Ask a question from expert

Ask now

Analysis of Physical Security - Doc

11 Pages2360 Words121 Views
   

Added on  2021-06-16

Analysis of Physical Security - Doc

   Added on 2021-06-16

BookmarkShareRelated Documents
Information SecurityBy(Name) (Course)(Professor’s Name)(Institution)(State) (Date)Case project 4.2: Analysis of physical security.
Analysis of Physical Security - Doc_1
Introduction.Physical security are hardware systems that detect and delay any malicious individuals or activity from accessing and destroying computer systems1. These physical security systems allow time for intervention by law enforcement such as guards. The levels of security systemsinstalled depend on the factors surrounding the protected devices such as fragility of the system, sensitivity, data encryption and law enforcement response time. Objectives. To determine the level of physical security installed around the workplace’s computer lab. To find out the strengths and weaknesses of the various aspects of the physical security.Methodology. Observations and note taking of the physical security systems around the computer facility. Interviews were conducted to inquire about the levels of security installed and why. Results. The computer facility is located in the underground floor of the main office. The building hosting the main offices and thus the computer facility is fenced with a high brick perimeter wall with a barbed wire on the top to minimize the risk of intruders jumping over2. The perimeter wall is gated. The gate is lockable with a strong padlock that is continually locked and watched over by a security guard. The room hosting the computers is locked using a guard controlled door. There is a manual registry book to record all the entrances and exits into and out of the computer facility, a responsibility of the guard to ensure that everyone accessing the room signs the records book. 1Mo, Y., Kim, T.H.J., Brancik, K., Dickinson, D., Lee, H., Perrig, A. and Sinopoli, B., 2012. Cyber–physical security of a smart grid infrastructure.Proceedings of the IEEE,100(1), pp.195-209.2Weingart, S.H., 2010, August. Physical security devices for computer subsystems: A survey of attacks and defenses. InInternational Workshop on Cryptographic Hardware and Embedded Systems(pp. 302-317). Springer, Berlin, Heidelberg.
Analysis of Physical Security - Doc_2
There are surveillance cameras in the building. One is located in the corridor leading to the computer facility while the second is located in the room itself. The cameras offer a 360 degrees surveillance. After going through the records book, the server computer is located on the right of the building. There is no barrier protecting the server computer, the network cables nor the powerbackup mains supply unit.Discussions.The strengths of the organization’s physical security system are the following:I.Hardware locks are used to keep the gates and the doors locked at all times. II.The server room is well protected in an underground chamber of a well fenced building.III.There are guards manning the server room with a high response time.IV.The records book allows for authentication before accessing the server room.V.The facility is under constant daytime surveillance by the video cameras. The organization has set up a commendable physical security system. However, the followingare some of the noted shortcomings:Individuals with malicious intent can easily bypass the manual logbook used for signing in orout of the server room. A modern technology security authentication system is high recommended such as a smartcard reader or biometric scan kit. Vulnerable devices such as networking cables connected to the main server are not properly protected and thus can allow capturing of data travelling to and from the server3. Workstations connected to the main server, for example the computer at the receptionist desk is not well secured and protected by any physical security system. It can allow a hacker to access the server. The surveillance cameras do not have a night-vision functionality and therefore function poorly under low light. 3Stallings, W., Brown, L., Bauer, M.D. and Bhattacharjee, A.K., 2012.Computer security: principles and practice(pp. 978-0). Pearson Education.
Analysis of Physical Security - Doc_3
There are no tracking devices such as motion sensors in the hidden areas without a guard or surveillance cameras. Such an area includes the direct way from the underground carpark. Conclusion. It is important to secure the computer and its peripheral devices to reduce the activity of malicious individuals such as hackers and thus protect the data of the company. Such systemsneed to be secure enough and complimented with human enforcement such as guards.Case study 5.3: Blowfish.Introduction.Blowfish has never been hacked! Blowfish is an encryption algorithm that uses the symmetrical cryptographic design to encrypt and protect data. Blowfish is a free user licence-free application. In the encryption sequence, blowfish uses the same key for encryption and decryption4. Bluefish generates encryption keys that is very unique that converts the key that varies from 32 bits to 448 bits and tables into sub keys that can be to 4168 bytes in size. Objectives. To understand the functionality of blowfish. To determine the strengths of blowfish. To find out the weaknesses of blowfish as an encryption tool. Methodology.Secondary sources of data such as textbooks and the internet were used to develop the knowledge on Blowfish. Serial hack attempts were made on data encrypted using blowfish. Results. 4Schneier, B., 2009, December. Description of a new variable-length key, 64-bit block cipher (Blowfish). InInternational Workshop on Fast Software Encryption(pp. 191-204). Springer, Berlin, Heidelberg.
Analysis of Physical Security - Doc_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Physical Security: Features, Designs, and Emergency Response Plan
|6
|1504
|182

Assignment on Physical Security3
|5
|739
|16

Security and Vulnerabilities : Assignment
|11
|2140
|57

Enhancing Organizational Security with Access Control and Surveillance
|8
|2757
|235

Physical Security Clients Assessment Name of the University Author's Note
|8
|1523
|125

Masters Of Science In Computer Science
|4
|801
|214