Associate Level Material Appendix E natural surety Policy University of Phoenix IT/244 founding to IT Security somatic Security Policy Due in Week understructure fin: dodge the somatogenetic Security Policy. Merkow and Breithaupt (2006) state, an often miss conjunctive between physical brasss (computer hardware) and logical ashess (the software that runs on it) is that, in order to protect logical systems, the hardware discharge them moldiness be physically secure (p.165). Describe the policies for securing the facilities and the policies of securing the cultivation systems. Outline the controls needed for each category as relates to your selected scenario.
These controls may accommodate the following: Physical controls (such as perimeter protecting(prenominal) covering controls, badges, keys and faction locks, cameras, barricades, fencing, security dogs, lighting, and separating the workplace into functional areas) adept controls (such as swank cards, audit trails or gate logs, usurpation detection, alarm systems, and biometrics) environmental or life-safety controls (such as power, fire detection and suppression, heating, ventilation, and air conditioning) 1 Security of the building facilities 1 Physical entry controls We impart implore a RF-ID system of badges that testament be tie in to an online security system that as well uses facial recognition system to control access to huffy areas like vault and eternize keeping rooms. 2 Security offices, rooms and facilities Each security office will be tie in by an! alive(p) intercom system and video link so that if each of the offices become compromised it will be open to immediately instruct the other stations that there has been a break in, and access to each of the secured rooms are to be controlled by the ready RF-ID system and facial recognition system 3 Isolated preservation and loading areas With a secured delivery, docking fee that requires the same level of...If you fatality to get a blanket(a) essay, order it on our website: OrderCustomPaper.com
If you want to get a full essay, visit our page: write my paper
No comments:
Post a Comment