StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Access Control and Physical Protection - Essay Example

Cite this document
Summary
The paper "Access Control and Physical Protection" is a good example of an essay on information technology. Security through obscurity is a principle in which a user protects data or other things by concealing them in the computer device. This permits the person who kept the data to have sole access to them and retrieve for future usage without the knowledge of the other users…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful
Access Control and Physical Protection
Read Text Preview

Extract of sample "Access Control and Physical Protection"

The paper "Access Control and Physical Protection" is a good example of an essay on information technology. Security through obscurity is a principle in which a user protects data or other things by concealing them in the computer device. This permits the person who kept the data to have sole access to them and retrieve for future usage without the knowledge of the other users (Pfleeger & Pfleeger, 2012). An example of this concept of security through obscurity is creating a new encryption algorithm and not informing others about it. The encryption algorithm distorts information in such a way another user cannot be able to understand its true meaning (Gollmann, 2010).

However, security without obscurity also happens in real-life situations not involving computers. For instance, a person may lock his or her door and hide the keys in a bush near the house. This occurs in situations where housemates share one key to access the house but get home at different times.
Security through obscurity is not an effective countermeasure in either example above because a third party can easily notice the tricks. It is apparent that security through obscurity must have backups if it is the only measure adopted by the users (Pfleeger & Pfleeger, 2012). Failure to have a backup plan may cause problems if one cannot remember where the thing or the data was secretly kept.
The physical security aspect of protecting computer assets relates in this case because it involves the protection against theft of equipment and data contained in the computer (Gollmann, 2010). For instance, it entails protecting access to confidential information, programs or hardware by third parties that may cause harm to an organization or individual. An example of the physical security aspect is the use of passwords or keys and lock to avoid unauthorized persons from accessing employee payroll or personal information (Pfleeger & Pfleeger, 2012).  Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Access Control and Physical Protection Essay Example | Topics and Well Written Essays - 250 words, n.d.)
Access Control and Physical Protection Essay Example | Topics and Well Written Essays - 250 words. https://studentshare.org/information-technology/1885906-access-control-physical-protection
(Access Control and Physical Protection Essay Example | Topics and Well Written Essays - 250 Words)
Access Control and Physical Protection Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1885906-access-control-physical-protection.
“Access Control and Physical Protection Essay Example | Topics and Well Written Essays - 250 Words”. https://studentshare.org/information-technology/1885906-access-control-physical-protection.
  • Cited: 0 times

CHECK THESE SAMPLES OF Access Control and Physical Protection

Review of DEFRAs Six Areas of Responsibilities

… METHOD STATEMENTThe Department for Environment, Food and Rural Affairs, commonly known as DEFRA is a Department of the Government of the United Kingdom that is in-charge of protecting the environment by encouraging households, business establishments METHOD STATEMENTThe Department for Environment, Food and Rural Affairs, commonly known as DEFRA is a Department of the Government of the United Kingdom that is in-charge of protecting the environment by encouraging households, business establishments and local authorities to align their activities in the protection of the environment particularly in mitigating climate change and pollution....
18 Pages (4500 words) Essay

Threats to E-Commerce

… The paper "Threats to E-Commerce" is a wonderful example of an assignment on e-commerce.... Information is generated by certain activities especially specific groups of people or the knowledge workers.... A knowledge worker is one that is adept at the performance of tasks that require people to transcribe data and information in order to suit a certain specified and predetermined purpose....
9 Pages (2250 words) Assignment

Activities for Systems Security

As earlier mentioned, the security IT security issues of concern revolves around three main areas; physical, human, and electronic.... physical security comes into focus as the computer equipment and other resources may be stolen by the staff, students, and/or other employees within the institution.... In this regard, various information assets within the organization are a target of hackers; physical assets, human assets, and electronic assets....
11 Pages (2750 words) Essay

Protecting Local Firms by Their Governments

This protection of local companies against foreign unfair competition helps the local infant firms to grow and have a competitive advantage against international industries.... … The paper "Protecting Local Firms by Their Governments " is an outstanding example of management coursework....
6 Pages (1500 words) Coursework

Security, Threat, Exposure and Vulnerability in Relation to Business Information Systems

Security in relation to business information systems is the information and information systems protection against modifications or unauthorized access of the information (Arthur, J.... Security in relation to business information systems is the information and information systems protection against modifications or unauthorized access of the information (Arthur, J.... Possible threats allow hackers or unauthorized persons to gain access to the information system without being noticed or recognized by the information system....
6 Pages (1500 words) Assignment

Information Technology and Management Analysis

… The paper "Information Technology and Management Analysis" is a good example of a Business case study.... According to CSU policies, Cal Poly must make sure that its information resources during the cataclysmic occasions system can still operate and can be accessed by its users.... Cal Poly developed, documented, tested, and maintained a business continuity plan....
8 Pages (2000 words) Case Study

Systems Approach to Physical Security

This would encompass both logical and physical approaches (Fisher & Green, 2003).... This literature review provides an argument towards a fundamental method to the security of assets comprises of a systems method that derives on concepts comprising'Defence in Depth,' Security in Depthin addition to protection in Depth.... … The paper "Systems Approach to physical Security" is an outstanding example of management coursework.... The paper "Systems Approach to physical Security" is an outstanding example of management coursework....
9 Pages (2250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us