Threats evolve and technology keeps constantly improving

Assignment Help Basic Computer Science
Reference no: EM132817043

Discussion 1 :

As threats evolve and as technology keeps constantly improving, we are also seeking to improve constantly," Young said. (Claire, 2019) This statement is given by Heather Young, DPSS director of strategic communications. It depicts the priority of security and the technological advancement we need to learn and be proactive in facing the threats. Apart from this, Young also states that the university is working on several security measures that had to be implemented soon and updates to the university alert system. Later, enabling the desktop alerts, text and email alerts are also implemented within the university. This example clearly shows the necessity of security measures, especially in an educational organization and in every major business organization, as part of physical security.

Boston University Libraries plans to implement additional security measures by controlling the building access with either students and staff only. (David, 2020) As part of this process, both students and staff were required to make sure they were affiliated with the university only. This measure was because of the longstanding concern over the theft of unattended student materials, laptops, and other valuables in the library by petty thieves. Thus a spokesperson stated that adding up the additional security measures will moderate the problems. 

Discussion 2 :

Physical security is essential as digital or cybersecurity. Physical security needs regular compliance and updates. Most people neglect physical security and mostly concentrate on cybersecurity. They forget that physical safeguarding is as essential as a cyber safeguard.

Below are the top five physical security types

1. Perimeter Security

2. Closed Circuit Television

3. Secured server room

4. Device management

5. Air gapped WiFi network

Most people or organizations forget that even though we are in the era of digitalization. Organizations or infrastructures are not entirely on digital platforms. There is always a physical server or infrastructure which supports digital platforms providing physical security to this infrastructure and providing cybersecurity for the digital platform.

In the scenario explain, we know that Alison is responsible only for the security of company assets, but Brad is a company employee. Even though the organization mostly concentrates on protecting, it is essential to protect its employees on campus. Generally speaking, when we talk about safeguarding assets, it also includes protecting employees as they are also company assets. In this scenario, the organization should install CCTV in their office parking lot. They should also install a guard to monitor activities in the parking lot. These servers physical security for both employee asserts and parking lot of organization.  From the above top five security types in this scenario, we should use CCTV and Permiter protection. CCTV acts as invisible security, whereas Permiter security acts as visible security.

Visible security is best suited when we can prevent a break-in, stealing, or property damage. With visible security, we are telling perpetrators that all their actions are being monitored. In a few scenarios, the perpetrator scans and damages visible security before the break. In this case, invisible protection can help to detect perpetrater. As per my unserstanding its important to have both visible and invisible shields. We can not use inviable security everywhere we have to follow some guidelines and use invisible protection without violating the privacy of people or employees (Mike et al., 2018).

Reference no: EM132817043

Questions Cloud

Questions about films-magical forest : What do flying squirrels eat? How does it benefit from being eaten by the squirrel and in turn, how does it benefit the rest of the forest?
What would be depreciation expense for the second year : The truck is expected to have a salvage value of $12,000 four years later. For the second year, depreciation expense would be?
History of heart defects and kidney problems : You can see she has webbed skin on her neck as well as swelling of her hands and feet. The patient has a history of heart defects and kidney problems.
Describe the ways in which the two theories are similar : Describe the ways in which the two theories are similar, and how they differ. Include a statement of how each theory could be used in your nursing practice.
Threats evolve and technology keeps constantly improving : As threats evolve and as technology keeps constantly improving, we are also seeking to improve constantly," Young said.
What the depreciation expense for bongo will be : What The depreciation expense for 2000 will be? When the building was built it was expected to be used for 8 years and then be sold for $44,000.
What do you think about situation : What do you think about this situation? Do some research on the web about steroids in general, and/or about steroid use in a particular sport
Discuss the medical ethics in blood transfusion : 1. Discuss how you as student advocate will go about discouraging the female students from carrying out abortion.
What the amount of accumulated depreciation at december : Using the straight-line method of depreciation, after recording depreciation, the amount of accumulated depreciation at December 31, 2016 is

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd