Internal Organizational Security
The triad of CIA, i.e., confidentiality, integrity and availability, are the key principles that are essential for any security system. It deals with confidentiality, which makes sure that no unauthorized person can access the system, integrity, which keeps the track of data such that it does not change in any manner and that its authenticity is maintained, and availability, such that it is readily accessible to those it is intended to. The most endangered areas of a given system are the location of the server and the places from where it can be accessed, the virtually secured region of an organization like the workplace where all the data available to its employees are kept and the last is the mind of the employees which, however limited, can be crucial. It may happen that an employee having limited data at his/her disposal becomes a major security threat. The tally and threat of the attacks of this nature are increasing with every new security measure being placed into action. The attackers are deploying new methods to break into the institutional structure. Therefore, it is necessary to look into all the possible threats so that the attacker has very limited to no access to the internal physical infrastructure. The aim of the following paper is to help new and existing organizations in developing a physical security system which will look into the internal security from all angles.
KeywordsSurveillance Internal threat Code of conduct
- 1.Insider Threat, 2018 Report, Reported by CA TechnologiesGoogle Scholar
- 2.Govind v. State of Madhya Pradesh, AIR 1975 SC 1378Google Scholar
- 3.Report of the Group of Experts on Privacy, Planning Commission (Chaired by Justice A P Shah, Former Chief Justice, Delhi High Court)Google Scholar
- 4.EPIC, United States vs Hamilton. https://epic.org/amicus/hamilton/