You are on page 1of 2

QUINASO, GWYNNETH I.

BSIT-3

SECURITY LEVELS

1. Physical Security

- Importance: Physical security ensures that physical assets, such as servers, data centers, and
hardware devices, are protected from unauthorized access, theft, or damage.

- How it works: Physical security measures include access controls, surveillance systems, and
environmental controls to safeguard physical assets.

- Example: Access control systems such as biometric scanners or key card access restrict entry
to authorized personnel only. Surveillance cameras monitor areas to detect any suspicious
activities. Environmental controls such as temperature and humidity monitoring systems ensure
that sensitive equipment remains operational within optimal conditions.

2. Human Security

- Importance: Human security involves educating and training individuals within an organization
to follow security protocols, recognize threats, and respond appropriately to security incidents.

- How it works: Human security measures include security awareness training, enforcing strong
password policies, and implementing clear incident response procedures.

- Example: Regular security awareness training sessions educate employees about phishing
scams, social engineering tactics, and other common cyber threats. Enforcing policies such as
mandatory password changes and multi-factor authentication helps mitigate the risk of
unauthorized access. Incident response plans outline steps to take in the event of a security
breach, ensuring a coordinated and effective response.

3. Network Security

- Importance: Network security protects the confidentiality, integrity, and availability of data as it
is transmitted across networks.

- How it works: Network security measures include firewalls, encryption, intrusion detection
systems (IDS), and virtual private networks (VPNs) to secure network traffic and detect/respond to
malicious activities.

- Example: Firewalls monitor, and control incoming and outgoing network traffic based on
predetermined security rules, preventing unauthorized access and blocking malicious activity.
Encryption protocols such as SSL/TLS encrypt data in transit, ensuring that it remains secure even
if intercepted. IDS monitors network traffic for suspicious patterns or known attack signatures,
generating alerts or taking automated actions to mitigate threats.
QUINASO, GWYNNETH I.
BSIT-3

4. Operating System Security

- Importance: Operating system security involves securing the underlying software that manages
hardware resources and provides services to applications.

- How it works: Operating system security measures include regular patching and updates, user
access controls, and implementing security-enhanced configurations.

- Example: Regularly applying security patches and updates to the operating system addresses
known vulnerabilities and reduces the risk of exploitation by attackers. Implementing least privilege
principles ensures that users have only the permissions necessary to perform their tasks,
minimizing the potential impact of compromised accounts. Configuring access controls such as
file permissions restricts unauthorized users from accessing sensitive data or system files.

Overall, each of these security levels plays a critical role in protecting information assets from
various threats, and they work together synergistically to create a comprehensive security posture.

You might also like