Abstract
This chapter will discuss:
-
How to decide on where to locate your organization’s IT equipment,
-
Some suggested ways employee identification may be accomplished to distinguish among various levels of access,
-
How to handle an outgoing employee’s physical access while they are transitioning out of the organization,
-
How to handle visitors to the organization’s facilities, and
-
How the balanced scorecard for physical security could look at a high level.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2007). Physical Security. In: Network Security Policies and Procedures. Advances in Information Security, vol 32. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-47955-2_9
Download citation
DOI: https://doi.org/10.1007/978-0-387-47955-2_9
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-30937-8
Online ISBN: 978-0-387-47955-2
eBook Packages: Computer ScienceComputer Science (R0)
