100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Essay

Unit 07 – Organisational Systems Security, Assignment 2: Keeping Systems Secure

Beoordeling
-
Verkocht
1
Pagina's
9
Cijfer
A+
Geüpload op
05-03-2023
Geschreven in
2022/2023

Ensuring the security of computer systems and, crucially, the information they need is vital. Organisations and customers require confidence in these matters and security is critical to the successful deployment and use of IT. In this unit learners will consider physical security of computer systems from simple locks to complex biometric checks, as well as software-based security using, for example, passwords, access rights and encryption.

Meer zien Lees minder
Instelling
Vak









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Study Level
Publisher
Subject
Course

Documentinformatie

Geüpload op
5 maart 2023
Aantal pagina's
9
Geschreven in
2022/2023
Type
Essay
Docent(en)
Onbekend
Cijfer
A+

Onderwerpen

Voorbeeld van de inhoud

Unit 07 – Organisational Systems Security

Assignment 2 – Keeping Systems Secure
Introduction
Physical security protects IT assets that are physically vulnerable to theft, damage, or
destruction by unauthorised people or by uncontrollable natural disasters. In this assignment,
we will examine Rockin Records' physical security procedures to guard against physical risks or
harm from a natural disaster, like a fire or a collapsed structure.


Physical security measures and software and network security
Physical security measures:
 Locks visitors passes
A digital visitor management strategy that issues each person with a unique identity badge that
cannot be copied can be used to secure a workplace security concern like Rockin Records.
These systems are made to use credentials that have already been given by an organisation to
verify a person's identification. Some places can only be accessed by those who have the
necessary credentials. Doors automatically lock and require valid credentials to unlock. Icons
indicate that you are a legitimate visitor. The security system at Rockin Records can simply
distinguish between desired and undesirable guests by quickly checking visitor information
stored in the database.
 Sing In/Out systems


The sign-in/out system is a logical outcome of visitors passing through locks. It is a physical
record of when employees enter and depart Rockin Records (for example, on a piece of paper
or by connecting the system to visitor passes). A typical sign-in/out template often includes a
date, name, time in, and time out. It enables managers to know who is in the building and for
how long. It's crucial to know who is always where. especially for the business's finances. A
sign-in/out system makes it clear who is present and who is absent.
 Biometrics
A security system for Rockin Records that is vulnerable to theft or has urgent needs for physical
security will benefit from using biometrics. These types of systems store characteristics that
remain constant over time, such as fingerprints, voices, retinal patterns, facial recognition, and
hand patterns.
Retinal scans

, The ideal option to increase Rockin Records' security may be to use the Biometric Iris
Identification System, a retinal biometric scanner. You'll find that these systems can efficiently
safeguard your businesses. Employees must position their open eye in front of a retinal
biometric device, which scans the individual's distinctive retinal pattern to determine whether
or not they are permitted admission.
Fingerprint
It is far more difficult to duplicate a fingerprint. Additionally, to confirm that the fingerprints are
those of a living person, the majority of contemporary biometric systems use vitality tests that
gauge factors like blood flow. Rockin Records access control can be made more secure by doing
fingerprint checks at each access point or just in high-security locations.
Voice recognition
Biometric voice recognition uses the human voice to uniquely identify biological traits to verify
a person, as opposed to passwords that require physical input. Rockin Records will have much
more security control if they use voice biometrics, which is quicker and more accurate than
other options.
 Other measures
Guards
Security can also be a type of physical security for Rockin Records because it can safeguard
server rooms and safes in addition to keeping the entire facility secure. Additionally, Rockin
Records has the option of using alarm systems that will cooperate with physical barriers,
mechanical devices, and security personnel to set off a response when these other forms of
security are breached. Such a system is made up of sensors, such as glass break sensors,
perimeter sensors, motion sensors, and touch sensors.
Cable shielding
Shielded cables are frequently used in security systems to guard against electromagnetic
interference, which is common in a place like Rockin Records where electronic equipment or
computer technology is widely used. Simply put, the protective device prevents the cable's
electromagnetic field from being influenced by any outside interference that could severely
lower its performance. It also prevents the cable from disseminating its own electrical
problems.


Software and network security:
 Encryption techniques eg public and private key
Data can be encrypted into secret codes to make it more difficult to read and decipher. All
information is encoded in a way that prevents reading without using a unique key or password,
€7,04
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
yar1

Maak kennis met de verkoper

Seller avatar
yar1 College
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1
Lid sinds
2 jaar
Aantal volgers
1
Documenten
5
Laatst verkocht
2 jaar geleden
Bruh

0,0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen