Social Distance

1590 Words4 Pages

In reference to computer science, physical security is one of the most important accomplishments a business can achieve. Due to the advent of the modern technical age, all of a company’s records are held on their data systems. First and foremost, theft or loss of historical records and accounting data would instantly cripple an enterprise and could very well lead to its ultimate demise. The high profile news reports just in the last decade verify that. Hackers stole the financial records of several banks, which included the personal information of thousands of customers. Ditto for the Veterans’ Administration, for an employee’s laptop was stolen off site. Inside the computer’s hard drive were the ever important Social Security Numbers of hundreds of thousands of veterans and their families. For example, a financial institution goes to stark measures to ensure the money and securities stored there are safe. Not only are there outside locks on the doors and an elaborate alarm system, there is a fireproof steel vault with the finest timed locks available. Most usually, the valuables are further stored in locked boxes inside that vault. Just like that bank, an organization must strive to make physical security a priority. However, simply locking the data and equipment is far from sufficient. The information technology also needs an “alarm” of sorts, so that the company’s police, the information security specialists, can identify the threat and diminish or eliminate it.
Discussion
I. Definition:
Rouse (2005) defines physical security as “the protection of personnel, hardware, programs, networks, and data from physical circumstances and events that could cause serious losses or damage to an enterprise, agency, or insti...

... middle of paper ...

...clusion
Physical security is everyone’s responsibility. Just like every member of the family is responsible to ensure household safety, every member of an organization, from the Chief Executive Officer (CEO) to the lowest apprentice employee, must be vigilant for cracks in physical security. Lock that computer screen when leaving it unattended, even if for a “short time”. Make a checklist to make sure the doors and safe are locked before departing that evening. Those annoying backup warnings could one day save the company, as well as the employee’s job, in the event of a system failure. That person hanging around asking too many obtrusive questions needs to be reported to proper authorities. Report and ignore suspicious e-mails and phone calls. These supposedly simple things can make the difference between utter disaster and a safe, smooth running business.

Open Document