For scenarios listed below, illustrate for the new hires the strengths and weakn
ID: 3868252 • Letter: F
Question
For scenarios listed below, illustrate for the new hires the strengths and weaknesses of the different approaches. This will help new hires gain a more practical understanding of how to deal with these types of issues that they are likely to face in their day-to-day job. Base on the Information security core tenets (CIA) Confidentiality, Integrity, Availability. APA format with cited sources.
Theft: In the last month, two break-ins have occurred at a client’s office, which resulted in the theft of employee laptops during both incidents. The first incident occurred in the evening when the thieves broke through a ground-floor window. The second incident occurred during the day when the thieves walked right into the business area and removed two laptops. What physical and technical controls would be helpful to address the issue and prevent this type of vulnerability in the future? Compare and contrast the different methods that could be used to mitigate the given threat.
Explanation / Answer
Physical security and technical controls is very helpful to address the issue in favor of more technical threats for example hacking, malware, sniffing, spoofing, denial of service etc.
There are many physical securities carried out many brute force due to lack of technical attacker knowledge.
Physical security has three most important pillars:
· Access Control
· Testing
· Surveillance
The security will be achieved successfully by the help of (CIA) Confidentiality, Integrity, and availability.
In the way of potential attackers, the physical sites should be secure against attacks or any environmental disaster.
Prevention from the hacking, malware, sniffing, spoofing, denial of service etc. we should be use by the following device or technical physical security tools:
The physical security had been done by using locks, biometric access control system, access control cards.
Many of the organization also used physical location monitoring, heat sensor, surveillance cameras, notification system, intrusion detection sensor etc. method is helpful from to recover disruptive man-made or natural disasters.
The internet of things(IOT) is sphere of physical security as a smart device connected to the internet and organization by the whole world.
The smart device “detect location” will play an important role to keeping equipment safe, secure and fully functionality from the outside of the world.
Therefore “temper-resistant ID” are very helpful to detect the thief.
Motion sensor, tracking signals, tamper-proof locks etc. is very helpful to detect and prevent from the vulnerability in the future.