WK8 Q&A

docx

School

American Military University *

*We aren’t endorsed by this school

Course

101

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

2

Uploaded by arodriguezjr84

Report
W8: Future Trends in Security Administration Wk8 Discussion Questions : In detail, how can the concept of cloud computing assist security managers in the future? In addition, in what way can the concept of concentric layers apply to the future design and application of access control and computers? Offer three specific examples. I think that cloud computing will benefit security managers by giving them in the aspect of having one less task to worry about. As stated in the textbook, “Without a doubt, cloud computing offers an opportunity for the IT departments to transfer security risks away from their budgets and to the budget of a vendor.” (Fay, 2010) as well as “Cloud computing: The private sector is responding by offering smaller organizations a way to transfer technology risks away from them and to centralize with much larger companies with a professional security management team.” (Fay, 2010). The fact that the security matters relating to IT will be handled by an outside vendor, who has more dedicated time and resources to ensure the security of the company, would somewhat relieve the security managers. It would open their schedule to worry about the internal physical security of the company that they work for. The examples that show that concentric layers can apply to the future of design, access control, and computers are: Multiple Security checkpoint: As stated in an article, “ Offering multiple layers of security prior to access to any data systems is critical to ensuring unauthorized individuals are not able to steal data. For major data centers, such as colocation facilities or cloud hosting locations, it is often common to have multiple layers of security prior to accessing the building in the first place.” ( Proton Data Security, 2020 ). This means having IT security as the gatekeeper to prevent unauthorized outsiders from getting information. Documentation Systems Knowing who is accessing documents and when they are accessed is critical. The system would act as a logbook, and a checklist ensures that the person is doing what he/she is supposed to be doing. The IT security teams can check at any time to ensure no issues and none are identified. The article states, “This documentation can also be used alongside biometric locks, user passcards or similar rack- or cabinet-level access control mechanisms to provide an added level of visibility into system use.” ( Proton Data Security, 2020 ). Security teams adding more secure methods to protect documents are open depending on the time of type and the information it holds.
Specialized locks and Surveillance setups The IT Security team monitors users through cameras to ensure the safety of the data and the facility itself. The article states, “Doorways configured with features ranging from anti-passback, man-traps and similar capabilities effectively bottleneck users entering the data center into preset pathways where they can be monitored with security cameras.” ( Proton Data Security, 2020 ). Citation: Fay, J. (2010). Contemporary security management . Elsevier Science & Technology. Proton Data Security. (2020, May 13). 3 layers of physical access control and what they mean for decommissioning . https://www.protondata.com/blog/data-security/3-layers-physical- access-control-mean-decommissioning/
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help