Logo


1. Introduction
  1. Risk Management

  2. Who Are You, and Why Are You Here?

  3. Finding a Solution

2. Problem Definition
  1. What Needs Protecting?

  2. Who is Allowed Where?

3. Methods of Identification
  1. Reliability vs. Cost

  2. Combining Methods to Increase Reliability

  3. Security System Management

4. Access Control
  1. What You Have

  2. What You Know

  3. Who You Are

5. Other Security Systems Elements

  1. Building Design

  2. Piggybacking and Tailgating: Mantraps

  3. Camera Surveillance

  4. Security Guards

  5. Sensors and Alarms

  6. Visitors

6. The Human Element
  1. People: The Weakest Link

  2. People: The Strongest Backup

7. Site Design
  1. Layers

  2. Components

  3. Tactics

8. Controlling Site Access
  1. Entry Control Facility

  2. Zones of an Entry Control Facility

  3. Utilities and Automatition

9. Chosing the Right Solution
  1. Risk Tolerance vs. Cost

  2. Security System Design Considerations

  3. Building Security Design Considerations

Risk Tolerance vs. Cost

The right security system is a best-guess compromise that balances the risk and potential damage from people being in the wrong place against the expense and nuisance of security measures to keep them out.

Potential Cost of a Security Breach

While each data center has its own unique characteristics and potential for loss, most will have something to consider in these general categories:

Physical loss Damage to rooms and equipment from accidents, sabotage, or outright theft.

IT productivity loss Diversion of staff from primary duties while equipment is repaired or replaced, data is reconstructed, or systems are cleared of problems.

Corporate productivity loss Interruption of business due to downtime.

Information loss Loss, corruption, or theft of data.

Loss of reputation and customer goodwill Consequences from serious or repeated security breaches: loss of business, drop in stock value, lawsuits.

To receive your Physical Vulnerability Assessment, please submit your payment of $99.00
B E T T E R: Please submit your payment of $999.00 for a complete Physical Vulnerability Assessment or Design covering a single location.
Business Name:
Contact Information:
Email Address:
URL or IP address:
  

Other members of our business group:
Cloud-Security.us | US-scada.com

COPYRIGHT (C) 2000 - 2013 InfoSecPro.com ALL RIGHTS RESERVED