WK8 Q&A
docx
keyboard_arrow_up
School
American Military University *
*We aren’t endorsed by this school
Course
101
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
2
Uploaded by arodriguezjr84
W8: Future Trends in Security Administration
Wk8
Discussion Questions
:
In detail, how can the concept of cloud computing assist security managers in the
future?
In addition, in what way can the concept of concentric layers apply to the future
design and application of access control and computers?
Offer three specific examples.
I think that cloud computing will benefit security managers by giving them in the aspect of
having one less task to worry about.
As stated in the textbook, “Without a doubt, cloud
computing offers an opportunity for the IT departments to transfer security risks away from
their budgets and to the budget of a vendor.” (Fay, 2010) as well as “Cloud computing: The
private sector is responding by offering smaller organizations a way to transfer technology risks
away from them and to centralize with much larger companies with a professional security
management team.” (Fay, 2010). The fact that the security matters relating to IT will be handled
by an outside vendor, who has more dedicated time and resources to ensure the security of the
company, would somewhat relieve the security managers. It would open their schedule to
worry about the internal physical security of the company that they work for.
The examples that show that concentric layers can apply to the future of design, access control,
and computers are:
Multiple Security checkpoint:
As stated in an article, “
Offering multiple layers of security prior to access to any data systems is
critical to ensuring unauthorized individuals are not able to steal data. For major data centers,
such as colocation facilities or cloud hosting locations, it is often common to have multiple
layers of security prior to accessing the building in the first place.” (
Proton Data Security, 2020
).
This means having IT security as the gatekeeper to prevent unauthorized outsiders from getting
information.
Documentation Systems
Knowing who is accessing documents and when they are accessed is critical. The system would
act as a logbook, and a checklist ensures that the person is doing what he/she is supposed to be
doing. The IT security teams can check at any time to ensure no issues and none are identified.
The article states, “This documentation can also be used alongside biometric locks, user
passcards or similar rack- or cabinet-level access control mechanisms to provide an added level
of visibility into system use.” (
Proton Data Security, 2020
).
Security teams adding more secure
methods to protect documents are open depending on the time of type and the information it
holds.
Specialized locks and Surveillance setups
The IT Security team monitors users through cameras to ensure the safety of the data and the
facility itself. The article states, “Doorways configured with features ranging from anti-passback,
man-traps and similar capabilities effectively bottleneck users entering the data center into
preset pathways where they can be monitored with security cameras.” (
Proton Data Security,
2020
).
Citation:
Fay, J. (2010).
Contemporary security management
. Elsevier Science & Technology.
Proton Data Security. (2020, May 13).
3 layers of physical access control and what they mean for
decommissioning
. https://www.protondata.com/blog/data-security/3-layers-physical-
access-control-mean-decommissioning/
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help