100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Essay

Unit 07 – Organisational Systems Security, Assignment 2: Keeping Systems Secure

Rating
-
Sold
1
Pages
9
Grade
A+
Uploaded on
05-03-2023
Written in
2022/2023

Ensuring the security of computer systems and, crucially, the information they need is vital. Organisations and customers require confidence in these matters and security is critical to the successful deployment and use of IT. In this unit learners will consider physical security of computer systems from simple locks to complex biometric checks, as well as software-based security using, for example, passwords, access rights and encryption.

Show more Read less









Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
March 5, 2023
Number of pages
9
Written in
2022/2023
Type
Essay
Professor(s)
Unknown
Grade
A+

Subjects

  • encryption techniques
  • disas

Content preview

Unit 07 – Organisational Systems Security

Assignment 2 – Keeping Systems Secure
Introduction
Physical security protects IT assets that are physically vulnerable to theft, damage, or
destruction by unauthorised people or by uncontrollable natural disasters. In this assignment,
we will examine Rockin Records' physical security procedures to guard against physical risks or
harm from a natural disaster, like a fire or a collapsed structure.


Physical security measures and software and network security
Physical security measures:
 Locks visitors passes
A digital visitor management strategy that issues each person with a unique identity badge that
cannot be copied can be used to secure a workplace security concern like Rockin Records.
These systems are made to use credentials that have already been given by an organisation to
verify a person's identification. Some places can only be accessed by those who have the
necessary credentials. Doors automatically lock and require valid credentials to unlock. Icons
indicate that you are a legitimate visitor. The security system at Rockin Records can simply
distinguish between desired and undesirable guests by quickly checking visitor information
stored in the database.
 Sing In/Out systems


The sign-in/out system is a logical outcome of visitors passing through locks. It is a physical
record of when employees enter and depart Rockin Records (for example, on a piece of paper
or by connecting the system to visitor passes). A typical sign-in/out template often includes a
date, name, time in, and time out. It enables managers to know who is in the building and for
how long. It's crucial to know who is always where. especially for the business's finances. A
sign-in/out system makes it clear who is present and who is absent.
 Biometrics
A security system for Rockin Records that is vulnerable to theft or has urgent needs for physical
security will benefit from using biometrics. These types of systems store characteristics that
remain constant over time, such as fingerprints, voices, retinal patterns, facial recognition, and
hand patterns.
Retinal scans

, The ideal option to increase Rockin Records' security may be to use the Biometric Iris
Identification System, a retinal biometric scanner. You'll find that these systems can efficiently
safeguard your businesses. Employees must position their open eye in front of a retinal
biometric device, which scans the individual's distinctive retinal pattern to determine whether
or not they are permitted admission.
Fingerprint
It is far more difficult to duplicate a fingerprint. Additionally, to confirm that the fingerprints are
those of a living person, the majority of contemporary biometric systems use vitality tests that
gauge factors like blood flow. Rockin Records access control can be made more secure by doing
fingerprint checks at each access point or just in high-security locations.
Voice recognition
Biometric voice recognition uses the human voice to uniquely identify biological traits to verify
a person, as opposed to passwords that require physical input. Rockin Records will have much
more security control if they use voice biometrics, which is quicker and more accurate than
other options.
 Other measures
Guards
Security can also be a type of physical security for Rockin Records because it can safeguard
server rooms and safes in addition to keeping the entire facility secure. Additionally, Rockin
Records has the option of using alarm systems that will cooperate with physical barriers,
mechanical devices, and security personnel to set off a response when these other forms of
security are breached. Such a system is made up of sensors, such as glass break sensors,
perimeter sensors, motion sensors, and touch sensors.
Cable shielding
Shielded cables are frequently used in security systems to guard against electromagnetic
interference, which is common in a place like Rockin Records where electronic equipment or
computer technology is widely used. Simply put, the protective device prevents the cable's
electromagnetic field from being influenced by any outside interference that could severely
lower its performance. It also prevents the cable from disseminating its own electrical
problems.


Software and network security:
 Encryption techniques eg public and private key
Data can be encrypted into secret codes to make it more difficult to read and decipher. All
information is encoded in a way that prevents reading without using a unique key or password,
£5.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
yar1

Get to know the seller

Seller avatar
yar1 College
View profile
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
2 year
Number of followers
1
Documents
5
Last sold
2 year ago
Bruh

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions