Preview

Access Control Simulation

Good Essays
Open Document
Open Document
698 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Access Control Simulation
Ground Level
Upon entry the door was locked and a key card was required for this single point of entry. There were security cameras outside of the building. There was a dumpster outside that was not secured, which could allow anyone access to sensitive information. Locking the dumpster or placing it in a secured location would mitigate this risk. The receptionist did not ask me to verify my identity. The receptionist should be required to verify the identity of everyone entering building to prevent a person from entering the building that isn’t authorized. There was a security room with security personnel viewing the monitors. Office 1-1 had a post it note taped to computer monitor with names that could be passwords. Increased password security should be implemented to reduce the risk of someone hacking into a system. Both office 1-1 and 1-2 had fingerprint scanners, which increases access control. In office 1-2 there was an unattended paper shredder, which should be secured due to sensitive information. In the hallway there was a security camera and a utility box but the wire cabinet was not locked. As such, anyone can access the hardware inside. A lock should be installed to prevent unauthorized access to the hardware. Also in the hallway there was an Ethernet jack which allowed access to the internet. Controls should be put in place to require security access to logon to the network.

Floor 2
Cubicle 2-1 had a pre-approved offsite equipment request posted This should be secured to prevent an unauthorized person from stealing equipment. Both cubicle 2-1 and 2-2 had fingerprint scanners. Cubicle 2-3 had a locked file drawer and the computer was password protected as it locked after four attempts. Cubicle 2-4 did have a UPS but there was a flashdrive on the desk as well as login information on a post it note. Flashdrives should be encrypted and increased controls surrounding password/login information should be enforced. Password/login

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lock the servers into their own room with keycard or fingerprint access only. Only authorized IT staff shall have access. Management, vendors and all other authorized guest shall be escorted by an authorized IT staff member. Video surveillance should be maintained and monitored at all access…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Each workstation will be set up to automatically lock the screen after 3 minutes of no use. Employees will be trained on how to keep their workstations and network credentials secure. Under no circumstances are employees to use flash drives or any type of external…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The security analyst of the accounting firm suggested that it's a good practice to have a dedicated room for server’s equipment to avoid any damages. This could be quite costly for the small company, however it would make a good investment in order to secure the company's network. The servers would be positioned on a server rack in the designated room with network devices such as modems, switches, routers, firewalls, and the Intrusion Detection System. This room should have restricted access and only authorized personnel must have access to it, by using sophisticated keycard systems and even having additional security procedures such as biometrical readers etc. It was also proposed to get rid of Motorola SB3100 and Net Gear MR814 to increase…

    • 940 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    MGT2 Task3

    • 5037 Words
    • 21 Pages

    Identify and install the latest security software on all telecommuters' PCs and enforce strict rules for information access including password policy management.…

    • 5037 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    In the workstation domain, we need to make sure that all workstations have antivirus and malware protection installed on them. Laptops and portable devices are very vulnerable to theft…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Proper identification and two key turners to be granted access to Data Centers and wiring closets with 24/7 CCTV monitoring.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Scenario 1: (DAC) Discretionary Access Control. Being that the business is small and not in need of higher security measures, it would be the easiest to maintain and monitor for a small business.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 27 M3 and D1

    • 857 Words
    • 4 Pages

    Laptops Door-By moving the laptops away at the back of the office will make the situation better because it is less likely to be a hazard to employees, as it will be away at the back. The laptops lock could also get fixed which means that the laptops will not have to be moved, this will resolve the situation as the doors will not be a hazard. The manager could also remove the laptops from the workplace, this would be the best solution as the passageway for the employees will become clearer.…

    • 857 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Bat1 Task 1

    • 1280 Words
    • 6 Pages

    IT staff can diminish security breaches by developing effective ways to teach clinical staff about securing their workstations when not in use. Mandatory in-service and power point presentations would be an effective way to do this. The importance of workstation security, not accessing another employee's computer while in use and not using another employee's password should be discussed. Along with how doing so would be in violation of company policy and the HIPAA Privacy Act. Disciplinary action should also be discussed.…

    • 1280 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Cu2479

    • 439 Words
    • 2 Pages

    2.1 Information storage systems should/could be locked filling cabinets, locked filling room and password protected file/computer.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    1. Everyone has the right to respect for his private and family life, his home and his correspondence.…

    • 559 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Diploma Level 3 Hsc 38

    • 299 Words
    • 2 Pages

    Personal data processed for any purpose shall not be kept for longer then is necessary.…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Access Control

    • 648 Words
    • 3 Pages

    The need for stronger authentication methods on line has never been in more demand than at present. There are many services that provide security and authentication while on line or to verify who is the end user. With the rise of identity theft among other cyber crimes, the need for stronger authentication is greatly needed. This written assignment will define, describe and explain OATH (Open Authorization) as a preferred choice for authentication method and the benefits of OATH.…

    • 648 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    In the setting there should never be any unauthorized person. If a visitor comes into the setting it’s important for that person to sign in the visitor’s book. It’s also important for that visitor to wear a visitors badge so everyone in the setting is aware that the visitor is authorized. If I or the staff seen a visitor in the building without a badge on then it’s important for me to challenge the visitor. For example asking where they are going or what room do they…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Dadadasd

    • 279 Words
    • 2 Pages

    Telecoms cabinets are often the victim of vandalism and used for advertising posters and are not often maintained. Unauthorized persons sometimes open the telecoms cabinet by force, and without security and alarms, they can access it.…

    • 279 Words
    • 2 Pages
    Satisfactory Essays