Wednesday Mar 07, 2012

“Physical Security, Meet Information Security . . . . ”


On a recent trip to visit family I had a revelation related to security. It's obvious but as I thought about it more It sure was much deeper than my first look. Physical security does track very closely.  Lets look deeper at how they relate.


Monitoring = Dedicated entrance road/parking lot

Monitoring = Visitor parking area

Firewall = Guard booth

Internal Firewall = additional guard booth, building reception desk, one building entrance and exit

DMZ = dedicated off site meeting space / conference room in the lobby

Logging = Video surveillance / log book

Logging = Checking vehicle registration

Authorization = Background checking

Authorization = Check ID's

Defense in Depth = Internal office access / production floor access / data center access / control room

Authorization = Escorted or unescorted (trusted)

Encryption = Locked file cabinets / secure storage / shredding

Desk Top Virtualization = Shared Office Space


Some the analogies can be debated but I think you get the idea.   As you now see physical security parallels very closely IT security. No wonder why, physical security has been around for centuries.   IT security is relatively new.  Use history to see what might be the next big threat to IT security. 





Be Secure!

--Frank

Hardware & Software Engineered to Work Together


About

Frank Wickham is a Technology Specialist for Engineered Systems, Security, and Infrastructure Architecture with Oracle's Public Sector Organization. He can be reached at frank.wickham@oracle.com.

Search

Archives
« March 2012 »
SunMonTueWedThuFriSat
    
1
2
3
4
5
6
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
       
Today