In this presentation, I will be discussing the differentkinds of physical and software security.
I will be addressing how secure thedifferent kinds of security systems are and how you can make each of thefollowing securities more secure. You will learn about the differences betweeneach of the securities and the phenomenal features that each of the systemshave.Locks are used in order to prevent unauthorised access to abuilding or an organisation. Locks are essential for a physical security systembecause it has the ability to have an only accessibility to people who aregiven a key, card or a fob. Without any off the different kinds of keys thatare available, nobody else would be allowed to have access. This is a secure way to keep valuables in aplace that is secured by a lock.
One way locks keep a system secure because it can onlyprovide granted access to people who work in the organisation. Another way thatlocks can keep a system secure is because the fob that is given to all thestaff can be given different access to the building. For example, the boss ormanager would have more or full access to the whole building whereas acolleague would only have limited access.
Visitor passes are allocated to those who are visiting aworkplace or a business. Visitor passes not only give security staff anidentification of who they area as an individual. When they are inside thebuilding, they receive limited access in order to enter some of the rooms inthe business. People who are new to the building or an organisation would oftenbe given a visitors pass and people would be able to access the building. Visitors passes can keep a system secure because onlyvisitors can access the organisation with a limited access. They wouldn’t beable to have full authority over the whole organisation access.
With a Signing in and out system, it shows that when staffor people who visit clock in and clock out. This is effective because it cannot only be used for emergency purposes but can also be used to determine whenpeople come in and out of an organisation. It is considered as a security feature because it gives thestaff a responsibility to use the identification cards to tap in and out whenthey are either commuting to another site or when they are exiting thebuilding. The system would then show exactly what time they have arrived andleft the building. This system has the feature to identify who is in thebuilding for security purposes.
Retinal scans is an excellent way of hidingpersonal content. People who have registered their iris into a system databasecan only access personal information that is inputted into a server. This isone of the most secure systems as everyone has different Iris’s and that due tothe fact that all o the procedures are done under biometrics, there can not bemore than two iris’s that are the same. People who haven’t registered their retina into the scanner will not beable to access any important pieces of data. Retinal scans can keep a system secure becauseonly people who have registered their iris into the database can only haveaccess. The retina scan scans for codes and patterns that have been registeredon the databases and this physical security system would try to find a match.
Fingerprints are another biometric systemsecurity that you can use to gain access to data that should be considered private.Fingerprints are also done under the biometric system in order to gain accessto data. Just like retina scanning, you would need to register you ownfingerprint into the system in order to gain access to this. This will keep this system secure because if youhaven’t registered your fingerprint on the database you will have no access tothe work or organisational database.
Because fingerprints are done underbiometrics, it will recognise any biological features and you cannot have twoidentical fingerprints as all of the fingerprints are unique. Voice recognition is an ideal way to keep yourdata secure. You would need to register your voice into the system in order tohide any kind of data that may be personal. Many businesses have voicerecognition and they can use the staffs voice recognition to input data andmanage the data that they need to run in the workplace. If somebody from aworkplace is ill or has a soar throat, the voice recognition system would stillbe able to recognise the voice that was registered on the database Voice recognition can keep a system securebecause it can recognise unique voices and it can then give people access over their possessions and once the voiceis activated, they can access their system. Many organisations would have security guards infront of buildings and sites in order to prevent anybody from committing anykind of crime or theft on the premises. Without security guards, they would,the security level would be low and there would be more cases of crime in aworkplace.
Security guards can keep a system secure becausethey can protect a business from any kind of threat. They are also able toincrease the amount of security that the business may need. Security guards areconstantly patrolling the area to look out for any kinds of suspicious actsthat are happening all throughout the day Cableshielding is used to protect cables from Electromagnetic Interferenceion. Datathat is spread through a copper wire can give out a magnetic field of current.Cable shielding comes in four different layers.
These are the plastic jacket,the metallic shielding, the dielectric insulator and also the centre core. There are many layers to protect any kind ofintereference which data passes along. Cableshielding can keep a system secure because it can help businesses andorganisations from getting their data corrupt. By having cable shielding intheir firm, they can protect the data that they have. If they didn’t have anykind of cable shielding, their data that they have would be corrupt and theywouldn’t be able to retrieve this back. Firewall configuration is a software that existson all computer system. It has the ability to limit and lower the amount ofnetwork access a user can have. With firewall configuration, you are able tobreak down the amount of websites that an individual can visit on the worldwide web.
Firewall configuration can keep a system securebecause it can block people who haven’t received permission of using a networkconnection. This can help a business because if many people are using aninternet connection which is open and doesn’t require a password then the tasksthat you do online and whatever you search online can slow your system becauseof the amount of people using a single network connection. A virus checking software is when you are haveinstalled and invested in a security system which will allow you to scan yourcomputer for any viruses and any possible threats that your computer may have.Examples of a virus checking software can be Norton, AVG and also Malwarebytes.These software’s allow you to choose what you can scan. This is vital becauseyou may not want to scan important information in case if it cannot be back up. A virus checking software can keep a systemsecure because a virus software can remove all of the potentially harmfulviruses that your computer may have. Intruder Detection Systems are a securitysoftware which gives warning messages to the administrator of a computersystem.
The computer is able to monitorany kind of harmful and suspicious activity that takes place by an individual.By using an IDS, you are able to track down who is involved in trying to tamperwith the system. Once they have foundwho is behind the suspicious activity, they can then come up with a conclusionagainst the intruder. IDS can keep a system secure because thissoftware has the ability to track down who is trying to modify and access thedata.
IDS attempts to prevent data corruption along with data deletion. There are many different kind of forms ofpasswords that you can have and they all have one function which is to keepdata protected from strangers and the outside world. Passwords can be anumerical code, an alphabetical code and also a patterned code. This all havedifferent levels of security because some may be more protecting than theother. You can also have passwords whichare done under biometrics which have a higher security level due to the factthat is it done under a biological individual and no two fingerprints, voicesand irises can be the same.
Passwords can keep a system secure because itcan not only keep data secure but it can also prevent data theft along withdata modification. You are able to choose who is able to know the password andyou should have a password which is strong and easy to remember. Levels of accessing data is highly used inbusinesses and organisations. This is when the administrator has a higheraccess than to those who have a standard account.
When an administrator has ahigher level to data accessing, they can prevent standard users to accessingsome of the files that are on the computer system. There should be a differentaccess level between a standard user and an administrator. Having different levels to access data can keepa system secure because they are able to control the privileges that a regularuser has in order to access data that is stored on a computer. Normally, astandard user wouldn’t have the ability to install files via the internetbecause the administrators password is required for security purposes.
All software programmes will generally updateautomatically without the user themselves needing to update it. Softwareupdating is crucial as they sometimes experience bug issues and bug fixes whichthey would need to fix immediately because it can be a huge threat to peoplewho use the software. Software updating keeps a system secure becausethey try to find weaknesses that the software has and they will try to takeover the software which will lead to the hacker trying to access the data tothose who have installed the app. This is the reason why software updating isuseful. Audit logs is a database which allows you to seewhat you the users have accessed on a database. Only an administrator canaccess the Audit Logs. The Audit logs tell you what resource you have loaded,what user account has accessed it and at what time.
An audit log can be useful in a business becauseyou are able to se who are using any harmful resources and they are able to seewho are trying to install and add unwanted programs on the system. The log willtell you who is behind all of the suspicious actions. A diskless network is a computer system thatdoesn’t have a CD or a floppy drive. There are also no internal hard drives inorder to store the data on. A diskless network stores all of the data on anetwork and this can have positive and negative impacts on the user. A positiveimpact is that you wouldn’t need to worry about your internal hard drive frombeing corrupted. A negative impact however is that if the network is down, thenit will take time for the data to be retrieved again. A diskless network can keep a system securebecause people cannot corrupt the hard drive that is in the computer.
Everythingis backed up to another server so it will be easy for the user go get theirdata back. It isnt that easy to delete files and folders off a network as thesystem would ask for permissions. Handshaking is when two computer systems havethe ability to exchange network connections in order for the systems tocommunicate. This is useful for data transfer between a connection between twocomputer systems. Handshaking can keep a system secure becausenobody is allowed to send data transfer and handshaking can only take placeonly if both of the users are known . Handshaking would not take place if youhave unknown users on either computer.
Public and private keys are both examples ofencryption techniques. Public keys is one encryption technique that can be usedin order share files between one another. With private keys however, you areable to decode the information that you have been received by the public key.
The function of encryption is that everything is unknown. Nobody is able to seethe messages that are sent to one another. Everything is kept private. VPN isone ideal way to prevent anybody else from using your network. Most businessesshould have a VPN because it can prevent the network from being slow because itis used by other people. Having a VPN can also make protect you from anyanonymous people using your network connection. They should use a VPN whichonly allows the business to use this preferred network.
Organisations using aVPN is vital because unknown users have no access to the network provided bythe workplace. Call back is a dialling system where admins have the capability to calling in a networksystem. The network will then call them back. This requires a username and alsoa password to ensure that the system is secure. It uses a protocol in order tokeep the dialling system secure. There are two types of backup systems.
This isknown as incremental and differential systems. Incremental backup is when youare able to have a shorter backup time. It only backups the data that has beenchanged or modified since the previous backup that you have made. Differentialbackup however only contains the data that has been changed meaning that itdoesn’t have the data that has been previously backed up. ADVANTAGE: DISADVANTAGE: With backup systems, you are able to retrieve files along with getting your data back from a corrupted . When you try to attempt to get your data back, there is a possibility that you cant get your data back due to the system recovery files that may be damaged as well. Fast and efficient work to back up your data. Takes up a lot of space and storage Saves more storage space.
It is not useful if you carry out a full data backup. ADVANTAGES DISADVANTAGES You are able to see the bugs and the viruses that are on the computer system One disadvantage is that you it will cost a lot to replace your computer system and that you will not be able to retrieve the data that you have kept on your previous computer system. All of the data would be lost and there is a likelihood that you wouldn’t be able to replace. You would need to replace your whole system ifthere is a hardware fault or if there has been vandalism to the computersystem.
It would cost a lot of money for the business and the organisation toreplace all of the computers in the workplace. It would cost a lot of money forthe computers to be replaced . Software that has been installed on the newsystem would need to be installed again and if you have invested some money inthe software’s, you may need to buy the program again. There are 7 tiers of recovering an organisationssystem. These are:1 – Data backup without a dark site: This is when thebackups are taken into account and they attempt to recover the system throughthe location of the replacements.2 – Data backup with a dark site: Copies of the data is made in order to forthe replacement to be made.
Copies are generally sent to a control centre.3 – Electronic vaulting: this is when copies of the system become maintainedand monitored over a period of time.4 – timed copies: this is when remotely copies are kept in alocal data centre.5 – Transaction integrity: This is when both of the copies aresyncing together and they are functioning with each other.
6- zero data loss: find the data loss and retrieves themissing data.7 – system secured: system is retrieved and all data hasbeen recovered Disaster policies are ways that your computersystem can be harmed or damaged due to human factors and natural factors.Factors can include: Natural disasters Human error Power failure Computer viruses System or equipment failure. ADVANTAGES DISADVANTAGES Shows what has caused the data to go e.g.
natural disaster or human error. It may be difficult for the user to understand what is going on and how they will work around recovering their data. Disaster policies are ways that your computersystem can be harmed or damaged due to human factors and natural factors.Factors can include: Natural disasters Human error Power failure Computer viruses System or equipment failure. Advantages: Disadvantages: The company would receive funds if their data is lost or corrupted on the system and they will then use the money to replace the system. The policy would not be able to recover the data that is lost or corrupted and if they do not know the situation that you are in, they may not be able to help you.