skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 119593 Find in a Library
Title: Security Gets Physical
Journal: Security  Volume:26  Issue:8  Dated:(August 1989)  Pages:48-50
Author(s): B Zalud
Date Published: 1989
Page Count: 3
Type: Issue Overview
Format: Article
Language: English
Country: United States of America
Annotation: Security measures for computer operations should include access controls and surveillance and should rest on an understanding of the similarities and differences between computer security and traditional physical protection.
Abstract: The security measures should apply just enough controls to cover threats while enforcing policies and procedures specific to the information asset. Physical security measures can cover people, situations, or both, but costs and tradeoffs are involved. The first step in developing security measures are to conduct a security survey, based on a division of the computer facility into compartments. Controls should be increased over the compartments with the most valuable contents. Specific measures include limiting the numbers of entrances and exits to computer centers, using a receptionist or security officer at public access entrances, issuing visitor passes, and checking materials carried in and out of the facility. It is also useful to locate the computer facility close to utility connections and within reach of fire protection. Low-rise computer buildings should be unmarked and located apart from the main building. Electronic access controls such as card keys and keypads are particularly useful. Security professionals should also be aware that protecting the information is even more valuable than protecting the equipment. They should try to balance production and the free flow of information with security and its inconvenience. Addresses of sources of further information.
Main Term(s): Computer facility security
Index Term(s): Computer crime prevention measures; Security management
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=119593

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.