Principles of Information Security
Principles of Information Security
5th Edition
ISBN: 9781285448367
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Course Technology
Expert Solution & Answer
Book Icon
Chapter 9, Problem 16RQ

Explanation of Solution

Physical security:

Physical security is giving protection to physical items or objects or even areas from an unauthorized access. That is, it gives protection physically to people, system, hardware and some resources that are connected with the management.

Heating, Ventilating, and Air Conditioning (HVAC):

Heating, ventilation as well as air conditioning system could have impact on operations of information systems and safety. So, they should be managed regularly and properly in order to avoid false impact.

Relationship between physical security and HVAC:

HVAC is considered as one of the physical security for many reasons. One of them is as follows:

  • Heating: Temperature inside the organization should be maintained in order to avoid physical damage of electronic equipment.
  • Ventilation: Channels should be built properly to prevent employees from gaining access to secured places that contains workstations or information...

Blurred answer
Students have asked these similar questions
The EPIC technique ensures the security of computer systems throughout the development phase via the use of active hardware metering. In their simplest form, what are these three methods, and how may they improve safety?
Subject: Software Engineering You are designing an intrusion detection system (IDS) to prevent theft at a bank occupying a 60-floor downtown Chicago building.  IDS interfaces with motion sensors located both inside and     outside of the building as its only means of sensing intrusion.  IDS must satisfy the following: Ensurethat a police officer arrives at the location of any intrusion quickly; Makeany intruder run away quickly; Ensure that a maintenance worker arrives at the location of any failed sensor quickly. Question Re-write each of these as an effective requirement
What's the difference between an active security scanner and an inactive one?
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning