Access Control: Students Name Professors Name Affiliated Institution Course Date
Access Control: Students Name Professors Name Affiliated Institution Course Date
Access Control: Students Name Professors Name Affiliated Institution Course Date
Access Control
Students Name
Professors Name
Affiliated Institution
Course
Date
2
Access Control
Access control entails to a specified and selective restricted access to a premises, resource
or asset that has some essence or value to a business, entity or owner. As a physical security
specialist, access control is one step of ensuring that a resource is protected from malicious intent
or damage. There are various ways to which the security of a resource can be compromised.
These threats can either be natural, human intended or a mistake without prior intent. To ensure
the security is uphold one has to take various measures that prioritize and keep the resources safe
One case of security consideration is an airport. First, looking at the security threats of an
airport. Airport security can be compromised first by terrorist from unknown locations anywhere
in the world, armed robbery, hijackers, cyber attacks, information sabotage and forgery. IOT
today is used in every single business entity either directly or indirectly. With airports depending
largely on communication threats related to IOT pose a major concerns for the organization. One
such threat are the Trojans and viruses. These threats infect a system and affects the functionality
and data in them hence may cause delays and data loss of clients.
The internet of things, (IOT) has been termed as the future of the internet. With more and
more devices requiring connection to the internet for optimal functionality, the security of IOT
devices must be a priority for every organization. One method used in the optimization of
security of security at organization is the use of encryption (Ahmed, et al., 2017). Encryption
entails to changing the day so that anyone unauthorized accessing the information cannot
understand it. This gives the data security Incase of a successful attack( Kohls, K., et al, 2020) .
3
Another approach to safeguarding data in IOT devices is putting the organization network
protection through setting up a firewall when connecting the internal organization network to the
internet. As much as the internet is a useful resource, it comes with very serious threats to a
business. A firewall acts as the first defense to the network and all devices in the network.
Through a firewall, viruses, malwares, malicious programs, websites containing malwares and it
also gives the organization user control over some websites and applications( Wegner, 2017).
One method to ensure security of an enterprise is through the use of and enterprise
security architecture (Arconati, N. 2019) The enterprise security architecture defines and
displays the conceptual design of the network security infrastructure. It also outlines the
procedures needed to be followed to arrive at a secure computer network and finally the design is
based of set international and local policies for ensuring security of a network. The enterprise
security architecture is used in the providing of security for cooperate information. Corporate
information is crucial to day to day decision making and running of an enterprise hence requires
The domain name address and systems allows users In a network access the internet
easily via a domain address without necessarily trying to use up addressing for every user in the
network. This also allows workers and client end computers share files and folders via the
company domain address. It is critical for businesses to ensure they uphold optimal network
infrastructure to ensure reliability of the network. The security of the domain address is then
critical for all business requirements. One way to ensure success is not to place the domain name
server and address on the same subnet as the router or single choke point.
Another approach I would use as a physical security analyst is to install the DNS server
on different platforms. This will allow the network be network independent and reliable in case
4
of operating systems server crash or attack. The application of DNS server on different servers is
possible through using different types of operating systems and as a platform for hosting the
DNS server. I would also use the split horizon DNS (Chor, L., 2021) Slip horizon DNS allows
for hiding of the DNS server from hackers and people with malicious intentions.
As a physical security analyst, I would also have a look at the Security risks in existing
wireless sensor networks protocols. Ensuring security in wireless sensor networks allows for
ensuring of trust in the network well talking of cooperate information in the internal company
network. According to Tonic, (2017). “a combination of resource restrictions and the physical
exposure of sensor devices inevitably cause such networks to be vulnerable to security threats,
both external and internal” hence it is crucial that one addresses the need for a good security
One very efficient and reliable software is the victory access control software. This
surveillance and reconnaissance or electronic warfare. Such an application can be very efficient
in determining the security of an organization as it covers almost all aspects of the security.
However, the victory system requires expert understanding of networking, security and computer
systems to have efficient and effective running of the system(Ahmed, et al., 2019). Not everyone
can understand the working of the system making it A bit difficult to conceptualize for person’s
outside the career point. Different components of security can be Compromised as the
organization should not be dependent of external or outsourced security solutions but rather have
I would conventionally analyze the physical security not only by looking at the network
and technological components but also the physical aspect. Today technology has made
5
surveillance easy through the use of devices such as cctv systems and a sensors. Through such
systems the network is fast protected from physical attacks or proximity access( Chen, 2019).
Most computer systems can only be hacked if only someone gets access to a network close to or
within the organization through physical protection almost all of the other types of attacks can be
prevented and secured from occurring hence giving chance for a full proof access to the system.
Today cctv surveillance equipment come with international standard protocols that allow for
unhindered access and follow strict security protocols. Hence I would fast ensure the premises is
well equipped with surveillance and security systems to prevent unauthorized access.
Another physical access control mechanism is the establishment of Fences and electric
proofing. Fences take on and restrict the business to one access point. Through containing the
business via one access point also limits the access of people with malicious intentions. At the
one allowed entry and exit point the security protocols can then maximize security by placing
security personnel at the point and using security systems such as biometric screening and access
codes for anyone accessing the ( Salim, M. M., 2020), screenings restrictions also limits and
allows access for employees working in the area. Restricted access then helps the internal
The other concern for any organization is the possibility of social engineering within the
organization. Social engineering refers to potential use of internal personal to influence the
business processes and attack the organization from inside. Such a threat involves one of the
greatest threats to the business and is Extremely difficult to prevent or protect from. One suitable
refraining from such actions in the best way possible. It such a situation ethics and morals of
6
employees plays an essential role in making sure the business stays secure. However as much as
ethics come in play most people are easily manipulated through money or other valuable items.
any consideration for the protocols and procedures necessary for ensuring security of the
business. Most case are usually taken seriously after an even has occurred requiring the need for
a security expert. Most people act only after regret. These situations usually lead to unprepared
expenses and costs leading to insufficient security preparations. The importance of business
operations can not be measured as the business depends on the operations and service rendering
measures to ensure the business is secure. As a physical security analyst, one has to look for
every loophole in the security that may affect business operations. As more technological
advances suffice, there are more approaches to making businesses successful. And as well there
are increased advances in threats possible to happen and Impact to the business. The set up
protocols and measure against security threats can never seem to be sufficient as one needs to
have more and more aspects to be put into consideration( Cynthia, 2019). The task of ensuring
security is always continuous as longs as business services continue being rendered and the
business continues being successful. Business competition usually rises to be the biggest threat to
the business.
7
Reference
https://www.semanticscholar.org/paper/One-Approach-to-Enterprise-Security-
Architecture-Arconati/4c9c73a8f84a2d3b398f63ffdc0b9ed5f173dd93
M. M. Ahemd, M. A. Shah and A. Wahid, “IoT security: A layered approach for attacks &
Chor, L., (2021)DNS Security Considerations and the Alternatives to BIND. Retrieved from
https://www.sans.org/white-papers/567/
Ahmed, H. I., Nasr, A. A., Abdel-Mageid, S., & Aslan, H. K. (2019). A survey of IoT security
threats and defenses. International Journal of Advanced Computer Research, 9(45), 325-
350.
Chen, H., Pendleton, M., Njilla, L., & Xu, S. (2019). A survey on Ethereum systems security:
Wegner, A., Graham, J., & Ribble, E. (2017). A new approach to cyberphysical security in
industry 4.0. In Cybersecurity for Industry 4.0 (pp. 59-72). Springer, Cham.
Cynthia, J., Sultana, H. P., Saroja, M. N., & Senthil, J. (2019). Security protocols for IoT. In
Ubiquitous computing and computing security of IoT (pp. 1-28). Springer, Cham.
Salim, M. M., Rathore, S., & Park, J. H. (2020). Distributed denial of service attacks and its
Kohls, K., Rupprecht, D., Holz, T., & Pöpper, C. (2019, May). Lost traffic encryption: