The IT Law Wiki
Edit Page
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 1: Line 1:
== Definitions ==
+
== Computer systems ==
 
=== Computer systems ===
 
   
 
'''Perimeter security''' refers to [[router]]s, [[firewall]]s, and [[intrusion detection system]]s implemented to tightly control [[access]] to [[network]]s from outside sources.<ref>Criminal Intelligence Glossary (Nov. 2004).</ref>
 
'''Perimeter security''' refers to [[router]]s, [[firewall]]s, and [[intrusion detection system]]s implemented to tightly control [[access]] to [[network]]s from outside sources.<ref>Criminal Intelligence Glossary (Nov. 2004).</ref>
   
=== Physical security ===
+
== Physical security ==
   
 
'''Perimeter security''' includes, but is not limited to fences, walls, fully enclosed buildings, entrance gates or doors, vehicle barriers, lighting, landscaping, [[surveillance]] systems, alarm systems, and guards. Physical security may also include site entry and exit logging as well as room or area logging possibly through a [[keycard]] [[access]] [[system]].
 
'''Perimeter security''' includes, but is not limited to fences, walls, fully enclosed buildings, entrance gates or doors, vehicle barriers, lighting, landscaping, [[surveillance]] systems, alarm systems, and guards. Physical security may also include site entry and exit logging as well as room or area logging possibly through a [[keycard]] [[access]] [[system]].
 
== Overview (Physical security) ==
 
 
"Perimeter security is one of the first lines of defense for protecting a facility and its internal systems. A breach of this perimeter can lead to the [[compromise]] of . . . [[system]]s."<ref>[[Cybersecurity Procurement Language for Energy Delivery Systems]], at 31.</ref>
 
   
 
== References ==
 
== References ==
Please note that all contributions to the The IT Law Wiki are considered to be released under the CC-BY-SA
Cancel Editing help (opens in new window)