Preview

Unit 10 Assignment 1: Controls

Better Essays
Open Document
Open Document
1902 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 10 Assignment 1: Controls
Unit 10 Assignment 1:
Controls
IS 4560
Hacking and Countermeasures
Thursday, December 19, 2013

Unit 10 Assignment 1: Controls
Aim Higher College needs to ensure the safety of all its information. Recently we have seen suspicious and careless activity in the research data center. Data center technicians have reported lights left on, doors left open, successful logins to the research database, as well as login attempts in the backup business database after normal hours of operation. Because this is also the backup for our business information we need to keep this area as secure as possible.
In order maintain control over who has access to what in the center we need first ensure that only those that need access to the center are granted the appropriate permissions to the areas that they need. The revolving door should only allow one person through at a time, this will help to prevent someone without access from slipping by with some one that does have access or allow a person with access giving access to some that is not authorized in the build. This will be done with a using simple radio frequency identification (RFID) cards for the initial access to the building’s lobby. Both entry and exit will require that the card be read so that a log of who enters and leaves the building can be kept. Entry to the staff offices will simply be with a RFID card reader. With these cards, we can select what areas they have access to according to their needs . The front double doors and access to the receiving area can only be opened from the inside of the building. By allowing one-way access we ensure that hacking of the reader is not possible.
Biometric scanners should be used for all sensitive areas as a second method to prevent card cloning . Those that have access to sensitive areas or doors that can allow more than one person through such as the shipping area and front double doors will be issued a Personal Identity Verification



References: DuPont. (2013, n.d n.d). DuPont™ FM-200® Waterless Fire Suppression Systems. Retrieved November 29, 2013, from A Dupont Website: http://www2.dupont.com/FE/en_US/products/FM200.html#.UpmIz8RDt8E Olzak, T. (2010, July 5). The future of iris scanning. Retrieved November 2013, 2013, from A Tech Republic Website: http://www.techrepublic.com/blog/it-security/the-future-of-iris-scanning/ Oriyano, S.-P., & Gregg, M. (2011). Hacking Techniques, Tools, and Incident Handeling . Burlington: Jones & Bartelle Learning . Planet Biometrics. (2013, July 15). NIST provides new options for PIV cards. Retrieved November 29, 2013, from A Creo Website: http://www.planetbiometrics.com/article-details/i/1651/ SRI International. (2013, n.d n.d). Iris on the Move® Biometric Identification Systems. Retrieved Novmenber 29, 2013, from A SRI Website: http://www.sri.com/engage/products-solutions/iris-move-biometric-identification-systems Tipton, H. F., & Krause, M. (n.d, n.d n.d). Access Control Principles and Objectives. Retrieved November 29, 2013, from cccure.org: https://www.cccure.org/Documents/HISM/003-006.html Wilson , T. V. (2005, November 11). How Biometrics Works. Retrieved November 29, 2013, from HowStuffWorks.com: http://science.howstuffworks.com/biometrics.htm Wise Geek. (2013, n.d n.d). What Are the Different Types of Key Card Systems? Retrieved November 29, 2013, from wisegeek.com: http://www.wisegeek.com/what-are-the-different-types-of-key-card-systems.htm

You May Also Find These Documents Helpful

  • Satisfactory Essays

    within the facility, and training goals on the recognition and prevention of social engineering attacks. Authorization policies will also include access controls for data by specifying which data should be encrypted, they would…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Kudler Fine Foods

    • 1110 Words
    • 5 Pages

    References: Ex-Sight.Com. (n.d.). What is "Biometrics", and What Kind of Convenience and Security Can it Offer Us. Retrieved March 18, 2012, from Ex-Sight. Com: www.ex-sight.com/biometric.htm…

    • 1110 Words
    • 5 Pages
    Better Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    IAFIS is the largest biometric database in the world. This system houses on average more than 70 million criminal files of subject along and around 34 million if not more civil prints. This system has more than 73,000 known terrorist that are suspected terrorist crimes against the United States. ("The fbi: Federal,2008”).…

    • 1081 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    CMGT430 2015 SYLLABUS

    • 2598 Words
    • 16 Pages

    and other risk areas facing an enterprise. This course will also survey the techniques to prevent unauthorized computer…

    • 2598 Words
    • 16 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    ISS Information Systems Information NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 5…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Good Essays

    Unit 5 Assignment 1

    • 1034 Words
    • 5 Pages

    Furthermore, no longer can we use ignorance as an excuse for not taking a greater stand in favor of fire suppression systems being used in residences, for the research is endless on this topic and so is the buzz surrounding it. Considering the level of attention this topic receives, there are no short of opinions on the issue—and very strong opinions at…

    • 1034 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Staff and visitors have to sign in and out using an electronic scanning system. Each member of staff/visitor has a card with photo ID, name and bar code to identify themselves and use to sign in and out of the premises.…

    • 436 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Technology affects our life daily, and it also affects the criminal justice system, especially in communication. The criminal justice system has different databases do to technology, and these databases operate faster than it would take humans could do. So, the biometrics technologies can measure and analyze the human body characteristics such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements. (Rouse, 2015) The Biometrics is another word for the specialized database it has been around for hundreds of years and provided through the new technology over the years. The Biometric history back dates to 1858 when the first systematic capture of hand images for identification purpose was record. In 1992, the United States established the Biometric Consortium and in 2003 the formal U.S. Government coordination of Biometric activities began. Then in 2005 the Iris on the Move was announced at the Biometric Consortium Conference. Throughout the years many different changes and developments occurred.…

    • 1728 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Nieto, M., Johnston-Dodds, K. and Simmons, C. (2002) Public and Private Applications of Video Surveillance and Biometric Technologies, Sacramento: Californian Research Bureau, http://www.library.ca.gov/crb/02/06/02-006.pdf…

    • 2698 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Biometrics Term Paper

    • 733 Words
    • 3 Pages

    handwriting, the way that you walk, etc. There are also two categories for the use of this…

    • 733 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    “Biometrics” means “life measurement”, but the term is usually associated with the use of unique physiological characteristics to identify an individual. One of the applications which most people associate with biometrics is security. However, biometrics identification has eventually a much broader relevance as computer interface becomes more natural. It is an automated method…

    • 3960 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    rfid biocapsule

    • 2740 Words
    • 9 Pages

    RFID Readers placed at entrances that require a person to pass their proximity card (RF tag) to be "read' before the access can be made.…

    • 2740 Words
    • 9 Pages
    Good Essays
  • Powerful Essays

    acu si tina

    • 1458 Words
    • 5 Pages

    Many different aspects of human physiology, chemistry or behavior can be used for biometric authentication. The selection of a particular biometric for use in a specific application involves a weighting of several factors. Jain et al. (1999)…

    • 1458 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    “Biometrics is used in many places and there is a bright future for them. Coca Cola has recently replaced time card system with hand scanning machines. Finger print scanners are being used in many states of the US. They have been used to trace social welfare fraud. An iris pattern identification system is being used in cook company, Illinois to ensure that right people are released from jail. ATM machines have been installed with finger scanner to prevent theft and fraud in Indiana”…

    • 284 Words
    • 2 Pages
    Satisfactory Essays