Preview

Osi (Open System Interconnect) Model

Satisfactory Essays
Open Document
Open Document
357 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Osi (Open System Interconnect) Model
Magnolia Utility Citizen’s Cooperative Physical Security Survey Simulation In the physical control simulation for the Magnolia Utility Citizen’s Cooperative I had to survey the entire building’s structure thoroughly and interviewed the staff while in their working environments for the best data for the physical control form needed for the completion of the project for Magnolia V.P of finance for the project's approval. From the visual standpoint the challenge of improving the reliability of the physical networked infrastructures presents us with significant analytical and decision-making complexities, with both technical and policy relevant dimensions. In this security survey I will be using predominantly examples from the staff’s interviews and other security elapses that present two perspectives on these complexities. First is to present critical human error infrastructures as complex adaptive systems, which share certain characteristics that policy makers and managers need to account for. Secondly, the balance of the paper outlines will focus on improvements of the analytical and decision-making complexity, and presents the research and policy-making agendas that need to be addressed if we are to significantly improve the reliability of physical infrastructures. The Layout map shows the direct connection to each department the potential lack of defenses against deliberate attack, critical infrastructure protection, and any human error leading to future incidents in the physical security. In the majority of the building region the main issues were of the staff lack of knowledge or lack of proper protocols to prevent the lost of confidential documentation like in the Warehouse region. In the Tool and Distribution Center there were elapses in protocol when the staff member allowed the disbursal of tool without following the department’s documentation policy for a friend. In some areas security are up to par for the necessary observation over sensitive

You May Also Find These Documents Helpful

  • Satisfactory Essays

    -RESULTS DRIVEN. As Security Manager, he supervised three quarterly Cyber Security spot checks covering 14 secure spaces between 11 tenant commands island-wide, maintaining compliance of Defense Information Systems Agency's Physical Security posture…

    • 165 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    The list below contains the findings, weaknesses, or vulnerabilities discovered during the site security assessment. Some of the issues listed here are coalesced from more than one section of the assessment…

    • 2011 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    The following document outlines Richman Investments security measures for IT infrastructure. There are many components that make up the Richman Investments network, and so there should be a multi-layered security solution to protect it. The server room has been located in the central part of the building, and will be physically protected by electronic door locks with keypad combination access. There are a limited number of personnel who will have access to this room in order to decrease the potential for tampering. Each of these personnel will have their own access code, and a digital log will be kept of all access.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    ITNE455-1204A-01 U3GP3

    • 5030 Words
    • 21 Pages

    Security is embraced by the executive management staff at MJD Electronics. An important task for the Chief Security and Compliance Officer for MJD Electronics is to outline a plan that makes considerations for many of the important aspects of valid security architecture. This discussion presents more detailed information on many topics that should be included in a solid security architecture including border routers, demilitarized zones, proxy firewalls, access control lists and filters, fail-safe equipment, and more.…

    • 5030 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Cjs/250 Appendix D

    • 574 Words
    • 3 Pages

    The interior of the office building is segmented into two major areas. The first area is the employee workstation; only employees can access this area. Visitor and employees can access the second area. Both the first and second areas are monitored by active video surveillance.…

    • 574 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Physical Security: The physical layout of the company should be structured with security and access control as a primary concern, along with providing sufficient workspace for employees to work and collaborate. Just…

    • 598 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Isc363 Phase 3

    • 1899 Words
    • 8 Pages

    The level of security can determine the rise and fall of any organization, no matter how big or small the company may seem, so mitigating risk should always be the number one priority. Risk mitigation can be define as the process of implementing any form strategic actions that will reduce the level of threats that may cause financial hardship towards the organization. In addition, risk mitigation tracks, identify and evaluation all form of risk, including new and old. The focus of risk mitigation is to assist the organization’s department of security administration with identifying a list of potential problems that…

    • 1899 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Unit 4 P6

    • 757 Words
    • 4 Pages

    Ensuring if there’s fire or any panic attack such as robbery, companies should install more security and safety around the store and help their staffs to feel safe around their work place as well as having full access through the fire exits (the bigger the store in size the larger the amount of security and fire exits).…

    • 757 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Access Control Simulation

    • 698 Words
    • 3 Pages

    Upon entry the door was locked and a key card was required for this single point of entry. There were security cameras outside of the building. There was a dumpster outside that was not secured, which could allow anyone access to sensitive information. Locking the dumpster or placing it in a secured location would mitigate this risk. The receptionist did not ask me to verify my identity. The receptionist should be required to verify the identity of everyone entering building to prevent a person from entering the building that isn’t authorized. There was a security room with security personnel viewing the monitors. Office 1-1 had a post it note taped to computer monitor with names that could be passwords. Increased password security should be implemented to reduce the risk of someone hacking into a system. Both office 1-1 and 1-2 had fingerprint scanners, which increases access control. In office 1-2 there was an unattended paper shredder, which should be secured due to sensitive information. In the hallway there was a security camera and a utility box but the wire cabinet was not locked. As such, anyone can access the hardware inside. A lock should be installed to prevent unauthorized access to the hardware. Also in the hallway there was an Ethernet jack which allowed access to the internet. Controls should be put in place to require security access to logon to the network.…

    • 698 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Whitehall Police History

    • 1919 Words
    • 8 Pages

    There is room in the office to have people in. This area also has space to allow the Platoon Commander the ability to call in an officer from his platoon for conferences, reprimands, etc. In the middle of the complex on the first floor there is the Sergeants office. The Sergeant on duty has a view of almost the entire first floor, and he has the aid of a video monitor and windows. Adjacent to him is the Clerk's office which faces out onto the lobby. The Clerk is responsible for meeting the public and take in all TVB fines, etc. Her office is protected by bullet-proof plate glass. The lobby is large and can accommodate a far greater number of people than the old lobby did. The Radio room is also adjacent to the Sergeant's office. We have our teletype (which connects us to the LEADS system), along with the most modern radio consoles, video monitors, etc. This area also contains our main panel for our burglar alarm system. Our system allows us the ability of not only simply hearing an alarm when a burglary is in progress, but we also have the ability of hearing sounds that are going on within the building being burglarized. An 8-track tape system monitors all telephone and radio contact.…

    • 1919 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    sec 410

    • 1157 Words
    • 5 Pages

    It is important for all organizations to have physical security. Physical security protects the organization in every way. Every individual needs to be aware of the importance of physical security. Not only is important for the individual to be aware of the importance physical security has in an organization but to be able to understand how physical security works within the organization. In this paper the writer will be describing the core concepts of physical security. Additionally the writer would be writing about the security assessments. Last the writing would be writing about the basic physical controls.…

    • 1157 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Security Site Survey

    • 1000 Words
    • 4 Pages

    This report is intended as a detailed audit of all phases of the DeVry Corporate Center security operations and a review and evaluation of those areas and activities most vulnerable to the theft or safety risks.…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Capstone Checkpoint

    • 270 Words
    • 2 Pages

    I believe that it is essential for security professionals to be well familiar with their surroundings and have great knowledge of their primary targets, while roaming their environment. It is critical that all security professionals must maintain full control of the environment they are assigned to, and are aware of not leaving a vulnerable gap to the criminals. These security professionals must be ready to notice the slight changes of the environment, and must keep in mind that all areas are different. Therefore, they must plot a defense mechanism based on the type of environment they are assigned to.…

    • 270 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    OSI stands for Open Systems OSI model. It is based on a proposal, developed by International Standard Organization (ISO) as a first step towards International standardization of the proposal used in the various layers (Day and Zimmerman 1988).It was revised in 1995.The Model is called ISO OSI(Open System Interconnection) reference model. The OSI has seven layers, placed in a Stack format. The principles that are applied to arrive at the seven layers are. A layer should be created where different abstraction is needed. Each layer performs a well defined function. The function of each layer should be chosen with an eye towards defining Internationally Standard Protocols. The layer boundaries should be chosen to minimize the ‘Information Flow’ across the interface. The number of layer should be large enough that distinct function need not be thrown together in the same layer out of necessity that small enough that the architecture does not become unwieldy. It was created as a framework and reference model to explain how different networking technologies work together and interact. It is not a standard that networking protocols must follow. It is the backbone of Networking.…

    • 320 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Osi Models

    • 284 Words
    • 2 Pages

    To the best of my knowledge, and after much research, routers reside on both the Physical layer and the Data Link layer. The Physical layer seems to manage all of the logistics of the device residing on the network (such as pins, voltage, cable specification, etc.) whereas the Data Link layer is responsible for the addressing of the device to give it the ability to transmit and receive data from other…

    • 284 Words
    • 2 Pages
    Satisfactory Essays