Get premium membership and access questions with answers, video lessons as well as revision papers.

List five physical security procedures that Kasuku might adopt to make sure that its information is secure.

      

List five physical security procedures that Kasuku might adopt to make sure that its information is secure.

  

Answers


gregory
Physical security procedures that may be adopted:
1. Bolting door locks –These require the traditional metal key to gain entry. The
keyshould be stamped =Do not duplicate.‘
2. Combination door locks –These utilize a numeric keypad or dial to gain entry.The
combination should be changed at regular intervals or whenever an employee with
access is transferred, fired or subject to disciplinary action.
3. Electronic door locks –These utilize a magnetic or embedded chip-based
plasticcard key or token entered into a sensor card reader to gain access. A special
code internally stored in the card or token is read by the sensor device that activates
the door locking mechanism.
4. Biometric door locks – An individual‘s unique body features, such as voice,
retina,fingerprint or signature, activate these locks.
5. Manual logging – All visitors should be required to sign a visitor‘s log
indicatingtheir name, company represented, reason for visiting and person to see.
Logging should be at the front reception desk and at the entrance to the computer
room.
6. Electronic logging –All access should be logged with unsuccessful
attemptshighlighted.
7. Identification Badges (Photo Ids)–Badges should be worn and displayed by
allpersonnel. Visitor badges should be a different colour from employee badges for
easy identification.
8. Video cameras –They should be located at strategic points and monitored
bysecurity guards.
9. Security guards –They could be used together with video cameras for efficiency.
10. Controlled visitor access –All visitors should be escorted by a
responsibleemployee.
11. Alarm systems –should be linked to inactive entry points, motion detectors andthe
reverse flow of enter or exit only doors.
12. Controlled single entry point.A controlled single entry point monitored by
areceptionist should be used by all incoming personnel.
gregorymasila answered the question on February 7, 2018 at 14:19


Next: List and describe briefly FOUR potential benefits, the company is likely to experience in the adoption of CAD.
Previous: The introduction of a computer-based information system in an organization can generate some amount of fear and reluctance to change on the part of users. Required: (a)...

View More Computer Science Questions and Answers | Return to Questions Index


Learn High School English on YouTube

Related Questions