StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Peer review Threats to Data Security (Virtual Lab - Research Paper Example

Cite this document
Summary
It observes that it enhances access controls to the data of the Association. It restricts unauthorized persons from gaining access to the organization’s premises and illegally access information that…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.7% of users find it useful

Extract of sample "Peer review Threats to Data Security (Virtual Lab"

Peer review: Threats to Data Security as presented by Amy Insert Insert One of my mates posts centered on physical security in an organization. It observes that it enhances access controls to the data of the Association. It restricts unauthorized persons from gaining access to the organization’s premises and illegally access information that is key to the company. It includes involving the staff in understanding policies surrounding accessibility control. The staff is advised to identify strange individuals and report them to the security.

Computer systems especially the servers, routers, switches and patch panels should be securely locked in equipment cabinets (Erbschloe, 2005). In such an area, access to such gadgets can easily be monitored. The control not only restricts accessibility to the premises but also data, information and information systems. When such individuals gain access, they may alter network and system settings that may weaken the security system of the organization. Other physical threats not mentioned include direct break in by thugs.

In such a case, we require CCTV cameras installed and warning systems to alert the security. The text did not also include the use of biometric systems for authentication to server rooms and rooms containing networking equipment’s (Special issue on trust in cyber, physical and social computer computing’, 2013). For example, authorized persons can have their fingerprints taken so that when they enter such rooms, they only use their fingers as a passkey. In addition, visitors need to be given badges, escorts for them and control entrance for such individuals.

Further, it is wise to secure workstations with locks. Although Laptops can have locks, it is important to set alarm systems to restrict unauthorized persons from touching them. Printed documents that are the waste should be shredded to avoid their use elsewhere. It also means that information that is in the paper especially that which is very sensitive to the organization needs securing in cabinets using locks. Only authorized personnel should have accessibility to this section.ReferencesErbschloe, M. (2005). Physical security for IT.

Amsterdam: Elsevier Digital Press.Special issue on trust in cyber, physical and social computing. (2013). Computers & Security, 34, III. Doi: 10.1016/s0167-4048(13)00044-8.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Peer review Threats to Data Security (Virtual Lab Research Paper”, n.d.)
Peer review Threats to Data Security (Virtual Lab Research Paper. Retrieved from https://studentshare.org/information-technology/1681792-peer-review-threats-to-data-security-virtual-lab
(Peer Review Threats to Data Security (Virtual Lab Research Paper)
Peer Review Threats to Data Security (Virtual Lab Research Paper. https://studentshare.org/information-technology/1681792-peer-review-threats-to-data-security-virtual-lab.
“Peer Review Threats to Data Security (Virtual Lab Research Paper”, n.d. https://studentshare.org/information-technology/1681792-peer-review-threats-to-data-security-virtual-lab.
  • Cited: 0 times

CHECK THESE SAMPLES OF Peer review Threats to Data Security (Virtual Lab

Protecting Information through Network Security

This paper approves that the main stress is being laid over the fact that knowing the basic concepts and knowing what lies at hand with regard to the network security and challenge is the core issue.... It is a general rule that is being applied all over that the first step to mitigation and eradication of problem is that of understanding it, the same applies to the menace of internet low security.... It is an established fact that where ever there is traffic there will be breach of rules and there will be infiltration, yet the fact of effective security presence and making the defenses impregnable is another established fact as well and it aptly applies to the concept of making internet a more secure medium, which can be done so through addressing of the problem at hand....
7 Pages (1750 words) Book Report/Review

Hijacking, Cloud Security and Data Loss

This review ''Hijacking, Cloud security and Data Loss'' discusses that cloud computing entails saving and retrieving files from the cloud computing server sites.... The computer hijacking may cause security threats on the cloud computing clients' confidential data.... The public computing type allows anyone to access the data saved in the remote server (Howell, 2012).... Under the private type computing, unauthorized persons are not allowed to access the data saved on the remote server....
10 Pages (2500 words) Literature review

Safeguarding Your Data

This literature review "Safeguarding Your Data" presents information and data security that is a top concern for any company; however, in the case of our company it is even more vital since we design specialized programs that have important applications in industry and research.... However, security is all about preparation and knowing that things can go wrong (Lucas, 2004).... The Maginot mentality must be avoided in all cases so we must not think that the security protocols and mechanisms we have in place are enough....
5 Pages (1250 words) Literature review

Can There Be Development without Security and Security without Development

threats to security may be direct or indirect.... The paper "Can There Be Development without security and security without Development?... tells that recently ties between security and development were not an issue for policymakers but after several incidents that highlight the importance of diplomacy, development, and defense are much of a concern.... For some it may be the number of resources available to the society, for some, it is freedom of the masses, for others peace and security, and for some, it may be equitable distribution of income....
8 Pages (2000 words) Literature review

Internet Security and Privacy

This paper examines the implications of the issues of security and privacy on anything exchanged on electronic network sites such as electronic commerce (e-Commerce), business (e-Business) and government (e-Government).... It is the high time people are made aware of security and privacy concerns… The Internet today has evolved to such an extent it has become ubiquitous in daily life.... There are security and privacy issues whichever Internet device is used and are discussed below....
5 Pages (1250 words) Book Report/Review

Mac and Windows Security System

This review ''Mac and Windows security System'' is about differences between two operating systems in their security.... nbsp;While their mode of operation is different, the security features are also different.... nbsp;  … Thus, Mac and Windows differ in their systems of process management, management of files in the systems and also memory management, with windows allowing for memory sharing between processes, resuming to the open files after a power outage or forced reboot, some aspects that are missing in the Mac system, which makes Windows more vulnerable to security breach and attacks....
7 Pages (1750 words) Literature review

Physical Security Measures to Address an Explosive Threat

This literature review "Physical security Measures to Address an Explosive Threat" discusses a number of physical security measures, including wall security, protective glazing products and systems, perimeter protection, energy-absorbing systems, and floor-slab reinforcements.... nbsp;… To come up with an optimal building security solution, building owners and agencies may have to come up with a codified platform where two or more measures are used at the same time....
10 Pages (2500 words) Literature review

Mitigating the Threat of Malicious Insiders

Malicious insiders can present different forms of threats to any information system.... Additionally, an insider is also defined as a person currently or at a later time or period approved to access a company's information system, network, or data.... In technical terms, Demergis (2010), defines a malicious insider as a present or previous human or non-human actor/person who deliberately misused or exceeded an authorized or permitted level of access to communication and information system networks, services, systems, data, or resources in a manner that is aimed at a specific human or non-human individual or who influenced the privacy, availability or integrity of the nation's systems, data, and/or day-to-day operations....
5 Pages (1250 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us