PREVENTIVE
TECHNIQUES

MOHAMMED
KHAN

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

UNIVERSITY
OF CUMBERLANDS

 

 

 

 

 

 

 

 

 

 

 

 

ABSTARCT:

I am going to take the
example where physical security was at risk. I will be considering few examples
where the security was at risk, I am going to consider an example involving the
physical security of an IT company where few preventative measures would have
helped the company from being hacked.

 

 

MEASURES
THAT COULD HAVE PREVENTED THE THREAT OF PHYSICAL SECURITY

A)    LOCK UP SERVER ROOM

Indeed, even before you
secure the servers, actually, before you even turn them on out of the blue, you
ought to guarantee that there are great bolts on the server room entryway.
Obviously, the best secure on the planet does no great on the off chance that
it isn’t utilized, so you additionally require strategies requiring that those
entryways be bolted whenever the room is vacant, and the arrangements should
set out who has the key or key code to get in.

B)    SET UP OBSERVATION

Locking the way to the
server room is a decent initial step, yet somebody could soften up, or somebody
who has approved access could abuse that expert. You require an approach to
know who goes in and out and when. A log book for marking in and out is the most
natural approach to achieve this, yet it has a great deal of disadvantages. A
man with noxious aim is probably going to simply sidestep it. A superior
arrangement than the log book is a validation framework fused into the locking
gadgets, with the goal that a shrewd card, token, or biometric examine is
required to open the entryways, and a record is made of the character of every
individual who enters.

C)    USE RACK MOUNT SERVERS

Rack mount servers not
just take up less server room land; they are additionally less demanding to
secure. Albeit littler and ostensibly lighter than (a few) tower frameworks,
they can without much of a stretch be bolted into shut racks that, once stacked
with a few servers, would then be able to be darted to the floor, making the
whole bundle relatively difficult to move, considerably less to take.

D)    DON’T OVERLOOK THE WORK STATIONS

Programmers
can utilize any unsecured PC that is associated with the system to get to or
erase data that is essential to your business. Workstations at vacant work
areas or in discharge workplaces, (for example, those utilized by
representatives who are on an excursion or have left the organization and not
yet been supplanted) or at areas effortlessly available to pariahs, for
example, the front assistant’s work area, are especially defenceless.

E)    KEEP INTERLOPERS FROM OPENING THE
CASE

The two servers and
workstations ought to be shielded from criminals who can open the case and
snatch the hard drive. It’s significantly simpler to grab a hard circle in your
pocket than to take a full pinnacle away the premises. Numerous PCs accompany
case locks to avert opening the case without a key.

REFERENCE

Sarma, S. E., Weis, S. A., & Engels, D. W. (2002, August). RFID
systems and security and

privacy implications. In International Workshop on
Cryptographic Hardware and Embedded Systems (pp. 454-469). Springer, Berlin, Heidelberg.

Yu, H., Kaminsky, M., Gibbons, P. B., & Flaxman, A. (2006, September).
Sybilguard:

defending against sybil attacks via social
networks. In ACM SIGCOMM Computer
Communication Review (Vol. 36, No.
4, pp. 267-278). ACM.

x

Hi!
I'm Erica!

Would you like to get a custom essay? How about receiving a customized one?

Check it out