Suppose that you are appointed as Chief Security Office (CSO) in an organization which deals with very critical and classified resources. The resources are so highly confidential that only authorized personnel should be given access to this facility. Access to unauthorized people may cause severe threats to national security. This facility is newly built and currently doesn’t have any automated information technology-based authentication system. After being appointed as CSO, the first task you have been assigned is to design an IT based authentication system which verifies the identity of a person when he/she wants to access the facility. Propose and explain an authentication system which can be used for verification of employees to let only those personnel give access to classified resources who have proper access rights. Please note that single factor authentication may not serve the purpose well.
Trending nowThis is a popular solution!
Step by stepSolved in 2 steps
- In your view, which technique or tool is the most effective for determining the location of security loopholes? Why?arrow_forwardWhat does it mean to you to be on the safe side of things? Maintaining one's safety in the real world is becoming an increasingly challenging endeavor. Is it conceivable for a single assault on the infrastructure of an organization to take on a number of diverse forms?arrow_forwardHow would you go about convincing several parties of the need for a solid security culture? How do you make it seem genuine and applicable to those who aren't technically savvy?arrow_forward
- A security framework can assist in the design and execution of a security infrastructure, but how exactly does it do so? What distinguishes information security governance from other types of governance is the extent to which it differs. Is there someone in the organization who should be in charge of preparing preparations for such an event?arrow_forwardWhere do you believe the responsibility for information security begins and ends in a company? In order to know when security policies and procedures become active and inactive, we must know how much control the organization has over those times. Perceived or actual, do you think any of these boundaries will be increased in size? If this is the case, tell us how and why you went about it. If this isn't the case, why is that?arrow_forwardThere are two graphs presented from the CERT on reported incidents and vulnerabilities. Keep in mind the difference between an incident and vulnerability. While these charts are dated they still provide valuable trend information that continues to rise. Today, both security incidents and security vulnerabilities continue to rise for a variety of reasons. What reasons can you provide for the continuing upwards trend in the number of incidents reported? You should provide at least four (4) reasons with supporting data and reasoned arguments to support your answer. Good answers will provide facts, reasoned arguments and references that go beyond anecdotal information. Explain using facts, reasoned arguments and references that go beyond anecdotal information and link to sources. PLEASE ADD YOUR SOURCES! Please have clear writing as well! Thank you!arrow_forward
- How would you go about convincing several parties of the need for a solid security culture? How can you make it meaningful and genuine for those who aren't experts in the field?arrow_forwardMake a convincing case in your own words for and against the advantages and downsides of division of responsibilities in an organization's information security policy, using a practical example from your own professional experience.arrow_forwardIn the context of the concept of safety, what does the term "security" even entail? Which current issues with physical security are most pressing, and how may they be fixed? There are a wide variety of ways in which an organization might be attacked.arrow_forward
- We are very dependent on technology for ALL security needs. what are some of the common things you see as physical security gaps in your organization or any organization in which you have worked?arrow_forwardThink about the many kinds of security clearances we'll go through, and decide on specific cases. The preceding is illustrative. There are many different types of access control systems, including: Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), Rule-Based Access Control (RBAC), Risk-Adaptive Access Control (RAC), Identity-Based Access Control (IBAC), Organization-Based Access Control (OBAC), and Rule-Based Access Control (RBAC).arrow_forwardHow may you convince a diverse group of stakeholders that a strong security culture is necessary? How do you make it relevant and authentic for those that aren't technically savvy?arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education