This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Physical security failure scenario assessment.

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Physical security failure scenario assessment.

If you want to maintain any place or a data center which have most critical valuable assets or resources which belongs to any individuals. If these scenarios are failed in which the hacker can easily hack the data or security could be breached which would result in vulnerabilities which will prove that some individuals are trying to give harm to security, trying to breach it and may also take advantage of the personal data. It is essential to ensure that your location well maintained and secured.

 

There is a particular scenario where failure in security system takes place in the center of Chicago colocation. This system may have been breached or harmed several times. To protect the system from breaches, I will build a sustainable security culture in which everyone feels like a person of security. This is the culture of security for everyone. This type of security may belong to everyone, which include the staff to the lobby ambassadors (Ralph,2016).

 

The employers working in the industry may not have to secure the location good enough to prevent any incident from happening and destroying the system. The incident that takes place may involve two robbers who entered to an organization with a power saw through reinforced walls. There must be a security protocol of electrifying fence and barbed wiring, which would prevent the attacker from climbing over the wall (John,2017).

The attackers couldn’t affect the data center property but also resulted in huge loss of company data or customer personal information. To protect the data, I would equip the data center with different measures of security, for example, firewall implementation, biometric access control, and 24-hour video surveillance. In this way, the attackers may not breach or hack the data in several situations (Cholewa,2019).

Sometimes, there may be a chance for the people as they enter the TSA system or their bag may pass to the screening machine with several weapons and other harmful equipment’s. At that point, the screening machine may not detect or give alert to the TSA system about several weapons and particular luggage or bag may easily pass through the TSA system. To solve this issue, the better measure must be taken to prepare for these types of incident and may introduce security protocol, which may prevent this incident from happening again (Thomas,2017).

Most of the data center of the organization is secure and hidden as the personnel of security should be prepared to handle any attack. If this type of incident would take place, then a security protocol to notify several authorities must be implemented so that it may confiscate the stolen assets and may catch the person who is responsible for the special attack at the data center (Chris, 2018).

Any person visiting a department and may steal an organization equipment’s, for example, laptops or phone. To protect our organization from this threat, a security alarm threat and a camera security protocol must be implemented which will recognize every person who is coming to the organization and may recognize a person face if he is not an employee of the company and trigger an alarm (Sai,2015).

REFERENCES

 

Ralph Goodman (2016). 7 Biggest Security Fails Of All Time. Retrieved from

7 Biggest Security Fails Of All Time

Chris Romeo, (2018) 6 ways to develop a security culture from top to bottom Retrieved from

https://techbeacon.com/security/6-ways-develop-security-culture-top-bottom

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask