StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

The Convergence of Physical and Information Security - Research Paper Example

Cite this document
Summary
In this approach, there is the merging of the two historically distinct functions of security, including information security and physical security. In the management of…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.4% of users find it useful
The Convergence of Physical and Information Security
Read Text Preview

Extract of sample "The Convergence of Physical and Information Security"

Download file to see previous pages

There before, organizations and enterprises used to protect their assets primarily with the use of physical efforts such as guns and gates. However, this has become an obsolete idea today since people today are now using passwords and effortless systems to protect their assets. ISSA, ISACA, and ASIS are examples of the three main security organizations that endorse security convergence. A few years ago, the three organizations came up with the Enterprise Security Risk Management with the intention of enhancing effortless security.

Using the example of Smart Cards, we see a very good example of the convergence between the buildings (physical), the PCS and the networks (information). Before we go deep into the topic, it would be important we understand the point of convergence between the two concepts as this will help us learn why the discussion is so important today. When we talk about the physical security, we mean the traditional form of protection that focused primarily on the use of effort to protect the assets owned by an organization (Conference Board of Canada, 2011).

During this time, organizations, mainly used guns, electric fences, security fences and guns to guard their territory. Physical security officers will in that case be made up of law enforcement officers. These officers had specific departments who will in return report to risk management offices and departments. The use of such systems and tools was predominant a few decades ago. Today, things have widely changed and people are no longer using effort to protect their assets. This has been defined as information security.

With the use of information security, firms are widely using passwords and software gadgets to protect their assets from unauthorized access and use (Contos, 2007). Staffs under information security have well established technical backgrounds as their intention is to use as a minimum effort as possible in protecting the assets an

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The Convergence of Physical and Information Security Research Paper”, n.d.)
The Convergence of Physical and Information Security Research Paper. Retrieved from https://studentshare.org/miscellaneous/1642252-the-convergence-of-physical-and-information-security
(The Convergence of Physical and Information Security Research Paper)
The Convergence of Physical and Information Security Research Paper. https://studentshare.org/miscellaneous/1642252-the-convergence-of-physical-and-information-security.
“The Convergence of Physical and Information Security Research Paper”, n.d. https://studentshare.org/miscellaneous/1642252-the-convergence-of-physical-and-information-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Convergence of Physical and Information Security

Information Security and Assurance

In addition, there are a large number of problems and issues that pretense critical and possible challenges for data and information security in cloud computing, comprising domain-specific restrictions, place limitations, technological or legal limitations, effectiveness of data management, various security metrics supported by cloud security providers, inappropriate implementation of sufficient security mechanisms, service-level security issues and the aggregation of data (Hudic et al....
3 Pages (750 words) Essay

Convergence of Physical and Information Security

This paper ''convergence of physical and information security'' shows that the objectives are look into the overall trend in the surroundings, the challenges faced and recommendation supported by the ground research that has been conducted in recent times with regard to the affectivity of the convergence.... Existing scenario: With lack of support, knowledge, tools techniques, expertise and research work, the two mediums are being kept apart from one another and the physical layer of security operates in a totally different sphere than the information security layer....
11 Pages (2750 words) Research Paper

Solving Problems of Multiple Identities

This paper ''Computer security'' tells that Solving problems of multiple identities is done under effective identity management.... Application The Metropolitan Police Services can utilize this technology for a successful operation of its activities without comprising the security of sensitive information in the police service.... nbsp;Claims-based identity entails a common way of using applications to acquire required identity information about users within their organizations, from other organizations....
8 Pages (2000 words) Essay

Physical Security Principles Paper

(“The rise of physical security information management”, 2007) The traditional physical security systems such as human surveillance and locks and boundaries are being integrated with the modern IT systems.... People developed various physical security systems from time to time to guard their valuables.... Some of the common physical security measures taken by the people includes storing valuables under lock and… locking the houses, employing security personnel to guard ground, building, factories and other governmental or commercial establishments and surveillance....
5 Pages (1250 words) Essay

Software Development, QA, Anti-Piracy

First is the management of physical locations, whereby the access control system policy should be designed and implemented with the purpose of controlling access to locations/sites.... Information constitutes the core asset of any corporate entity and as information is being increasingly stored on digital media, it is imperative that companies institute security… Given the value of information and the extent to which its unauthorized access and subsequent misuse has the potential to wreak al havoc upon corporate entities, the strategies which companies employ for both the design and implementation of their corporate policies are of singular importance....
4 Pages (1000 words) Essay

Integrated system design for cloud enterprise network and a secure BYOD

Despite the fact that using personal devices for BYOD causing security concerns, many organizations that have adopted BYOD implement a security policy for their networks to assist their respective Information Technology teams to quell such concerns.... Organizations have implemented several measures to boost their BYOD security.... The use of mobile devices have made the introduction of BOYD to organizations simpler, because organizations do not provide BYOD devices, rather they allow employees to use their own… Mobile devices have made the implementation of the BYOD technology simpler and less bound by time and physical boundaries, as employees can share can share and receive information on its cloud network on time regardless of their BYOD By + Definition of Key Words for BYOD Mobile Technology Consumerization of IT as a trend has improved with the introduction of modern mobile devices....
2 Pages (500 words) Essay

Integrated Physical Security

This report will start with the meaning of physical security.... Following which, a clear explanation of the need for physical security will be discussed.... Having understood the meaning and the need for physical security, a detailed analysis of a few of the possible solutions will be provided.... hellip; Physical security is a very important aspect for everyone.... This is a very important aspect for the business and complete care There are a number of different considerations to be made while choosing the integrated physical security protection....
14 Pages (3500 words) Essay

Security Plan of Internal and External Theft

"security Plan of Internal Theft and Natural Disaster" paper argues that surveillance cameras to solve the problem of security at the convenience store represent more of a panoptic vision that is aligned with this scientific vision for controlling and solving the problem.... ssessment: The convenience store currently has a security system with a panic alarm.... There are security cameras that could capture external theft in the process, but these cannot prevent external theft....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us