StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network and Data Security of the Building - Essay Example

Cite this document
Summary
The paper "Network and Data Security of the Building" discusses that generally speaking, security professionals are important in the world as they concern themselves on the importance of physical security and provide remedies to the security situation…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.9% of users find it useful
Network and Data Security of the Building
Read Text Preview

Extract of sample "Network and Data Security of the Building"

The issue of security is of critical significance and look forward to helping arrest the challenge of physical insecurity. Below is the explanation of how the above factor could help curb the security problem.
Crime Prevention through environmental design involves a combination of psychological and physical aspects of a security situation and then considering the two simultaneously. Security in areas says public zones, private or semi-private zones are best achieved by the use of physical barriers like small fences or well-planned flower beds around them. These barriers along with some other symbolic barriers could also be used around sensitive data rooms to deter the entry of people into these rooms. The architectural designs have shown great efficiency in discouraging acts of crime in facilities. (Mlakar, 1999)
Surveillance. Surveillance in any building or facility is very crucial as it helps to monitor people within it. The people may include the employees, visitors who, in this case, are strangers or even the security persons on the ground. Surveillance can assist to closely monitor individuals with a lot of secrecy and thus it’s recommended to install these devices at places where people cannot recognize them easily. This way, acts of crime will be identified easily as the individuals will be caught unawares. Monitoring becomes even most critical with an increased number of employees.
Before any procurement of Surveillance devices to be used in a given facility, some factors have to be considered. They may include;
• Surveillance methods the facility intends to employ. These may be a formal or informal method, and the selection will depend on the likes of the facility.
• The condition of the lighting of the Surveillance cameras. Different Surveillance devices will require different conditions of lighting in terms of brightness and or intensity.
• The nature of the landscape. Of interest here is whether the landscape is blocking the cameras or not.
• Range of the cameras needed. Different cameras have differing ranges over which an image can be viewed clearly.
• The number of cameras needed. This is determined by the size of the facility or the area under which monitoring is to do.
• Mode of operation of the technology embedded in the device, whether wired or wireless.
Monitoring cannot be accomplished in the darkness. Lighting, therefore, becomes another factor that goes hand in hand with surveillance. The brightness, intensity, and the number of lighting devices in and within a facility becomes of critical importance. Well-spaced and glowing office lighting show well on cameras. Therefore, lighting offers the basis for any security situation in any given place.
Outdoor barriers in a facility help to delay, obstruct, and or prevents cases of thefts and other negative security situation. The barriers include fences, perimeter barriers, and gates among other obstacles that prevent access to persons to some given areas.
They act as a deterrent to insecurity and thus very important because;
• They act and offer the first line of defence. Theft delays and obstructions help to achieve the defence.
• They provide boundaries and limits to which people are limited to going beyond and through. They thus help to control access to people to some points with ease.
The rooms and areas in the building that are not in use at a given time should always be locked. Locking helps protect the dissemination of private and confidential information in documents about a given facility that could be critical if on the hands of strangers. The keys to the locks should only be given to some selected trusted individuals to avoid the cheating that would result in frauds. The various types of locks include spring latch bolts, deadbolt locks, slip bolt latch, padlock, and knob locks.
Very confidential documents and papers should be stored in safes, and the safes locked with some safe codes.
The codes should regularly be changed and only be disclosed to certain persons.
Alarms in a building are important in informing or warning the people within it of a situation that requires their attention. With alarms, whenever an insecurity situation occurs, it’s handled faster and more efficiently contrary to if they were not installed. They also prevent prolonged damage that could occur with their absence. Alarms should be centralized within the building so that a faster response can be received. Various alarm systems could include; Passive infrared, ultrasonic, photoelectric, and glass break detectors.
Another way to curb insecurity could be controlling the entry of people into a building. The employees could use a lanyard and a badge identifying their identity. They could also use a keypad system.
Guards at the gates would help keep them locked and allow entry of only the peoples whose identity is known into the building. Names of strangers could be noted down in visitor books of record. Other sophisticated systems may use fingerprint or palm scanning devices to identify people within the building.
The facility can use firewalls, encrypted programs, and other different software that help to protect its data. Electronic data and documents could be locked down at all times when not in use. The closure could reduce at all costs chances of people having access to them.
In conclusion, in my humble opinion, the application of the above recommendations in the facility would assure total security. 

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Summary Essay Example | Topics and Well Written Essays - 1250 words - 4”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1687953-summary
(Summary Essay Example | Topics and Well Written Essays - 1250 Words - 4)
https://studentshare.org/miscellaneous/1687953-summary.
“Summary Essay Example | Topics and Well Written Essays - 1250 Words - 4”, n.d. https://studentshare.org/miscellaneous/1687953-summary.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network and Data Security of the Building

Regardless of Computer or Network Security

They include lack of a receptionist within a building, no visitor sign-in or required escort to access the building, lack of door's access controls, and doors propped open.... Following the security vulnerabilities in existence, unauthorized people can access the building.... Black hat hackers are the most daring because they use their knowledge to obtain information and data for their own personal gains or to disrupt network systems.... Accessing information and data from network systems and selling in the black market has become a way of life for many hackers in the nation....
12 Pages (3000 words) Assignment

Network Security

This paper ''Network security'' discusses that by utilizing quantitative and qualitative research methods, we will analyze different aspects of organization wide information security.... hellip; As network vulnerabilities are constantly at a rise, network security vulnerabilities are evaluated in three categories i.... logical security, internal security and external security.... The logical security domain will cover technical controls such as deployment of IDS, Virtual LAN, monitoring violation logs, auditing on domain environment, ISA server and VPN security as well....
16 Pages (4000 words) Research Paper

Network Security and Different Ways to Secure Networks

The security of the data, at the most basic level, is authenticated by the users or the network administrators who assign a password and an ID to the respective network so that the security of the network is kept intact The researcher states that assigning a password and an ID to a network is often called one-factor authentication while the two-factor authentication has often been identified when the account or network is secured by a security-token for e.... There are various ways in which the security of a network can be breached....
9 Pages (2250 words) Essay

Introduction to Network Security

ions are in place to monitor and control unauthorized access, misuse, modification, or denial of the network and its resources (Simmonds, Sandilands, & van Ekert, 2004).... RUNNING HEAD: NETWORK security Network security Threats and Vulnerabilities of a network Type your name here 2/28/2011 Contents RUNNING HEAD: NETWORK security 1 Threats and Vulnerabilities of a network 1 Type your name here 1 2/28/2011 1 Contents 2 Abstract 4 Problem Statement 4 Research and Analysis 5 Introduction to Network security 5 Why Network security?...
9 Pages (2250 words) Research Paper

Network Security setup

n Richman investments, the database software, operating system, client-server applications, and data stored in the organizations center and their hardware is collectively under this domain.... … The necessary security measure here is installation of updated anti-spyware and antivirus.... In order to ensure security at this domain, it is recommended to ensure proper addressing schemes, proper protocol selection and enhanced encryption of communication equipments....
7 Pages (1750 words) Research Paper

Setting up a Home Network

They are also helpful in situations where installing cables are difficult, for example, in an old building.... On the other hand, the disadvantages of this kind of system are that they have poor security and are vulnerable to electronic devices.... The work station and the files servers have an antenna or a transceiver through which it can receive or transmit data.... Even if a person crosses over the path between the file server and the workstations the connection will be lost and the transfer of data has to be repeated....
10 Pages (2500 words) Essay

Assignment 2: Building on Prior Success

This version of operating system contains numerous security protocols that could significantly enhance security of the network system once installed.... This version of operating system… Protecting the contained data from unauthorized access remains critical to the success of the network; therefore, installation of an operating system with security building on Prior Success Inserts His/Her Inserts Grade Inserts 22.... 2 building on Prior Success The network operating system that could properly function with the proposed network installation would be Microsoft's Windows Vista....
2 Pages (500 words) Research Paper

Physical Security Clients Assessment (Criminal Justice)

Interior security provides a third line of defense by use of physical barriers and surveillance to prevent unauthorized access and ensure security of occupants.... eese and Tong (2010) point out the physical security of federal buildings and include assets of physical security such as closed-circuit television cameras, safety guards and barrier material.... The crimes that could be committed in contravention to building security include theft and burglary, property damage including sabotage and graffiti, personal offenses such as elevator assaults, public order offences such as angry interchanges with receptionists and unauthorized access to utilities that could lead to commercial espionage....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us