When we talk about human security basically we are talking about physical security. Human security is not firewall not patches and software. Physical security means to secure environment around your computer installations, your networks your information technology facilities.
First impact of the physical security on our brains is gun, gates and guards. Yes, off course it is also part of that physical security which we are going to discus. Physical security protects systems and people from various threats, including natural threats and man made threats.
First we talk about natural threats; we have many examples of natural disasters happen in last decade which make billion of physical installation of computers. For example in Haiti last year earthquake and that earthquake destroy government data centers. Second example is flood in Australia which destroy billion if physical network installations. Fire, tornadoes, hurricanes, earthquake and floods could destroy Information
Technology setups on large scales. Man made threats are common but can’t cause of big scale disasters like terrorist attacks, hackers, and car or plane crash. Power failure by a person also is threat.

Alarm systems are also part of security systems and are very effective in some situations. Door locks off course primary level security. Door locks are in different kinds and access methods like proximity cards, door combinations and radio frequency door openers. Physical security equipments installed on the base of value of computers and data. If it is high level security required the equipment must be high cost and dedicated.
With security it is also required some other controls like administrative and managerial controls, technical and logical controls. Security should be applied as appropriate to degree of sensitivity of assets you are protecting. Must be a proper physical security policy and that policy applies to confidentially and available aspects of systems and data.
No comments:
Post a Comment