Security the Implementation of System

There is a trade-off with regard to this first layer to ensure a high level of physical security that does not compromise the system-level flexibility and support. This first level of support can be as simple as locks, fireproofing and safes to biometrically based access as well. The components of physical security are surveillance and notification systems. These are systems that react to smoke, intrusion or a threat in the form of a break-in for example. Using motion sensors, intrusion detection equipment and closed-circuit televisions are all part of this step, as are continual centralized monitoring of the entire site as well. Organizations have successfully been able to integrate emergency self-start shutdown procedures for systems when intruders are discovered, disabling all system access to protect the data. A third class or component of security is the reliance on combining physical monitoring systems with the actual enterprise systems to ensure all data and operating parameters are backed up periodically, and in the event of a natural disaster or a theft, the enterprise systems performance can be restarted immediately.

Advanced strategies organizations are using at this level include attempting to capture the attackers by locking them into the computing complex and also taking their pictures via video and sending them to monitoring agencies including the police and FBI in real-time.


Phil Aronson. (2005). An integrated approach to workplace security.

Employment Relations Today, 32(1), 41-46.

C Thomas Johnson. (2008). Protecting Your Walls. Risk Management,

55(5), 55,8.

Gene Kim. (2008)..