Physical Network Security Strategy
Physical security threats and vulnerabilities usually cause destruction computer infrastructure and systems hardware. One of the physical security threats is natural events (for instance, earthquakes, floods, hurricanes, and tornados). Natural calamities are capable of destroying computer systems and networks thus leading to the loss of important data (Kizza, 2019). Another security threat pertains to intentional acts of destruction. Examples of these acts include vandalism, theft and arson. Computer infrastructure and/ or hardware can be stolen or vandalized by people with ill motive. Unintentional acts that are destructive are physical security vulnerability as well. These acts include but are not limited to bad plumbing, spilled drinks and overloaded electrical outlets, which are capable of destroying computer infrastructure.
Physical Security Strategies
Various strategies will be used to protect the data, human resources, and the hardware from various vulnerabilities.
Data
• Use of signage-these will serve to set up boundaries for restricted areas, and identify forbidden and unauthorized material.
• Use of Intrusion Detection System-the aim is to prevent, identify and document intrusion. The IDS must identify an attempted unauthorized entry into a safeguarded environment.
Human resources
• Setting up a video surveillance camera. This will provide a good view of people who enter and leave the room and thus take note of suspicious activities and respond to them promptly.
• Use of smart cards-this will Help to keep unauthorized employees or attackers from getting access to rooms that are not allowed to enter.
Hardware
• Locking up the server room. This will ensure that only authorized persons get access to the room.
• Use of fire suppression systems-these will serve to detect fire during its initial stages via smoke, heat, and other warning signals, and thus avert the destruction of hardware
Protection of the Company’s Network Perimeter
One of the strategies of protecting the company’s network perimeter could be disabling unused portals. The UDPs and TCPs that are not totally necessary through the company’s firewall-particularly ports 135,137 and 139 can be disabled. This makes it possible to detect attacks before they happen. Another strategy entails enabling the Wired Equivalent Privacy (WEP). It is utilized in safeguarding wireless communication from eavesdropping as well as averting unauthorized access to a wireless network (Swaminatha, & Elden, 2013). Scrutinizing the website of the company is yet another strategy. This will greatly Help to identify anything a cyber-attacker could utilize to launch an attack-this encompasses information that could be utilized for purposes of social engineering and information that could help an actual break-in.
Protection of the Company’s Internal and External Network Traffic
For the protection of the company’s internal and external network traffic, one of the proposed approaches is bolstering access control measures and this can be attained by utilizing a strong password system that has a mixture of lower and upper case letters, special characters and numbers. It is also essential to reset default passwords often. Another approach is updating all software often. Using the newest software ensures that the company has a version that encompasses fixes for security threats and vulnerabilities. Employee training is vital as well. This allows the employees to comprehend network security and thus able to detect threats. In addition they gain knowledge on how to avert a network security breach. The network security tools that we could use include Virtual Private Network (VPN) and firewall.
Guidelines for the Organization’s Physical Security Manual
The following guidelines will be applicable in organization’s physical security manual:
• Employees to use access control cards-these are aimed at regulating access to certain rooms that contain valuable hardware and infrastructure.
• Employees to adhere to disaster recovery plan-the plan provides guidelines on ways to respond to natural calamities and emergencies that are caused by internal and external threats that have the capability of threatening data or personal safety.

References
Kizza, J. M. (2019). Guide to Computer Network Security. Springer Science & Business Media.
Swaminatha, T. M., & Elden, C. R. (2013). Wireless Security and Privacy: Best Practices and Design Techniques. Addison-Wesley Professional.

Published by
Essays
View all posts