The IT Law Wiki

This wiki's URL has been migrated to the primary domain.Read more here


The IT Law Wiki


Computer systems[]

Perimeter security refers to routers, firewalls, and intrusion detection systems implemented to tightly control access to networks from outside sources.[1]

Physical security[]

Perimeter security includes, but is not limited to fences, walls, fully enclosed buildings, entrance gates or doors, vehicle barriers, lighting, landscaping, surveillance systems, alarm systems, and guards. Physical security may also include site entry and exit logging as well as room or area logging possibly through a keycard access system.

Overview (Physical security)[]

"Perimeter security is one of the first lines of defense for protecting a facility and its internal systems. A breach of this perimeter can lead to the compromise of . . . systems."[2]


  1. Criminal Intelligence Glossary (Nov. 2004).
  2. Cybersecurity Procurement Language for Energy Delivery Systems, at 31.

See also[]