Group 1 and Group 3 Response
Read Group 1 and Group 3
Write about what you learned from response Group 1 and Group 3 response.
Make sure to provide two comments one for Group 1 topics and the other for Group 3 topics.
Label it as Group 1 response and Group 3 response
For Group 1 I would like you to consider the challenges associated with using ID cards and badges as a method for authorizing access to all corporate locations.Â (Therefore it can be the same database that is used for multiple locations.)Â Â What are some of the challenges associated with managing ID cards and badges for a large organization?Â (For an enterprise organization this could be 10,000 plus employees and it could even be 100+ locations.)Â Additionally, what type of doors or turnstiles would you put in place to manage access?Â (The reason I ask is that just doors themselves can be prone to â€œtailgatingâ€ or multiple people entering at once on a single badge.)Â What would you do to minimize â€œtailgatingâ€?Â Final question: What is the difference between a fail-safe and a fail-secure lock?
â€“ Designation of the areas where an ID card/badge is required.
â€“ A description of the type of card/badge in use and the authorizations and limitations placed on the bearer.
â€“ Containing the individualâ€™s name, color photograph or digitized image, the name of the issuing department/organization, date of expiry, and a number unique to the card.
â€“ The required presentation of the card/badge when entering or leaving each area during all hours of the day.
â€“ Details of when, where, and how the card/badge should be worn, displayed, or carried. Also, the inclusion of details such as employee height, weight, hair color and date of birth.
â€“ Procedures to follow in case of loss or damage of the card.
â€“ The disposition of the card/badge upon termination of employment, investigations, or personnel actions.
â€“ Prerequisites for reissuing the card/badge.
Additionally, what type of doors or turnstiles would you put in place to manage access?Â (The reason I ask is that just doors themselves can be prone to â€œtailgatingâ€ or multiple people entering at once on a single badge.)
All access control systems need some type of impartial physical barrier to bar unauthorized entry. This often comes down to some sort of turnstile, revolving door or entry portal. If someone is denied access, the turnstile beeps, lights bright red, snaps a barrier arm into place and alerts a guard. It can outfit turnstiles to close if they detect metal or dangerous chemicals.
Some systems can use weight mats on the floor to ensure only one person enters at a time. Tomsedâ€™s more sophisticated units use ultrasonic sensors to ensure there is only one individual in the space at a time.
A state-of-the-art system may look a lot like Smarter Securityâ€™s Door Detective. It uses an infrared sensor linked to a neural network â€“ software designed to analyze images like a human brain â€“ to determine whether an unauthorized person is attempting to penetrate the door.
What would you do to minimize â€œtailgatingâ€?
A variety of anti-tailgating strategies abound. It is dependent on the specific entry point you want to secure, the layout of the entrance, the reason for controlling access to it, and the flexibility of your budget. I would use a combination of these systems:
â€“ Security guards can visually confirm a badge matches the holder.
â€“ Turnstiles serve as a physical barrier and are good for high-volume traffic.
â€“ Laser sensors can detect multiple people.
â€“ Biometrics deter employees from sharing credentials.
â€“ PIN numbers can be added to card readers.
â€“ Camera analytics enable remote facial recognition.
â€“ Visitor badges ensure temporary guests are documented.
What is the difference between a fail-safe and a fail-secure lock?
Fail-safe locks require power to lock. When power is interrupted by an access control or power outage the door will unlock. Failsafe locks are often used for life safety applications such as the access control of perimeter fire rated exit doors and high rise building stairwell doors where the locks are automatically released by a signal from the building fire life safety command center during an emergency or building power outage. When used on interior doors that do not require connection to the life safety command center, battery back-up power supplies may be used to provide continuous power to electric locks and strikes during a power outage.
Fail-secure locks require power to unlock. When energized by use of an access control the door unlocks. The door will lock or stay locked during a building power outage. A battery back-up power supply may be provided to ensure continued operation during loss of building power. Typically used for high security applications fail-secure locks are not permitted on fire rated doors because they do not unlock during an emergency or power loss.
Here is a challenging one.Â If you have a data breach on your WiFi network, how do you find the user/users and device/devices that have breached it?Â Make sure to provide details to the degree necessary to find the devices.Â This is not easy since a rogue device on a wired network can be found by following the â€œwireâ€.Â This is not the case with WiFi abuse since there is no â€œwireâ€ to follow.Â (When answering the question make sure you are specific and find the necessary tools to do the job.Â You may even want to use the example of a college campus, even if you track the issue down to a specific WiFi Access Point, you may walk into a room or building with 10s or 100s of people in it.Â How do you narrow it down from there???Â Make sure to think how you would do it professionally.)
Tracking down a security breach on a Wi-Fi network is no simple task, but to better explain the basic approach, letâ€™s create the scenario at hand.Â The breach takes place at a local university.Â For simplicity, it is just one building that houses classrooms, admin offices, computer labs, a library, and a server room in the basement.Â The only hard wired objects allowed on the network are university approved devices such as facility work stations, printers, computers in the labs, and wireless access points.Â The wireless access points broadcast an open network for students to log on to, similar to an access point you would find at a Starbucks (not secured).Â The only thing the network blocks are common torrent sites.
To continue on with the story to lay the ground work for this, pretend the university did not splurge for the system with all the bells and whistles (which does not necessarily mean an intrusion would have been prevented, but keeps the story less complicated) but spent enough for a fairly good firewall and intrusion detection system the sits immediately behind the firewall, thus monitoring all traffic on the â€˜secureâ€™ portion of the network.Â They did not use a secure access with WPA/WPA2 requiring university issued credentials to log on (think like the set up here at LTU, but we would not have much of the story because it would be easy to trace).Â Instead, JB, the IT guy only configured the administrator portion of the access point with WEP which has proven very unsafe for networks (itâ€™s not encrypted).
A few more assumptions, because when it comes to computer forensics, this story could go a lot of ways:
â€¢Â Â Â Â Â Â Â Â The attacker would have to remain on the network
â€¢Â Â Â Â Â Â Â Â The detection system behind the firewall picked up unknown traffic which alerted JB
JB quickly looks at the port number the IDS picked up as being an error.Â Unsure of exactly where the issue is stemming from, he launches Wireshark, a free network analyzer tool from his computer and references the port number, not finding anything.Â He then launches another pieces of software from Acrylic Wi-Fi Analyzer.Â The reason he uses this is Wireshark does not handle Wi-Fi analyzing easily and has many known issues, especially on a Windows platform.Â The first thing JB looks for is to see if you can find the port.Â Lucky, Acrylic, the one thing the university did spend some money one, gives the access point.Â Unfortunately, a lot of people can use an access point at once, it just limits down his geographical area.Â He then looks for the DHCP status and get the machine name and record the MAC address.Â If JBâ€™s lucky, the person named their computer with something like â€œJohn Doeâ€ or â€œJohn-PCâ€.Â Bump this up across a student listing and a class schedule, JB may be able to narrow the search down but unlikely, he has other work to do first.
Although this is a university and not some multi-billion dollar company, any data breach should be considered criminal activity until otherwise noted.Â Politically, you would want to protect the organizationâ€™s reputation.Â Some things to consider according to the 2012 Data Protection & Breach Readiness Guide are preservation of areas that were breached.Â So if a server was accessed and administrator level items were changed, you would want to save the log files as evidence.Â JB quickly cross references the port and where the hacker is trying to get.Â He logs onto the firewall administrator account and closes the port but before he does, he screen shots the mac address and DHCP.Â This is for his own reference as well as evidence for any future prosecution.Â JB contacts security and has them meet him as they go to the area around the access point.Â Unfortunately, there are several classrooms and a lecture hall.Â To make matters worse, the DHCP was not a simple one.
JB thinks of two options:
One, he can create a honeypot and attempt to lure the attacker back in at another time or two, he can block that mac address across the entire network.Â JB decides on the latter.Â Most college students only have one laptop.Â If he blocks the mac address, itâ€™s likely the attacker (a student in this case) will bring his computer to the help desk because it â€œwill not connect to the school Wi-Fi but connects everywhere else.â€
JB takes the necessary notes and speaks with the university on what occurred and what his plans are.Â The university increases the budget and plans to increase security are made.
Our Service Charter
Excellent Quality / 100% Plagiarism-FreeWe employ a number of measures to ensure top quality essays. The papers go through a system of quality control prior to delivery. We run plagiarism checks on each paper to ensure that they will be 100% plagiarism-free. So, only clean copies hit customers’ emails. We also never resell the papers completed by our writers. So, once it is checked using a plagiarism checker, the paper will be unique. Speaking of the academic writing standards, we will stick to the assignment brief given by the customer and assign the perfect writer. By saying “the perfect writer” we mean the one having an academic degree in the customer’s study field and positive feedback from other customers.
Free RevisionsWe keep the quality bar of all papers high. But in case you need some extra brilliance to the paper, here’s what to do. First of all, you can choose a top writer. It means that we will assign an expert with a degree in your subject. And secondly, you can rely on our editing services. Our editors will revise your papers, checking whether or not they comply with high standards of academic writing. In addition, editing entails adjusting content if it’s off the topic, adding more sources, refining the language style, and making sure the referencing style is followed.
Confidentiality / 100% No DisclosureWe make sure that clients’ personal data remains confidential and is not exploited for any purposes beyond those related to our services. We only ask you to provide us with the information that is required to produce the paper according to your writing needs. Please note that the payment info is protected as well. Feel free to refer to the support team for more information about our payment methods. The fact that you used our service is kept secret due to the advanced security standards. So, you can be sure that no one will find out that you got a paper from our writing service.
Money Back GuaranteeIf the writer doesn’t address all the questions on your assignment brief or the delivered paper appears to be off the topic, you can ask for a refund. Or, if it is applicable, you can opt in for free revision within 14-30 days, depending on your paper’s length. The revision or refund request should be sent within 14 days after delivery. The customer gets 100% money-back in case they haven't downloaded the paper. All approved refunds will be returned to the customer’s credit card or Bonus Balance in a form of store credit. Take a note that we will send an extra compensation if the customers goes with a store credit.
24/7 Customer SupportWe have a support team working 24/7 ready to give your issue concerning the order their immediate attention. If you have any questions about the ordering process, communication with the writer, payment options, feel free to join live chat. Be sure to get a fast response. They can also give you the exact price quote, taking into account the timing, desired academic level of the paper, and the number of pages.