Physical Security Control and Web Hosting Coursework

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

Physical security is essential to globalization and the continuity of information infrastructure. Online banking, e-mails, among others store private information that is critical to people’s survival. This information needs to be safeguarded to enhance customer confidence and mitigate online theft and hacking. This paper will discuss the physical security controls that most web hosting and business continuity providers offer to their customers as well as provide examples of such providers along with their products to potential customers. In addition, the paper will try to evaluate these control measures (Stewart & Chapple, 2008, p. 23.

Physical security

Physical security is a term used to describe the course of actions taken to deny unauthorized access to information, building, resource, facility, among others; and the controls that should be undertaken to design structures that would oppose any unreceptive acts. Therefore, physical security does not concern online materials only, but also the safety of data and the facilities they are stored in.

Physical security controls that most Web hosting and business continuity providers offer to customers

It is known that not a single physical security measure can achieve the objective of securing all information. They are usually applied in layers so as to provide effective protection to customers. Web hosting and business continuity providers offer a variety of physical security benefits to their customers, as well as potential customers. Among these include the use of security measures like proximity cards as well as biometric security methods such as voice, fingerprint, and face recognition, among others. In most cases, they employ the collocation method to improve service to customers. Their backup systems and facilities as well as layered protection systems employed to safeguard customer data enhance information security and customer confidence. Providers that employ collocation usually implement CCTV facilities to enhance physical security to customers, this benefits customers’ information security. Other benefits that web hosting providers offer to customers are continuous network scanning, which includes malware and spam scans. They also offer business verification to customers along with very high-security storage for customer data. In addition, they offer certificate displays on customers’ websites as well as support services (Stewart & Chapple, 2008, p. 23.

Research of two or three Web hosting and/or business continuity providers (via the Internet) to document the physical security benefits they offer to potential customers

All web hosting and business continuity providers offer various physical security benefits to customers. These benefits enable the customers to safeguard their data and information for the continuity of their businesses or activities. The following web hosting and business continuity providers offer benefits to customers as described below (Jarre, 2011, p. 1).

IBM Business Continuity

Business continuity providers aim to achieve customer satisfaction, improved efficiency, and risk reduction measures, among others, to ensure the sustainability of their competitiveness. In the IBM business continuity program, they offer such benefits as leveraging business processes given their experience in disaster recovery; this helps customers to fill the loopholes that may compromise physical security. IBM assists clients in providing structures for protecting critical data, this they do by helping the clients to identify and design plans to protect such critical data. IBM has disaster recovery services that are carefully designed with the objective of helping customers to respond constructively and quickly to disruptive occurrences. Moreover, they offer exceptional crisis management services to customers that enable the best recovery response. They also offer infrastructure repair as well as counseling to customers whenever necessary (Jarre, 2011, p. 1).

Ipage.com (Web Hosting)

ipage is one of the most highly ranked web hosting providers in the world. It is based in the United States and offer several benefits to customers. Such benefits include marketing design, support and security suites, among others. The Security suite entails provision for business verification, display of certificate on the customer’s site, data security, continuous scanning of the network as well as spam and malware scanning. These benefits enhance customer satisfaction as they help secure their data (iPage, 2011, p.1).

Importance of physical security

Data storage is very important in the modern age, this is because such data may be used for reference purposes or be linked to private and confidential information belonging to a customer or an entity. They may also contain information critical to the safety of an individual, community, organization, or a country. Physical security is therefore very critical in restricting unauthorized access to information and theft. Outsourcing such services has the advantage of giving us peace of mind concerning security of our information and diverting attention from our offices, which could be targeted by other people interested in the same information (Jarre, 2011, p. 1).

When internet access is secure, our data security is assured too. This is because such information contains PIN numbers, credit card numbers, online banking IDs, among others, which can be hacked by intruders. This helps in ensuring safety as we’ll as reducing the risk of exposure. Physical security controls are therefore inevitable in our lives; we need them to execute and safeguard information (Stewart & Chapple, 2008, p. 23).

Conclusion

Physical security control is important to every sector of life; this is because it safeguards the very needs of that sector. Customers require security to reduce exposure to risks. They also require physical security to safeguard their properties. This cannot happen when structures are not in place to provide it. Online transactions are always risky, and therefore potential customers need to evaluate physical security benefits offered by web hosting and business continuity providers before signing up (Jarre, 2011, p. 1).

Reference List

iPage: Web Hosting, Unix Hosting, E-mail, Web Design. (2011). iPage.com. Web.

Jarre, P. (2011). Business Continuity Solutions. SecurityStockWatch.com. Web.

Stewart, J. M., & Chapple, T. M. (Ed). (2008). CISSP: Certified Information Systems Security Professional Study Guide. Indianapolis, Indiana: Wiley Publishing, Inc.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, May 11). Physical Security Control and Web Hosting. https://ivypanda.com/essays/physical-security-control-and-web-hosting/

Work Cited

"Physical Security Control and Web Hosting." IvyPanda, 11 May 2022, ivypanda.com/essays/physical-security-control-and-web-hosting/.

References

IvyPanda. (2022) 'Physical Security Control and Web Hosting'. 11 May.

References

IvyPanda. 2022. "Physical Security Control and Web Hosting." May 11, 2022. https://ivypanda.com/essays/physical-security-control-and-web-hosting/.

1. IvyPanda. "Physical Security Control and Web Hosting." May 11, 2022. https://ivypanda.com/essays/physical-security-control-and-web-hosting/.


Bibliography


IvyPanda. "Physical Security Control and Web Hosting." May 11, 2022. https://ivypanda.com/essays/physical-security-control-and-web-hosting/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1