logo

Unauthorized Access to Computer Systems: Problem and Solutions

   

Added on  2023-06-04

4 Pages832 Words68 Views
PROBLEM SOLUTION
Sears

The Problem of Unauthorized Access to Computer Systems
The problem of Access to Computer Systems has been an issue due to the unauthorized users
who need to have access to the computers. It has become even more challenging due to various
types of users who need different levels of access. For example, contactors, business partners,
the outsiders who don’t work in the business boundaries and the internal users. The business
resources have got various classification levels i.e. internal use only, or the resource is private or
even it is confidential. This requires that the diversity identity, data should be stored in different
types, for example business credentials, business contact information, related work data and
even the passwords, (Bell & LaPadula, 2013).Unauthorized access to computer systems is also
challenged by the fact that the corporate environment is continually changing which affects the
business needs, employee roles and workings, and their resource access needs.
Ways of Unauthorized Access
Tailgating
Tailgating occurs when any person follows an authorized user through the door. This brings the
whole building to risk because the user will have hold the door for an authorized user which out
of order. This can be minimized by training all authorized users on the need of security. Alarms
can be used to detect unauthorized users..
Door Keys
Keys poses a big problem because they are very hard to track when they get lost or forgotten and
if any person tends to enter the room. At this time there is a lot of danger and the only way to
prevent the unauthorized access is to ensure security of the room is to use re-core locks which
tends to be very expensive, (Forman & Zahorjan, 2014).

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment on Risks and Risk Management
|11
|781
|13

ICTNWK509 Design and Implement a Security Perimeter for ICT Networks
|11
|2802
|16

Host and Application Security
|9
|1653
|308

Safe Computing | Presentation
|12
|468
|41

Introduction to Cyber Crime Week 5
|6
|843
|323

National Institute of Standards and Technology (NIST) Cyber Security Framework and Terminologies
|11
|1515
|26