logo

Role of Physical Security and Cryptography in Information Security

   

Added on  2023-06-11

10 Pages2104 Words490 Views
 | 
 | 
 | 
The University of Southern Queensland (USQ)
CIS5205 Management of Information Security
Assignment 2
27 August 2018
Submitted To:
Dr. Michael Lane (Course Examiner)
Submitted By:
Joe Bloggs (Student Name)
(USQ SID 12345678)
Total Words: About 1500 Words
1
Role of Physical Security and Cryptography in Information Security_1

Contents
Role of Physical Security in Information Security.................................................................................3
Key Risks to Information Technology Assets due to Poor Physical Security....................................3
Physical Security Controls.................................................................................................................4
Critical Role of Cryptography in Information Security.........................................................................6
Three Main Types of Cryptography Algorithms................................................................................6
Application of Cryptography Algorithms to ensure Information Security.........................................7
List of References................................................................................................................................10
2
Role of Physical Security and Cryptography in Information Security_2

Role of Physical Security in Information Security
Key Risks to Information Technology Assets due to Poor Physical Security
Stealing of Devices
The first form of security risk that may emerge due to poor physical security is the stealing of
information technology devices. There are mobile devices, such as Smartphones, laptops, and
tablets used by the employees in the organization to carry out the business tasks and
operations. These devices contain a lot of sensitive and critical information that needs to be
protected. Poor physical security provides the attackers with the chance to steal the devices
and explore the information stored within. The mobile devices can easily be kept hidden in
the bag or pockets to take away the same outside the organization without the due permission
to do so (Schultz, 2007).
Employee Assault for Information Retrieval
There are a lot of employees that work in the business organization and each of these
employees has access to certain data sets associated with the organization. The lack of
adequate physical security controls may allow the malevolent entities to enter in the premises
of the organization. These entities may belong to a competitor in the market and may assault
an employee to gain sensitive or critical pieces of information from the employee. This will
put the information sets at risk of losing the confidentiality and privacy of the data.
3
Role of Physical Security and Cryptography in Information Security_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents