What of theft, software attacks, and threat to property.

What is physical security? What are the
primary threats to physical security? How are they made to manifest in
attacks against the organization?

security is the safeguarding of an organizations computers. It refers to the
physical assets of the company, laptop, tablet, any tangible object that is
inside the building. This can include software, hardware, networks and data
from break-ins and other occurrences that could cause serious loss or damage to
a business.  (TechTarget,

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

primary threats to physical security are: Potential acts of human error and deliberate
acts such as spying or invasion, extortion, damage or vandalism,
cyber terrorism, acts of theft, software attacks, and threat to property. Acts of nature and unforeseen disasters. Technical
failures like hardware and software failures or errors (Jouini, Rabai, & Aissa, 2014).

potential act of human error or failure can be described as something that was
not intended like an employee dropping their laptop and damaging it beyond
repair. Deliberate acts could be downloading information that a person is on privy
to and selling it to another company or using that information to start a
company of their own. Attacks that include damage or vandalism, acts of theft,
software attacks, and threat to property can employees stealing computer
equipment, credentials, passwords, and laptops or intentionally damaging a
system through physical means or through viruses, worms or trojans etc.  Cyber terrorism, can be characterized as
any an exploitation of
the internet which includes premeditated and intentional attacks on a
large-scale on networks
using computer viruses,
or physical attacks using
malware, to attack individuals, governments and companies (Curran, 2016). Acts of nature and unforeseen disasters
floods, fires, earthquake or the building being hit by lightning or loss of power
when doing backups or upgrades.

2.      What
are the roles of IT, security, and general management with regard to physical

It department is responsible for the computer and network security.  This
includes access to server rooms, server room temperature and humidity controls.

security department is responsible for the physical security program and establishing
security policies, the physical security systems, enforcing the security
procedures, and examine security breaches.

management oversees the security of the facility in which the organization is
housed and the policies and standards for secure operation.  This includes
external security, building access etc. (Quizlet, 2017)

3.      What
is a mantrap? When should it be used?

mantrap is a small room designed to “trap” those who would enter a secure
area of a facility. This enable security to verify the authorization of the person
who has entered and allow access, or it will trigger alerts to signal that an
unauthorized person has attempted to enter. It “trap” involves having two
doors, one connects the entrance to the secure area, and one connects to
the non-secure area with both doors usually requiring some type electronic or
biometric key to unlock them. One door of the mantrap cannot be unlocked
and opened until the opposite door has been closed and locked (Technology Blog, 2017).

are often used in physical security to partition non-secure areas from secure
areas and bar unauthorized access. 

4.       Why are guards
considered the most effective form of control for situations that require
decisive actions in the face of unfamiliar stimuli? Why are they usually the
most expensive controls to deploy? When should dogs be used for physical

can gauge any problem that arises and respond after calculating the best solution
to the problem. Guards have unmistakable standards of operating procedures
(SOPs) that they follow and help them to execute a decision in unexpected
situations They possess the ability to apply human reasoning to the situation.

are most expensive form of security because they are dissimilar to electric
technology security, they must be paid weekly whereas technologies have to initial
cost plus occasional maintenance and upgrades.

are useful when keen senses, hearing, smelling and seeing can detect threats
that humans cannot. Dogs also are considered by some to be disposable when necessary
in high-risk situations so that humans are not exposed (Whitman,
and Mattord, 2011).