered and that there are no access tools that will aid any criminals to gain access to the building. The security personnel then has to consider whether the existing mechanisms are sufficient enough to protect the building from any criminal activities. If not, new mechanisms are put in place. The next step is usually taking note of the property or the assets that are in the building; the number, make, serial number, etc. This helps in the final step which is being able to highlight any possible security measures and take the required measures. 

Conducting the Physical security site survey has a number of significances for any organization. First, the survey increases security awareness, especially of the given area. One is able to know what sorts of crime are prone in the area, and whether the organization is a target or not. With this knowledge, the security personnel is able to make a proactive plan on how to prevent such crimes from happening, and what to do in case they do happen. The survey also identifies the vulnerabilities of the existing security mechanisms and measures, hence the security personnel can make the necessary adjustments so as not to compromise the physical security of the site or organization (Sample Office Building, 2009). 

Physical security survey has immense benefits for any organization. It provides a proactive plan on how to deal with insecurity and crime which is better than a reactive plan because a reactive plan deals with the problem as it comes. A proactive security plan, however, foresees a problem and takes the correct measures to prevent it. This greatly boosts physical security in an area. 

Question Four 

Access control is an example of IT security infrastructure technique that can be used to monitor and regulate who can access, use or view resources in a building. This is the most sought out security measure in many buildings and organizations because it is a computerized form of security measure and unlike other measures, it has proven to be quite crime-proof. 

One of the biggest significance of the access control system is that unlike other security measures such as gates or guards who are easy to bypass, the access control easily detects any form of intrusion from unauthorized personnel (Implement Strong Access, 2015). Once an intrusion is detected, the doors automatically lock, or an alarm goes off, informing the security personnel about the intrusion. 

Another great feature of the access control is that only authorized personnel are given the access to the building or specific parts of the building. This way, if anything goes wrong, or if there are cases of burglary or vandalism, which is not caused by outsiders or criminals from outside, the security personnel of the building is able to see who was in the building and at what time. This makes it easy for them to identify whoever is responsible for those crimes (Implement Strong Access, 2015). 

Access control is one of the best security measures that any building could employ. Not only is it an accurate way of monitoring what goes on in the building, but it also increases the overall physical security of the building. It is a very effective security measure as compared to other measures such as gates, guards, or alarms because, in some way, it is a combination of all these measures (Implement Strong Access, 2015). 

References 

Implement Strong Access Control Measures. (2015). Payment Card Industry Data Security Standard Handbook , 123-139. 

Sample Office Building Physical Security Survey Checklist (2009). High-Rise Security and Fire Life Safety , 1-40. 

Snedaker, S. (2007). BC/DR Plan Maintenance. Business Continuity and Discovery Planning for professionals , 391-408. 

Stallings, W. (2014). Physical Security Essentials. Cyber Security and IT Infrastructure Protection, 109-134. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 17). The Best Cyber Security Finals of 2021.
https://studybounty.com/the-best-cyber-security-finals-of-2021-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Government Restrictions: What You Need to Know

Government sometimes steps in to intervene in the global trade. The government restrictions in international trade include the introduction of quotas, tariffs, and subsidies ( Satterlee, 2009 ). My perception of the...

Words: 837

Pages: 2

Views: 71

Assessment International Management: The Top 5 Benefits of an Assessment

QUESTION 1 There has been an emergence of new beliefs about quality, quality is everyone's job, not just a special department and training in quality. | | _ Saves money. _ |---|--- | | Is very costly. ...

Words: 731

Pages: 2

Views: 66

Cross Cultural Issues in International Business

Cross cultural issues are likely to bring barriers in the business communication, especially at international level. In that sense, it becomes important for all international organizations and their representatives...

Words: 624

Pages: 2

Views: 61

ICRC - Humanitarian Challenges in the Sahel and the Role of Diplomacy

Running head: HUMANITARIAN SITUATION IN THE SAHEL REGION 1 ICRC - Humanitarian Challenges in the Sahel and the Role of Diplomacy According to HE Sultan al Shamsi, the UAE considers the Sahel region, which comprises...

Words: 645

Pages: 2

Views: 362

Compare and Contrast: Terrorism

Timothy Garton Ash does not give a precise definition of what terrorism is, but he gives a few pointers to what should be considered when defining a terrorist. At first, he says that biography should be considered....

Words: 1963

Pages: 3

Views: 65

INTERNATIONAL ORGANIZATIONS AND ETHNIC CONFLICT

Introduction Concerns among International Organization regarding ethnic conflict management and the state of minority communities is a common situation globally. For instance, the League of Nations had such...

Words: 716

Pages: 2

Views: 380

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration