The IT Law Wiki
Register
No edit summary
m (Undo revision 185951 by 172.4.46.145 (talk))
Tag: sourceedit
 
(2 intermediate revisions by 2 users not shown)
Line 15: Line 15:
 
== References ==
 
== References ==
 
<references />
 
<references />
  +
  +
== See also ==
  +
  +
* [[Perimeter]]
  +
* [[Perimeter-based security]]
  +
* [[Perimeter firewall]]
  +
* [[Perimeter security mechanisms]]
  +
* [[Perimeterization]]
 
[[Category:Security]]
 
[[Category:Security]]
 
[[Category:Definition]]
 
[[Category:Definition]]

Latest revision as of 00:25, 3 March 2016

Definitions[]

Computer systems[]

Perimeter security refers to routers, firewalls, and intrusion detection systems implemented to tightly control access to networks from outside sources.[1]

Physical security[]

Perimeter security includes, but is not limited to fences, walls, fully enclosed buildings, entrance gates or doors, vehicle barriers, lighting, landscaping, surveillance systems, alarm systems, and guards. Physical security may also include site entry and exit logging as well as room or area logging possibly through a keycard access system.

Overview (Physical security)[]

"Perimeter security is one of the first lines of defense for protecting a facility and its internal systems. A breach of this perimeter can lead to the compromise of . . . systems."[2]

References[]

  1. Criminal Intelligence Glossary (Nov. 2004).
  2. Cybersecurity Procurement Language for Energy Delivery Systems, at 31.

See also[]