Internal Organizational Security

  • Rehan AzizEmail author
  • Sohang Sengupta
  • Avijit Bose
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1065)


The triad of CIA, i.e., confidentiality, integrity and availability, are the key principles that are essential for any security system. It deals with confidentiality, which makes sure that no unauthorized person can access the system, integrity, which keeps the track of data such that it does not change in any manner and that its authenticity is maintained, and availability, such that it is readily accessible to those it is intended to. The most endangered areas of a given system are the location of the server and the places from where it can be accessed, the virtually secured region of an organization like the workplace where all the data available to its employees are kept and the last is the mind of the employees which, however limited, can be crucial. It may happen that an employee having limited data at his/her disposal becomes a major security threat. The tally and threat of the attacks of this nature are increasing with every new security measure being placed into action. The attackers are deploying new methods to break into the institutional structure. Therefore, it is necessary to look into all the possible threats so that the attacker has very limited to no access to the internal physical infrastructure. The aim of the following paper is to help new and existing organizations in developing a physical security system which will look into the internal security from all angles.


Surveillance Internal threat Code of conduct 


Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Institute of Engineering and ManagementKolkataIndia

Personalised recommendations