Logo


1. Introduction
  1. Risk Management

  2. Who Are You, and Why Are You Here?

  3. Finding a Solution

2. Problem Definition
  1. What Needs Protecting?

  2. Who is Allowed Where?

3. Methods of Identification
  1. Reliability vs. Cost

  2. Combining Methods to Increase Reliability

  3. Security System Management

4. Access Control
  1. What You Have

  2. What You Know

  3. Who You Are

5. Other Security Systems Elements

  1. Building Design

  2. Piggybacking and Tailgating: Mantraps

  3. Camera Surveillance

  4. Security Guards

  5. Sensors and Alarms

  6. Visitors

6. The Human Element
  1. People: The Weakest Link

  2. People: The Strongest Backup

7. Site Design
  1. Layers

  2. Components

  3. Tactics

8. Controlling Site Access
  1. Entry Control Facility

  2. Zones of an Entry Control Facility

  3. Utilities and Automatition

9. Chosing the Right Solution
  1. Risk Tolerance vs. Cost

  2. Security System Design Considerations

  3. Building Security Design Considerations

Who is Allowed Where?

A person’s authority for access to a secure area can be based on different things. Besides the usual ones — identity and purpose, the first two listed below — there may be additional categories requiring special treatment, such as “need to know.”

Personal identity Certain individuals who are known to the facility need access to the areas relevant to their position. For example, the security director will have access to most of the facility but not to client data stored at the installation. The head of computer operations might have access to computer rooms and operating systems, but not the mechanical rooms that house power and HVAC facilities. The CEO of the company might have access to the offices of the security director and IT staff and the public areas, but not the computer rooms or mechanical rooms

Reason to be there A utility repair person, regardless of whether it’s Joe Smith or Mary Jones, might have access only to mechanical rooms and public areas. The cleaning crew, whose roster could change from day to day, might have access to common areas but nowhere else. A network switch expert might have access only to racks with switching equipment, and not racks with servers or storage devices. At a web server facility, a client’s system maintenance personnel might have access only to a “client access room” where there are connections to their personal server for administrative purposes.

Need to know Access to extremely sensitive areas can be granted to specific people for a specific purpose — that is, if they “need to know,” and only for as long as they have that need.

To receive your Physical Vulnerability Assessment, please submit your payment of $99.00
B E T T E R: Please submit your payment of $999.00 for a complete Physical Vulnerability Assessment or Design covering a single location.
Business Name:
Contact Information:
Email Address:
URL or IP address:
  

Other members of our business group:
Cloud-Security.us | US-scada.com

COPYRIGHT (C) 2000 - 2013 InfoSecPro.com ALL RIGHTS RESERVED