Ensuring the security of computer systems and, crucially, the information they need is vital. Organisations and customers require confidence in these matters and security is critical to the successful deployment and use of IT. In this unit learners will consider physical security of computer system...
Assignment 2 – Keeping Systems Secure
Introduction
Physical security protects IT assets that are physically vulnerable to theft, damage, or
destruction by unauthorised people or by uncontrollable natural disasters. In this assignment,
we will examine Rockin Records' physical security procedures to guard against physical risks or
harm from a natural disaster, like a fire or a collapsed structure.
Physical security measures and software and network security
Physical security measures:
Locks visitors passes
A digital visitor management strategy that issues each person with a unique identity badge that
cannot be copied can be used to secure a workplace security concern like Rockin Records.
These systems are made to use credentials that have already been given by an organisation to
verify a person's identification. Some places can only be accessed by those who have the
necessary credentials. Doors automatically lock and require valid credentials to unlock. Icons
indicate that you are a legitimate visitor. The security system at Rockin Records can simply
distinguish between desired and undesirable guests by quickly checking visitor information
stored in the database.
Sing In/Out systems
The sign-in/out system is a logical outcome of visitors passing through locks. It is a physical
record of when employees enter and depart Rockin Records (for example, on a piece of paper
or by connecting the system to visitor passes). A typical sign-in/out template often includes a
date, name, time in, and time out. It enables managers to know who is in the building and for
how long. It's crucial to know who is always where. especially for the business's finances. A
sign-in/out system makes it clear who is present and who is absent.
Biometrics
A security system for Rockin Records that is vulnerable to theft or has urgent needs for physical
security will benefit from using biometrics. These types of systems store characteristics that
remain constant over time, such as fingerprints, voices, retinal patterns, facial recognition, and
hand patterns.
Retinal scans
, The ideal option to increase Rockin Records' security may be to use the Biometric Iris
Identification System, a retinal biometric scanner. You'll find that these systems can efficiently
safeguard your businesses. Employees must position their open eye in front of a retinal
biometric device, which scans the individual's distinctive retinal pattern to determine whether
or not they are permitted admission.
Fingerprint
It is far more difficult to duplicate a fingerprint. Additionally, to confirm that the fingerprints are
those of a living person, the majority of contemporary biometric systems use vitality tests that
gauge factors like blood flow. Rockin Records access control can be made more secure by doing
fingerprint checks at each access point or just in high-security locations.
Voice recognition
Biometric voice recognition uses the human voice to uniquely identify biological traits to verify
a person, as opposed to passwords that require physical input. Rockin Records will have much
more security control if they use voice biometrics, which is quicker and more accurate than
other options.
Other measures
Guards
Security can also be a type of physical security for Rockin Records because it can safeguard
server rooms and safes in addition to keeping the entire facility secure. Additionally, Rockin
Records has the option of using alarm systems that will cooperate with physical barriers,
mechanical devices, and security personnel to set off a response when these other forms of
security are breached. Such a system is made up of sensors, such as glass break sensors,
perimeter sensors, motion sensors, and touch sensors.
Cable shielding
Shielded cables are frequently used in security systems to guard against electromagnetic
interference, which is common in a place like Rockin Records where electronic equipment or
computer technology is widely used. Simply put, the protective device prevents the cable's
electromagnetic field from being influenced by any outside interference that could severely
lower its performance. It also prevents the cable from disseminating its own electrical
problems.
Software and network security:
Encryption techniques eg public and private key
Data can be encrypted into secret codes to make it more difficult to read and decipher. All
information is encoded in a way that prevents reading without using a unique key or password,
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller yar1. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £5.99. You're not tied to anything after your purchase.