0% found this document useful (0 votes)
12 views17 pages

IS Security - Meeting 6

Uploaded by

anggie
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views17 pages

IS Security - Meeting 6

Uploaded by

anggie
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

PHYSICAL SECURITY

MEETING 6
PHYSICAL SECURITY
A. Physical security is a company obligation that
aims to secure company assets such as
records, programs and vital company
documentation.
B. The main objective of physical security is to
protect and prevent any damage done
intentionally or unintentionally to company
assets.
COMPUTER CENTER
• We recommend having a separate room /
building or floor
• The development and support sub-unit can be
placed in a computer center
• Access to the computer center using an id card
• Equipped with cctv
COMPUTER ROOM
• It should have a minimum number of doors and access by using an id card
• Contents of the computer room:
– Main computer (mainframe, mda-range, or servers)
– Data communication equipment
– Printer
– UPS
– Pabx (private automatic branch exchange)
– Telex (* if still in use)
– Filing cabinet for media back up
• The computer center must have:
– Air condition
– Fire detector
– fire extinguishers
– Alarm
– cctv
ID card
All ICT employees must have an ID Card that is
used at all times

Access area restrictions. For example, a


programmer can only enter his office.

If there is maintenance from outsourcing, it must


be accompanied and given a "VISITOR" identifier
ALARM SYSTEM

Can be activated when


An alarm system is badly there are working hours
needed or no working hours
ALARM
SYSTEM

Connected to the Installed at the entrance,


security guard room file room or window
EMERGENCY PROCEDURE
This procedure contains in detail the actions
taken in the event of an emergency, including
calling for assistance from the police or company
security
EQUIPMENT

Do not bring any equipment


into the computer room

Only bring or place approved


equipment in the computer
room
AIR
CONDITIONIN
G
The computer room must have air
conditioning to regulate the room
temperature so as not to
overheat

Computer room air conditioners


are distinguished from building
cooling systems
FIRE EXTINGUISHER

There should be a fire extinguisher in every room


including the computer room

Placed in a place that is easily accessible and


visible to the people in the room area

Controlled periodically
FIRE DETECTION TOOL
• Fire detectors are able to detect fire and
provide a warning in the form of a loud alarm
sound.
• Must be tested periodically
EMERGENCY DOOR

Emergency exits Emergency doors


must be known can only be
to employees opened from the
where they are inside

The door can be


There should be opened from the
no obstructions in outside through
front of the the authority of
emergency exit the security
forces
THE REPORT IS NOT USED
• The printed report must not leave the
company
• Reports that are no longer used must be
destroyed
COMPUTER ASSETS
• All computers in the company must be managed
and registered
• A list of computer users must exist
• Before damaging or selling the unused computer
the hard disk must be formatted or the contents of
the hard disk erased
• Hardware that will leave the company must have a
pass
• Check the assets used by employees to avoid
losing hardware and software
MEDIA BACK UP

For large companies such


Back Up can be stored in
as banks, it can be stored
the same room as the
in a different room (off
computer room side back up)

The purpose of offside


back up is to avoid fire or Implementation of
serious damage to the disaster and recovery
master file
SECURITY WEAKNESSES
Physical security weaknesses include:
o There is no reception in the building entrance hall
o Guests enter without identification
o Employees easily "trust" other people who enter the
company
o There is no access control in sensitive rooms
o The entrance door does not automatically close
(automatic open close door)
o Back up is placed anywhere
o CD / DVD dumped carelessly
o Reports that are no longer used are not destroyed
See you next meeting…

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy