For this Discussion Board, please share the information you provided in last week's Individual Project Assignment with your classmates. Additionally, examine yours as well as your classmates' protocol

ISOL-634-20 Physical Security



For this Discussion Board, please share the information you provided in last week's Individual Project Assignment with your classmates. Additionally, examine yours as well as your classmates' protocol 1

Nidheesh Raju Baskaruni

University of the Cumberlands

ISOL634-20 Physical Security

Week 7 Individual Project

Professor Richards

06/23/2019







Physical security involves a description of the measures that have been set up to prevent unauthorized personnel from gaining access to the equipment or information being protected. The physical security system involves the application of several systems that have been licked with one another. Some of the involved equipment involves locks access control and cameras, among other equipment that is inter-joined to ensure that the security is up to the task. Today, due to technological advancement, the physical security systems have been advanced greatly so that to counter the many attacks that have been taking place against the setup security systems. (Sinopoli, 2011)

In the year 2012, several security attacks took place that called for more attention to a more secure security system. Some of the major attacks include the Homebrew tool worth $50 that unlocks hotel doors which involved the method of putting a plug on the door port and then changing the screws of the door. This tool led to a lot of security issues in the hotels as the security was under a very high risk. The company that made the locks came up with a plan that would help solve this problem, which involves swapping out the circuit boards of all the affected locks, which were the major target of the hackers. (Smith, 2015)

So that to control the problem, I would include the following steps so that to ensure that the problem does not occur in the future. The first step would be to set up mandatory steps that must be followed when it comes to making the security locks. This would include preventing unauthorized personnel from accessing the formulae of decoding the lock code. By reducing the number of people who can access the delicate information would prevent interference of the lock systems.

Another important step is to maintain the trust and also the confidence of the people working in the organization. Looking at the events that led to modified chips that were used to unlock the hotel locks, some of the workers might have been involved in letting out vital information that helped the hackers. By creating a good team of employees, it will ensure cooperation among themselves and will also help to reduce cases of bridging vital information.

The 2nd article is about TJX Companies, Inc. in the year 2006, which involved exposing 94 million credit cards to unwanted personnel. A group of hackers was able to get hold of the delicate data during information transfer between two Marshall Stores. Some also broke into their network, which enabled people to apply for jobs electronically. The main copulate was arrested later in the year 2010.

However, the company would have done better to prevent such a risk. The first procedure is to ensure that the security systems are up to date. By ensuring that the systems have an updated system and also the personnel is well equipped with the required knowledge helps the company when it comes to addressing any security threat. In the above case, the hackers had the upper chance of getting into the system, which would be different. (Slim, 2014)

The company would have prevented such a risk by ensuring that the client data is surer. To achieve this, the system should be automated in such a way that the client is automatically notified when the information is accessed by the third party. This can be done by emailing the client for them to guarantee the authority to access the information. This method will be efficient as it will notify both the company and the client in case of any strange activities.

Good security in an organization leads to advance information storage and also a profitable company that can be trusted by customers. Frequent checkups and system improvement will always ensure that the organization stands a chance of addressing any technical issues affecting the organization. (Kremer, 2016)

References:

Sinopoli, B. (2011). Cyber-physical security of smart grid infrastructure. Proceedings of the IEEE100(1), 195-209.

Smith, E. K. (2015, May). Build it yourself!: homegrown tools in a large software company. In Proceedings of International Conference on Software Engineering-Volume 1 (pp. 369-379). IEEE Press.

Salim, H. M. (2014). Cyber safety: Systems thinking and systems theory approach on managing cybersecurity risks (Doctoral dissertation, Massachusetts Institute of Technology).

Kremer, S. (2016). Automated analysis of security protocols on global state. Journal of Computer Security24(5), 583-616.