Tuesday, September 24, 2019
Peer review Threats to Data Security (Virtual Lab Research Paper
Peer review Threats to Data Security (Virtual Lab - Research Paper Example In such an area, access to such gadgets can easily be monitored. The control not only restricts accessibility to the premises but also data, information and information systems. When such individuals gain access, they may alter network and system settings that may weaken the security system of the organization. Other physical threats not mentioned include direct break in by thugs. In such a case, we require CCTV cameras installed and warning systems to alert the security. The text did not also include the use of biometric systems for authentication to server rooms and rooms containing networking equipmentââ¬â¢s (Special issue on trust in cyber, physical and social computer computingââ¬â¢, 2013). For example, authorized persons can have their fingerprints taken so that when they enter such rooms, they only use their fingers as a passkey. In addition, visitors need to be given badges, escorts for them and control entrance for such individuals. Further, it is wise to secure workstations with locks. Although Laptops can have locks, it is important to set alarm systems to restrict unauthorized persons from touching them. Printed documents that are the waste should be shredded to avoid their use elsewhere. It also means that information that is in the paper especially that which is very sensitive to the organization needs securing in cabinets using locks. Only authorized personnel should have accessibility to this
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.