top of page

What is Logical Security?

Image by Caspian Dahlström

Logical Security

Security measures that are enforced by logical* (non-physical**) means.


For example:

  1. Firewall that drops packets if the destination port is a certain number

  2. Computer login credential check that employs a strong password policy

  3. Email server that employs software algorithm to automatically delete suspicious or malicious email messages

  4. Information are exchanged over a USB drive that is protected by the latest encryption standard.

So how does logical security relate to cyber security, network security, IT security, and information security?

Find out more.

*Logical Security (義理保安)

**Physical Security (實體保安)

Cyber Security

Security measures (technical & administrative) that mitigate risks posed by threats coming from cyber space.


For example:

  1. Employ stateful firewalls to mitigate denial of service attack of web servers

  2. Training employees to mitigate the risk of ransomware delivered by phishing emails

  3. Employ intrusion detection system, create metrics, and conduct reviews for future actions


This can be considered a subset of Network Security

Image by Shannon Potter
Image by Aarón Blanco Tejedor

Network Security

Security measures (technical, administrative & physical) that protect network infrastructure from both external and internal devices and users.

For example:

  1. Prevent unauthorised access to network port using physical means

  2. Isolate network for finer access control by segmentation using VLAN

  3. Close and filter all un-used network ports by default


This can be considered a subset of IT Security

IT Security

Security measures that protect digital information asset, application processes, and computing hardwares from both physical and logical attacks.

For example:

  1. Patch management to ensure all endpoints are patched within 24 hours

  2. Password policy to creating strong passwords

  3. Secure server racks’ and server rooms’ physical access

  4. Storage encryption and backup procedures


This can be considered a subset of Information Security

Image by Héctor Martínez
Image by Giulia May
Image by Giulia May

Information Security

Security programme that protect information asset in all forms from all identified threats using all available security disciplines.

For example:

  1. Legal protections (e.g. patent, NDAs, law enforcement liaison)

  2. Physical Protection Systems (e.g. access control, intrusion detection, video)

  3. IT Security (e.g. firewalls, logins credentials, email sandboxing)

  4. Investigations (e.g. incident report training, forensics, record keeping)

  5. Insider threat program, and much more.


All general security principles apply: Layered, Balance, and Robustness

The Future

Holistic approach is the future.


Siloed approach where different security disciplines work independently will be history.​ Your threat sources know no boundary and will attack from all angles. Holistic security management is your best defence.

When one knows only a hammer, everything looks like a nail (derived from Abraham Maslow).

All Hands In
bottom of page