A factory manager has hired your company to
develop and install a surveillance system in a factory. The system includes cameras small
enough not to be noticed. Supervisors and security personnel can view images and record audio
in real-time on monitors in a control room. The system will also store video. The factory
manager has not disclosed the placement locations for the new system. The factory manager
says the purposes are to watch for safety problems and for theft of materials by workers. What
issues, specifications, and policies will you discuss with the factory manager or your company?
What would you do?
1) Who are the skateholders?
2) What are the risk, issues, problems, and consequences?
Trending nowThis is a popular solution!
Step by stepSolved in 2 steps
- Describe the processes and procedures involved in managing security, faults, and performance. Detail how the system handles security incidents, problems, and overall performance.arrow_forwardYour company uses security badges with embedded RFID tags to authenticate the rooms to which employees have access. This badge also grants employees access to the company's parking lot. When arriving at work one morning, you wave your badge in front of the RFID reader, but the gate that allows access to the parking lot does not open. In addition, a red-light blinks on the RFID reader. What are your next steps?arrow_forwardSecurity lights include switches and motion sensors. System operation is toggled. The mechanism is disarmed while the switch is off. The switch turns off the light but arms the mechanism. The motion sensor activates the light when the system is armed. The light turns off after 10 seconds of inactivity.UML state diagram the "security light system" states.arrow_forward
- When confronted with a catastrophic event, it is important to carefully evaluate and deliberate upon the available choices. What are the main differences between a conventional computer backup system and a mobile backup solution?arrow_forwardRecording your results will be much easier if you make use of a wide range of analytical instruments.arrow_forwardIn your opinion, what is the best method or instrument for locating security holes? Why?arrow_forward
- Computer Networking: A Top-Down Approach (7th Edi...Computer EngineeringISBN:9780133594140Author:James Kurose, Keith RossPublisher:PEARSONComputer Organization and Design MIPS Edition, Fi...Computer EngineeringISBN:9780124077263Author:David A. Patterson, John L. HennessyPublisher:Elsevier ScienceNetwork+ Guide to Networks (MindTap Course List)Computer EngineeringISBN:9781337569330Author:Jill West, Tamara Dean, Jean AndrewsPublisher:Cengage Learning
- Concepts of Database ManagementComputer EngineeringISBN:9781337093422Author:Joy L. Starks, Philip J. Pratt, Mary Z. LastPublisher:Cengage LearningPrelude to ProgrammingComputer EngineeringISBN:9780133750423Author:VENIT, StewartPublisher:Pearson EducationSc Business Data Communications and Networking, T...Computer EngineeringISBN:9781119368830Author:FITZGERALDPublisher:WILEY