Countermeasures In Networking


Go back

Week 4 Discussion

Lionel Sharpe

Professor James Leadbetter

Sanford Brown Online


Physical Security

Physical Security is a form of protection that will protect the hardware, software programs, data, networks and the computers and devices themselves. This will protect the environment from being destroyed in ways of hard drive loss, software destruction, computers being robbed of parts, and other serious loss or damage. This security approach is critical in maintaining the integrity of a network environment, because physical security is needed to stop theft, and also protects all the data, hardware and devices that are used in a network environment. Without physical security the environment will not be able to operate in a safe secure manner.

Once, I was away at work and left my computer unattended and my little nephews went inside and loosened up the DDR by mistake. When I got home my computer was a mess and the side cover was off. I immediately used my security lock that came with the computer to lock the computer and then I password protected the OS so that they would not be able to operate it again. I learned my lesson leaving my computer unattended without physical security.

Logical Security

Logical security, deals with using software and another way of logical security to protect your computer system. This is the use of password authentication that is needed to log into certain terminals, like banks, online banks, and social sites. This makes the user prove their credentials in order to get into the software application or site. This security approach is god because, it makes the user prove their credentials in order to access terminal, software’s or sites. Many sites use this approach to secure their terminals, and also the users. When it comes to a network environment this would be good for the security of the users and the internal data that is used by the users.

I once used a login for my website when I first built it, and it kept a lot of users away from my site. This secured my database and also other users who accessed my site. This is a great security, and a way to make users prove they are the actual user trying to login.


References

Adams, T., & Wilborn, C. (n.d.). Retrieved May 4, 2015, from http://www.wisegeek.com/what-is-logical-security.htm

What is physical security? - Definition from WhatIs.com. (n.d.). Retrieved May 4, 2015, from http://searchsecurity.techtarget.com/definition/physical-security

APA formatting by BibMe.org.


Created on May 08, 2015 by Lionel Sharpe || professor James Leadbetter

Form (rr15a) Code:3301627005-GA

Form (rr15b) Code:3301627006-NJ

Form (rr15c) Code:3301627007-FL

Copyright © 2013 Bridgetonia Inc.|| All Rights Reserved