Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

answer the below questions

1)Take a tour of your building on campus or at work. What is secured at night when workers are absent? Record the location and type of physical access control devices.How do these access controls change at night when workers are absent? How well trained do guards and other employees appear to be? Do they allow, “piggybacking” (somebody slipping into a facility behind an authorized individual without being challenged)? What are the policies for visitors and contractors? How does this all impact physical security?

2)If possible at either your place of employment or your school, attempt to determine how easy it would be to perform dumpster diving to gain access to information at the site. Are trash receptacles easy to gain access to? Are documents shredded before being discarded? Are areas where trash is stored easily accessible?

3)How are authentication and authorization alike and how are they different? What is the relationship, if any, between the two?

4)Discuss the differences between an anomaly-based and a misuse based detection model. Which would you use to protect a corporate network of 10,000 users? Why would you choose that model?

I need each question atleast 1and half page with 0% plagiarism 

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question