> Why do most public and private sector organizations still maintain separate security organizations

> Why do most public and private sector organizations still maintain separate security organizations for their physical and cybersecurity functions?
> Do you think global businesses should merge physical security and cybersecurity?
> What are some of the common threats that might result from inappropriate security in that area?

Need 3 pages with peer-reviewed citations. No introduction or conclusion needed.

15

Physical and environmental security

Control category A.11 deals with physical and environmental security. It
deals with what might be called geographic or area security, with equipment
security and with general controls to protect physical assets. Large or multi-
site organizations might, as discussed in Chapters 5 and 6, need to break
themselves down into a number of physical domains (giving due considera-
tion to any communication links between them) and then consider each
domain on its merits.

Secure areas

Control objective A11.1 deals with secure areas. Its objective is to prevent
unauthorized physical access, damage or interference to business premises
and information. It has six sub-clauses. Critical or sensitive information and
information processing facilities should be housed in secure areas protected
by a defined secure perimeter, with appropriate security barriers (eg walls,
fixed floors and ceilings, card-controlled entry gates) and controls (eg staffed
reception desks) that provide protection against unauthorized access or
damage to papers, media or information processing facilities. The protection
implemented should be commensurate with the assessed risks and the clas-
sification of the information, and should take into account out-of-hours
working and similar issues.

Physical security perimeter

Control 11.1.1 of ISO27002 says the organization should use a security
perimeter to protect areas that contain information processing facilities. It
may be appropriate, depending on the risk assessment and the classification

IT GOVERNANCE206

of the information being protected, for an organization to use more than
one physical barrier, as each additional barrier may increase the total protec-
tion provided.

The first step is to use a site or floor plan to identify the area that needs
to be secured. A copy of this document should be found with the property
title deeds. The plan that is with the deeds is there to show clearly the prem-
ises that the organization owns or leases, and it is the most appropriate base
document to use for defining the secure perimeter as it identifies clearly the
property over which the organization has control.

A continuous line should be drawn around the premises on the site plan,
including all the information and information processing facilities that need
to be protected. This line should follow the existing physical perimeter (and
a perimeter in this context is something that provides a physical barrier to
entrance) between the organization and the outside world: walls, doors,
windows, gates, floors, fixed ceilings (false ceilings hide a multitude of
threats), skylights, etc. Special attention should also be given to lifts and lift
shafts, risers, maintenance and access shafts, etc. This site plan, showing the
defined physical perim

We offer the bestcustom writing paper services. We have done this question before, we can also do it for you.

Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.