• to determine the area they are allowed


•       Physicalsecurity locks are crucial for any IT system. This is because although theactual data on a computer is somewhat secure it can still breached easily ifsomeone can have access to the actual hardware. The idea of having a lockeddoor means that people with authorised access the room.•       Ifsomeone without authorised access can get in it means that the door would haveto be broken down.

This causes someone to hear it happening and creates moreattention meaning that someone would come whether they have authorised accessor not.•       Visitorpasses are a small chip that is placed inside something, for example a visitorpass card. It contains a chip inside which can be coded for a specific timeframe or for a specific area.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

So when a visitor does come in, they can tell thereceptionist who they are visiting – this helps to determine the area they areallowed in. additionally they can ask who they are visiting and thereceptionist can gauge the length they will be there for. •       Thisis important for security as the people with these specific cards only  have access to the areas and resources theyneed.

It keeps unauthorised people out. These cards can help to unlock doorswhich are secured by a magnetic lock. •       Visitorpasses are a small chip that is placed inside something, for example a visitorpass card. It contains a chip inside which can be coded for a specific timeframe or for a specific area. So when a visitor does come in, they can tell thereceptionist who they are visiting – this helps to determine the area they areallowed in. additionally they can ask who they are visiting and thereceptionist can gauge the length they will be there for. •       Thisis important for security as the people with these specific cards only  have access to the areas and resources theyneed. It keeps unauthorised people out.

These cards can help to unlock doorswhich are secured by a magnetic lock. •       Retinalscans can be used for identification purposes they are widely used in airportsto identify people going through the border. This similar system can be adoptedin the workplace. •       Thisis very secure as only the person signing in and out can verify it. Also, ifthe company decide to adopt an iris scan instead of a normal retinal scan thenthe user can wear their glasses during the scan. •       Fingerprintscanning is another type of biometric.

It allows for the scanning of yourfingerprint for identification. It scans the ridges of your fingerprint andrecords it with your details so it can be matched up later.•       Fingerprintsare a good security measure as they can be used to sign in and out. Also,fingerprints can now also be used on locks so they can be unlocked with just afingerprint only allowing authorised personnel into a room.

•       Thistype of biometric, voice recognition is when a device records your voice as youspeak. This recording is then matched to a previous recording to make sure thatthe voices are the same. This is hard to replicate however sometimes for lessadvanced voice recognition systems a voice recording might do.

•       Thishelps to keep your computers in a room secure as the people who haveauthorisation can only get in. voice recognition devices can come in the formof door locks too however this hardware is slowly coming into the market. Thisway allows for certain access to only the people who need access. •       Asecurity guard is simply someone who stands at the door looking after it andcontrolling who is going in and out for what reasons.

They are trained humanswho know how to deal with situations fast and who know how to deal with people.•       Thiscan help keep a computer network secure as you can hire a guard to stand aroundthe entrance to the room. This now means that the security guard knows who isin the room at a given time. They can also ask the person entering for theiridentification and allow only authorised people. •       Ashielded cable is a of one or more insulated conductors.

The layers maybe ofcopper strands wrapped around. The cable is usually covered by a plasticjacket, this is for better insulation and protection to skin. The shield whichis played by the strands of copper has the task fo acting as a faraday cage andreduces noise affecting the signals.•       Thisis important for a business to use as there is less risk of their datatransfers being interrupted due to the noise and electromagnetic radiation. Itmeans that there can be a smooth transfer of data at quicker speeds and alsomeans that the transmission is less likely to be affected. •       Thefirewall protects the computer by controlling the network traffic.

Firewallshelp to remove and reduce hacker access by protecting you from worms, andviruses that could be trying to exploit the computer system. •       Theway in which the firewall protects the computer system is that it controls whatis being downloaded from the internet. This is important as the employeeswouldn’t know what’s actually being downloaded from what they see. the firewallis a juristic measure which allows for optimum security over a system andnetwork. •       Avirus is a program that has has been coded to cause harm to your computer. Avirus scanning software simply scans the computer for these harmful programs sothat they can be actioned.

Examples of virus checking software would beprograms like AVG and McAfee. •       Thishelps to keep the system secure as viruses that can cause damage and data losscan be prevented and removed through this software. Also it would mean that thevirus can’t be spread around the system. For example it can be spread through aserver network if it is removed. The virus checking software will also tell youwhat type of virus it is. •       Anintruder detection systems monitors the network and system through the use of asoftware/application. It detects any malicious activity and it can reporteddirectly to an admin. An example of an IDS is an anti-virus software.

•       Theuse of an intruder detection system can ensure the safety and security of asystem as it allows for detection of malicious files that intend to do harm. Itmeans that when someone is aware, for example the admin, they can easily removethe file reduce and the way in which the file can exploit the system. •       Anintruder detection systems monitors the network and system through the use of asoftware/application. It detects any malicious activity and it can reporteddirectly to an admin. An example of an IDS is an anti-virus software. •       Theuse of an intruder detection system can ensure the safety and security of asystem as it allows for detection of malicious files that intend to do harm. Itmeans that when someone is aware, for example the admin, they can easily removethe file reduce and the way in which the file can exploit the system.

•       Thismeans that the amount and the capability that someone has on a piece of data.For example, a piece of data may be read only to the employees but themanagement team can edit the document. Also, it means that users can onlyaccess certain information that is relevant to them.

The highest level ofaccess to data that one can have is access to sensitive information. The lowestlevel of data access is access to certain files. •       Thishelps to secure data and the computer system as only the people with theauthority are able to access the data.

This also means that it is less likelythat important and highly sensitive information will be leaked and exploited. •       Thismeans that the amount and the capability that someone has on a piece of data.For example, a piece of data may be read only to the employees but themanagement team can edit the document.

Also, it means that users can onlyaccess certain information that is relevant to them. The highest level ofaccess to data that one can have is access to sensitive information. The lowestlevel of data access is access to certain files.

•       Thishelps to secure data and the computer system as only the people with theauthority are able to access the data. This also means that it is less likelythat important and highly sensitive information will be leaked and exploited. •       Anaudit log is a record of everything that happens on a network. For example itcan record when a file on a system was opened the time a user logged in andalso the things they changed it could even record the keystroke that the userused. The whole point of an audit log is that it can record when and whathappened.

Audit logs come in a range of forms but the one used for humans is aASCII file as it is readable and understandable due to the character type. •       Thishelps to make a system secure as it allows for everything to be tracked andrecorded, also it means that if anything does happen the admin knows what itwas and when it happened. Additionally it means that the admin can see ifsomething goes wrong and it is easy for them to trace it down. •       Adiskless network is where the actual computer doesn’t have a hard drive and allthe files are saved externally on a server somewhere else. This means that nothing is saved on the computerdirectly.

This also allows for quick updates as they can be done from theserver as that’s where everything is saved. •        this helps to make a system secure as it meansthat there is only one place for data on the system to be accessed. This alsomeans that any theft or damage to an individual computer will not have anyeffect on the data that is saved. •       Whena computer wishes to establish a connection with another computer or networkthey have to exchange information, this is a protocol.

It gives instructionsand rules to connect. When they connect they create a handshake to start datatransfer and connection. •       Thisensures security on a system as it means that only computers and devices thatare connecting are authorised first.

It also means that rules are set out forwhat each device connecting can do.   •       Public and private key aretechniques for encryption of data. It consists of 2 crypto keys. The public keyis useable and accessible to people on a directory. The private key is uniqueto the owner.

The private key must stay private and confidential for the owner.•       The keys for both public and privatekeys are both mathematically created. When the keys are decrypted by itsmatching key. This type of encryption allows for strong privacy andconfidentiality for data it ensures it creates a digital signature for data.  •       Avirtual private network allows for you to browse the web anonymously. It worksby creating a private network from a public connection. It masks your IPaddress so that it is hidden from the sites. •       Thereason why a VPN is useful is because it stops people from accessing what youare browsing.

This means people who are connected on the same connection can’tsee what you’re doing. It also means that your web browsing is kept anonymous. •       Callback is an encryption technique which allows for the confirmation of someone.

On a computer system dial up systems admins are able to tap into a network andsend a protocol that the computer system will then send back forauthentication. Call back follows the CHAP protocol, which stands for ChallengeHandshake Authentication Protocol.•       Thisis used for security purposes as you  canauthenticate systems on a network using this system, also if there are anysuspicions then you can attend to this straight away as it could be a majorsecurity problem.•       Abackup system is a arrangement that is meant for the sole purpose of takingbackups.

This means that it will save everything in another location creatinganother copy. •       Thereare two types of back up systems; these are differential and incremental. •       Adifferential back up system is better as it performs a full back up from thefiles on the system.•       Anincremental back up system only backs up the files that have been recently beenmodified or updated.

Pro’s•       Createsa copy of the data in a second location.•       Serviceslike data centres allow for data to be stored far from a site. •       Differentialback up systems allow for a better back up as everything is getting back up. Con’s•       Bigdamage could also damage the backup if the storage location is geographicallynearby.•       Incrementalback up systems only allows for recently modified data, this doesn’t help asnot all the data is being back up. •       Thisis a recovery that is to be avoided. This is recovery system that you would useif you weren’t prepared for if you did have a disaster. This recovery typemeans that you would replace the computer system physically.

Many companieshave a contract with a company who allow them to virtually use their computersystem on a system failure. •       Theadvantage of this is that you will get new computer systems. However thedisadvantage is that you will spend a lot of money coming back from this, asyou need to replace all the systems, also, the data that was originally storedis either gone completely or is backed up somewhere but is not up to date andnot valid.•       Thisis a recovery that is to be avoided.

This is recovery system that you would useif you weren’t prepared for if you did have a disaster. This recovery typemeans that you would replace the computer system physically. Many companieshave a contract with a company who allow them to virtually use their computersystem on a system failure. •       Theadvantage of this is that you will get new computer systems. However thedisadvantage is that you will spend a lot of money coming back from this, asyou need to replace all the systems, also, the data that was originally storedis either gone completely or is backed up somewhere but is not up to date andnot valid.•       Tier0 – this is where the losses all saved information, documentation and allbackups.

This could be a long recovery or cant be recovered from at all. •       Tier1 – this is where all backups made are moved to a external location, called anoffsite storage facility these backups stored here are secure. •       Tier2 – this is when a company decides to make backups regularly, this is both withtheir own framework and a external storage facility.

•       Tier3 – this is where backups are made through electronically vaulted data. Time onrecovery of this tier is about 24 hours. •       Tier4 – this is for businesses who need quick recovery from a disaster and beginsto implement more disk based solutions.

•       Tier5 – this is where data on both before the disaster and the backups arepractically identical, it allows for barely any data loss. •       Tier6 – this is for companies who need to recover rapidly, they need their data andapplications installed back onto systems without any data loss. •       Tier7 – this is where the recovery process is done automatically and makes it muchfaster than the manual procedures like the tiers above. •       Adisaster recovery policy is the process of how to recover and protect the abusiness’ IT framework if in the event of a disaster. Businesses should testtheir policy regularly to make sure it is followed and it works. •       Theadvantage of this is so that the people who are recovering the data know whatexactly what they need to do to recover data with little to no data loss. •       Thedisadvantage of this is that the policy can’t be saved digitally as the computeror network it damaged the policy wont be able to be accessed.

 

x

Hi!
I'm William!

Would you like to get a custom essay? How about receiving a customized one?

Check it out