In a system secure because only visitors can

In this presentation, I will be discussing the different
kinds of physical and software security. I will be addressing how secure the
different kinds of security systems are and how you can make each of the
following securities more secure. You will learn about the differences between
each of the securities and the phenomenal features that each of the systems
have.

Locks are used in order to prevent unauthorised access to a
building or an organisation. Locks are essential for a physical security system
because it has the ability to have an only accessibility to people who are
given a key, card or a fob. Without any off the different kinds of keys that
are available, nobody else would be allowed to have access.  This is a secure way to keep valuables in a
place that is secured by a lock.

One way locks keep a system secure because it can only
provide granted access to people who work in the organisation. Another way that
locks can keep a system secure is because the fob that is given to all the
staff can be given different access to the building. For example, the boss or
manager would have more or full access to the whole building whereas a
colleague would only have limited access.

Visitor passes are allocated to those who are visiting a
workplace or a business. Visitor passes not only give security staff an
identification of who they area as an individual. When they are inside the
building, they receive limited access in order to enter some of the rooms in
the business. People who are new to the building or an organisation would often
be given a visitors pass and people would be able to access the building.

Visitors passes can keep a system secure because only
visitors can access the organisation with a limited access. They wouldn’t be
able to have full authority over the whole organisation access.

With a Signing in and out system, it shows that when staff
or people who visit clock in and clock out. This is effective because it can
not only be used for emergency purposes but can also be used to determine when
people come in and out of an organisation.

It is considered as a security feature because it gives the
staff a responsibility to use the identification cards to tap in and out when
they are either commuting to another site or when they are exiting the
building. The system would then show exactly what time they have arrived and
left the building. This system has the feature to identify who is in the
building for security purposes.

 

          
Retinal scans is an excellent way of hiding
personal content. People who have registered their iris into a system database
can only access personal information that is inputted into a server. This is
one of the most secure systems as everyone has different Iris’s and that due to
the fact that all o the procedures are done under biometrics, there can not be
more than two iris’s that are the same. People who haven’t registered  their retina into the scanner will not be
able to access any important pieces of data.

          
Retinal scans can keep a system secure because
only people who have registered their iris into the database can only have
access. The retina scan scans for codes and patterns that have been registered
on the databases and this physical security system would try to find a match.

          
Fingerprints are another biometric system
security that you can use to gain access to data that should be considered private.
Fingerprints are also done under the biometric system in order to gain access
to data. Just like retina scanning, you would need to register you own
fingerprint into the system in order to gain access to this.

          
This will keep this system secure because if you
haven’t registered your fingerprint on the database you will have no access to
the work or organisational database. Because fingerprints are done under
biometrics, it will recognise any biological features and you cannot have two
identical fingerprints as all of the fingerprints are unique.

          
Voice recognition is an ideal way to keep your
data secure. You would need to register your voice into the system in order to
hide any kind of data that may be personal. Many businesses have voice
recognition and they can use the staffs voice recognition to input data and
manage the data that they need to run in the workplace. If somebody from a
workplace is ill or has a soar throat, the voice recognition system would still
be able to recognise the voice that was registered on the database

          
Voice recognition can keep a system secure
because it can recognise unique voices and 
it can then give people access over their possessions and once the voice
is activated, they can access their system.

          
Many organisations would have security guards in
front of buildings and sites in order to prevent anybody from committing any
kind of crime or theft on the premises. Without security guards, they would,
the security level would be low and there would be more cases of crime in a
workplace.

          
Security guards can keep a system secure because
they can protect a business from any kind of threat. They are also able to
increase the amount of security that the business may need. Security guards are
constantly patrolling the area to look out for any kinds of suspicious acts
that are happening all throughout the day

          
Cable
shielding is used to protect cables from Electromagnetic Interferenceion. Data
that is spread through a copper wire can give out a magnetic field of current.
Cable shielding comes in four different layers. These are the plastic jacket,
the metallic shielding, the dielectric insulator and also the centre core.  There are many layers to protect any kind of
intereference which data passes along.

          
Cable
shielding can keep a system secure because it can help businesses and
organisations from getting their data corrupt. By having cable shielding in
their firm, they can protect the data that they have. If they didn’t have any
kind of cable shielding, their data that they have would be corrupt and they
wouldn’t be able to retrieve this back.

          
Firewall configuration is a software that exists
on all computer system. It has the ability to limit and lower the amount of
network access a user can have. With firewall configuration, you are able to
break down the amount of websites that an individual can visit on the world
wide web.

          
Firewall configuration can keep a system secure
because it can block people who haven’t received permission of using a network
connection. This can help a business because if many people are using an
internet connection which is open and doesn’t require a password then the tasks
that you do online and whatever you search online can slow your system because
of the amount of people using a single network connection.

          
A virus checking software is when you are have
installed and invested in a security system which will allow you to scan your
computer for any viruses and any possible threats that your computer may have.
Examples of a virus checking software can be Norton, AVG and also Malwarebytes.
These software’s allow you to choose what you can scan. This is vital because
you may not want to scan important information in case if it cannot be back up.

          
A virus checking software can keep a system
secure because a virus software can remove all of the potentially harmful
viruses that your computer may have.

          
Intruder Detection Systems are a security
software which gives warning messages to the administrator of a computer
system. The  computer is able to monitor
any kind of harmful and suspicious activity that takes place by an individual.
By using an IDS, you are able to track down who is involved in trying to tamper
with  the system. Once they have found
who is behind the suspicious activity, they can then come up with a conclusion
against the intruder.

          
IDS can keep a system secure because this
software has the ability to track down who is trying to modify and access the
data. IDS attempts to prevent data corruption along with data deletion.

          
There are many different kind of forms of
passwords that you can have and they all have one function which is to keep
data protected from strangers and the outside world. Passwords can be a
numerical code, an alphabetical code and also a patterned code. This all have
different levels of security because some may be more protecting than the
other.  You can also have passwords which
are done under biometrics which have a higher security level due to the fact
that is it done under a biological individual and no two fingerprints, voices
and irises can be the same.

          
Passwords can keep a system secure because it
can not only keep data secure but it can also prevent data theft along with
data modification. You are able to choose who is able to know the password and
you should have a password which is strong and easy to remember.

          
Levels of accessing data is highly used in
businesses and organisations. This is when the administrator has a higher
access than to those who have a standard account. When an administrator has a
higher level to data accessing, they can prevent standard users to accessing
some of the files that are on the computer system. There should be a different
access level between a standard user and an administrator.

          
Having different levels to access data can keep
a system secure because they are able to control the privileges that a regular
user has in order to access data that is stored on a computer. Normally, a
standard user wouldn’t have the ability to install files via the internet
because the administrators password is required for security purposes.

          
All software programmes will generally update
automatically without the user themselves needing to update it. Software
updating is crucial as they sometimes experience bug issues and bug fixes which
they would need to fix immediately because it can be a huge threat to people
who use the software.

          
Software updating keeps a system secure because
they try to find weaknesses that the software has and they will try to take
over the software which will lead to the hacker trying to access the data to
those who have installed the app. This is the reason why software updating is
useful.

          
Audit logs is a database which allows you to see
what you the users have accessed on a database. Only an administrator can
access the Audit Logs. The Audit logs tell you what resource you have loaded,
what user account has accessed it and at what time.

          
An audit log can be useful in a business because
you are able to se who are using any harmful resources and they are able to see
who are trying to install and add unwanted programs on the system. The log will
tell you who is behind all of the suspicious actions.

          
A diskless network is a computer system that
doesn’t have a CD or a floppy drive. There are also no internal hard drives in
order to store the data on. A diskless network stores all of the data on a
network and this can have positive and negative impacts on the user. A positive
impact is that you wouldn’t need to worry about your internal hard drive from
being corrupted. A negative impact however is that if the network is down, then
it will take time for the data to be retrieved again.

          
A diskless network can keep a system secure
because people cannot corrupt the hard drive that is in the computer. Everything
is backed up to another server so it will be easy for the user go get their
data back. It isnt that easy to delete files and folders off a network as the
system would ask for permissions.

          
Handshaking is when two computer systems have
the ability to exchange network connections in order for the systems to
communicate. This is useful for data transfer between a connection between two
computer systems.

          
Handshaking can keep a system secure because
nobody is allowed to send data transfer and handshaking can only take place
only if both of the users are known . Handshaking would not take place if you
have unknown users on either computer.

          
Public and private keys are both examples of
encryption techniques. Public keys is one encryption technique that can be used
in order share files between one another. With private keys however, you are
able to decode the information that you have been received by the public key.
The function of encryption is that everything is unknown. Nobody is able to see
the messages that are sent to one another. Everything is kept private.

          
VPN  is
one ideal way to prevent anybody else from using your network. Most businesses
should have a VPN because it can prevent the network from being slow because it
is used by other people. Having a VPN can also make protect you from any
anonymous people using your network connection. They should use a VPN which
only allows the business to use this preferred network. Organisations using a
VPN is vital because unknown users have no access to the network provided by
the workplace.

          
Call back is a dialling system where admins  have the capability to calling in a network
system. The network will then call them back. This requires a username and also
a password to ensure that the system is secure. It uses a protocol in order to
keep the dialling system secure.

          
There are two types of backup systems. This is
known as incremental and differential systems. Incremental backup is when you
are able to have a shorter backup time. It only backups the data that has been
changed or modified since the previous backup that you have made. Differential
backup however only contains the data that has been changed meaning that it
doesn’t have the data that has been previously backed up.

          
 

          
ADVANTAGE:

          
DISADVANTAGE:

          
With backup systems, you are able to retrieve
files along with getting your data back from a corrupted .

          
When you try to attempt to get your data back,
there is a possibility that you cant get your data back due to the system
recovery files that may be damaged as well.

          
Fast and efficient work to back up your data.

          
Takes up a lot of space and storage

          
Saves more storage space.

          
It is not useful if you carry out a full data
backup.

          
 

          
 

          
 

          
 

          
 

          
 

          
ADVANTAGES

          
DISADVANTAGES

          
You are able to see the bugs and the viruses that are on the computer
system

          
One disadvantage is that you it will cost a lot to replace your
computer system and that you will not be able to retrieve the data that you
have kept on your previous computer system.

          
All of the data would be lost and there is a
likelihood that you wouldn’t be able to replace.

          
You would need to replace your whole system if
there is a hardware fault or if there has been vandalism to the computer
system. It would cost a lot of money for the business and the organisation to
replace all of the computers in the workplace. It would cost a lot of money for
the computers to be replaced . Software that has been installed on the new
system would need to be installed again and if you have invested some money in
the software’s, you may need to buy the program again.

          
 

          
There are 7 tiers of recovering an organisations
system. These are:

1 – Data backup without a dark site: This is when the
backups are taken into account and they attempt to recover the system through
the location of the replacements.
2 – Data backup with a dark site: Copies of the data is made in order to for
the replacement to be made. Copies are generally sent to a control centre.
3 – Electronic vaulting: this is when copies of the system become maintained
and monitored over a period of time.

4 – timed copies: this is when remotely copies are kept in a
local data centre.

5 – Transaction integrity: This is when both of the copies are
syncing together and they are functioning with each other.

6- zero data loss: find the data loss and retrieves the
missing data.

7 – system secured: system is retrieved and all data has
been recovered

          
Disaster policies are ways that your computer
system can be harmed or damaged due to human factors and natural factors.
Factors can include:

          
Natural disasters

          
Human error

          
Power failure

          
Computer viruses

          
System or equipment failure.

ADVANTAGES

DISADVANTAGES

Shows what has caused the data to go e.g. natural disaster
or human error.

It may be difficult for the user to understand what is
going on and how they will work around recovering their data.

          
 

          
Disaster policies are ways that your computer
system can be harmed or damaged due to human factors and natural factors.
Factors can include:

          
Natural disasters

          
Human error

          
Power failure

          
Computer viruses

          
System or equipment failure.

Advantages:

Disadvantages:

The company
would receive funds if their data is lost or corrupted on the system and they
will then use the money to replace the system.

The policy
would not be able to recover the data that is lost or corrupted and if they
do not know the situation that you are in, they may not be able to help you.