Question: Part A: Physical and Environmental Security Answer the following based on the above given scenario. Task A.1: Can physical and environmental security relate to cybersecurity?

Part A: Physical and Environmental Security Answer the following based on the above given scenario.

Task A.1: Can physical and environmental security relate to cybersecurity? Explain and give reasons.

Task A.2: Identify potential threats and corresponding risks associated with physical and environmental security, and categorize them based on their impact on a particular perimeter and place (i.e., lobby, admin building, classroom, parking, and so on).

Task A.3: For each risk identified in the previous task, suggest a control strategy for each.

Part A: Physical and Environmental Security Answer the following based on theabove given scenario. Task A.1: Can physical and environmental security relate toTask A.4: Design policies to ensure physical and environmental security. The policies should be categorized using Three Perimeters Strategy. The policy document should cover all policy components as mentioned in W1S2 Slide#28. The following factors should be covered in the policy statement, but not limited to: To protect all entry/exit points (front and back sides of the building) To protect working and non-working hours/sites General policies for offices, rooms, and facilities Specifically, policies to secure Room 123, 125, and 132 Policies for removal of the physical and data equipment Task A.5: Write down the guidelines and procedures for removal of any data storage equipment.

A Delivery Gateway Play Field PARKING LOT CASE STUDY introduction The given scenario associated with a school building. The school deals with a number of stakeholders such as students, teaching staff, administrative staff, and other internal and external entities. This is a public school building where any visitor can enter by showing their identification. The school administration wants to ensure the security of their valuable assets and to be vigilant in detecting threats. Therefore, the school administration hires you to prepare a security plan that specifically secures the site from four perspectives as follows: i. Physical Security ii. Environmental Security iii. Communication Security iv. Operations Security Building Structure As shown in Figure-1, the first layer of security is directed at the perimeter of the school both securing the perimeter during the school day but also during non-school hours. This layer of Security consists of solid walls or fencing. blending security and aestheties. In conjunction with walls and fences, clear signage is an important key at this level of security Proper locking devices on perimeter gates are part of the basic security of the school. So many times, the unauthorized entry onto campus is not because of the failure of the lock, it is the failure of a person to lock the gate. Admin Building Staff/Visiter Gate Main Entry LAJA Figura-1: Overall Structure of the Building In addition, the following Figure-2 and Table represent rooms of the Admin Building in the Sensitive assets or information located in vote of the room Rm. 124 Rm. 128 Rm 130 Lobby Rm 132 Comp. Facility Rm. 123 Rm 125 Rm. 129 Figure 2. Site Admin Building Tate-1: Chical Art Information Room Sensitivity & Critical Class Privileged Vital Room 123 Room 125 Privileged, Vital Sensitive Assets or Info Computer Lab: Computers, Printes Classroom: Computers, Projector Servers and Critical sensitive Information Room 132 Confidential Critical

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!