Wednesday, June 12, 2019
Peer review Threats to Data Security (Virtual Lab Research Paper
Peer review Threats to Data Security (Virtual Lab - Research Paper ExampleIn much(prenominal) an area, access to such gadgets can easily be monitored. The control not only restricts accessibility to the premises but also data, selective information and information systems. When such individuals gain access, they may alter network and system settings that may weaken the security system of the organization.Other physical threats not mentioned include conduce break in by thugs. In such a case, we require CCTV cameras installed and warning systems to alert the security. The text did not also include the use of biometric systems for stylemark to server rooms and rooms containing networking equipments (Special issue on trust in cyber, physical and social computer computing, 2013). For example, important persons can fill their fingerprints taken so that when they enter such rooms, they only use their fingers as a passkey. In addition, visitors need to be given badges, escorts for them and control entrance for such individuals. Further, it is wise to secure workstations with locks. Although Laptops can have locks, it is important to set alarm systems to restrict unauthorized persons from touching them.Printed documents that are the waste should be shredded to lift their use elsewhere. It also means that information that is in the paper especially that which is very sensitive to the organization needs securing in cabinets using locks. Only authorized personnel should have accessibility to this
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.