Categories
Writers Solution

Operational environment, physical access control

The security of information asset is critical to any operational environment. The existence of (or the lack of) good security measures will determine the stability of the operating environment and the availability of resources. As a result of this fact, security should not be an afterthought in the network architectural design process. In any network environment, the most successful access control solution is one that was considered in the design process. Access control can be broken down into area, physical access control, and logical access control.

Describe physical access control.

Discuss any form of physical access control, and reference a time when you have used this form of physical access control to provide security to an information asset.

Describe logical access control.

Discuss any form of logical access control you have used, and discuss a situation in which you have leveraged this form of logical access control to provide security protection for an information asset.

……………………………………………………………………………………………………

SEE SOLUTION BELOW

ASSIGNMENT COMPLETED AT https://capitalessaywriting.com

MAKE YOUR ORDER AND GET THE COMPLETED ORDER

NO PLAGIARISM

Security Information Asset

            The increased use of personal computers, and the interconnection of the ICT infrastructure, has led to an increase in threats and vulnerabilities. According to (Palmer & Shenoi, 2009, p. 114) the operating environment has increasingly become complex, with specialized professionals now located in different dispersed locations. As a consequence of increased interconnectivity and the increased vulnerability, information security and safety guidelines must be implemented. In the network environment, one such security practice is the use of access control. Access control is a broad concept, which can be divided into physical, area and logical access controls.

Physical Access Control

            The physical network access control can be considered as a mechanical form of access to a room (Vacca, 2013). The common methods of achieving physical access controls include use of authentication badges, the use of devices that authenticate biometrics to gain entry/access and access cards as locking devices for door entries. According to (Fung, 2004, p. 50) physical access control needs the network devices such as servers, routers and switches to be placed in a secure room, where access has been limited and strictly allowed to the authorized people. In addition to physical restriction to access, other factors related to network security must be observed. The factors include the procedures of operations and the daily methods.             An example of a form of physical access control is a universal access card. The universal access card has special codes encrypted to it and…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….

GET THE COMPLETED ASSIGNMENT

ASSIGNMENT COMPLETED AT CapitalEssayWriting.com

MAKE YOUR ORDER AND GET THE COMPLETED ORDER

CLICK HERE TO ORDER THIS PAPER AT CapitalEssayWriting.com

NO PLAGIARISM

By admin

Academic tutoring services from the best essay writing company

Leave a Reply

Your email address will not be published. Required fields are marked *