Computer Network Physical Security
the use of fences, security guards), reduction of damage through the use of delay mechanisms (e.g. physical locks, barriers, security personnel), crime or disruption detection gadget (e.g. smoke detectors, CCTV), incident assessment (e.g. response to detected incidents and determination of level of damage) and finally the response procedures (e.g. the emergency response process in place, the fire suppression mechanism in the advent of fire).
Dogs are always useful in repelling thieves from accessing the urgent care center.
Most organizations tend to focus on more technical aspects of security countermeasures. All the network intrusion detection systems and firewalls are completely useless if someone can get to the equipment and steal data or the device.
Loch, K.D., Carr, H.H., & Warkentin, M.E. (2002). Threats to information systems: Today’s reality, yesterday’s understanding. MIS Quarterly, 16(2), 173-186. Retrieved from Business Source Premier Database.
Perrig, A., Stankovic, J., & Wagner, D. (2004). Security in wireless sensor networks. Communication of the ACM, 47(6), 53-57. Retrieved from Business Source Premier Database.
Renaud, K., & De Angeli, A. (2009). Visual passwords: Cure-all or snake-oil? Communications of the ACM, 52(12), 135-140. Retrieved from Business Source Premier Database.
Stajano, F., & Wilson, P. (2011). Understanding scam victims: Seven principles for systems security. Communications of the ACM, 54(3), 70-75. Retrieved from Business Source Premier Database.
Walters, L.M. (2007). A draft of an information systems security and control course. Journal of Information Systems, 21(1), 123-148. Retrieved from MasterFILE Premier Database.