Impact and Issues of Physical Security Introduction Organizations are undertaking increasing efforts of reducing costs Leonel Campos World Baseball Classic Jersey , making better use of technology, increasing their efficiencies through integrating the devices of physical security for the process, monitoring, and access control into the IT infrastructure. As a result, it leads to a collision of two different aspects of technology each having a separate protection philosophy and management approach which makes the fusion not to be an easy thing. The differences in their implementation Jose Castillo World Baseball Classic Jersey , design, functionality, management and maintenance can lead to conflicts and may cause a breach to the security of the security systems, IT systems, or both (Greene Jose Alvarez World Baseball Classic Jersey , 2014). This essay presents an overview of issues and impact of physical security. The issues heights are ramifications and nature of convergent security risks on the IT infrastructure and physical security systems especially now that the Physical Security controls are converging with the IT infrastructure. There are also the issues of security risks and control solutions. Finally, the essay will talk about the impact of this concern to organizations. Issues of physical security Security controls for devices and systems were originally sufficient in tackling the security risk to the devices and systems. It was because they relied on physical and direct wiring with an installment in between components. Over time, there have been changes in these devices and systems, which form part of the overall trend of open architectures across networks enabled by TCPIP-. This new trend has resulted in new and serious security risks that were in the past not taken into consideration. For example, the close circuit camera has been misnamed since they are no longer 鈥渃losed鈥?from the networking perspective. Thus Jose Alvarado World Baseball Classic Jersey , when these special physical security devices and systems have a connection to the network of an organization they often pose various new and unanticipated security risks (Greene, 2014). The physical security control that was in the past adequate for physical security and other systems are still present but are no longer adequate. The devices and systems themselves end up becoming the potential target of various attacks launched remotely or within the local network with potential origin from any part of the world as the organizations connect to the Internet. Remote and local attackers can gain unauthorized access to these devices and systems and makes them function as the authorized users. Physical control is more than a measure. It comprises of layers for deterring and detecting potential intruders. The physical controls have to address obstacles, design, responses and monitoring of various areas. The physical security controls also address the environmental controls and equipment security (FIPS Special Publication, 2014). Physical security also required the safeguarding of websites in a way that minimizes risks to useful resources to destruction and theft. Attaining this goal means that an IT expert has to have concerns about room assignments Jose Altuve World Baseball Classic Jersey , building constructions, following regulations that address equipment use and placement, emergency strategies, power supplies, products and external relationships with agencies and contractors. One of the most productive methods by Crowell and Contos (2011) is to enter a building in the morning hours or the afternoon Jhoulys Chacin World Baseball Classic Jersey , when a large number of people are also entering the building (Crowell, Contos, and Dunkel,2011). However, the security risk to systems and devices that are meant to provide physical security and control of processes are growing in large numbers. It is because the systems are getting more connected to the company鈥檚 networks an organization which takes steps of upgrading its video surveillance system by converting them to have an IP address and better coverage through the support of database. Server infrastructure will have to look into other security matters. For example Jhondaniel Medina World Baseball Classic Jersey , the transferring of the image data from a camera and its later storage of video capture servers will require data to flow to the general service network. Despite data being coded in the proprietary algorithm as developed by the vendor of the system, there was the free availability of the system鈥檚 software on the vendor鈥檚 website