Concept explainers
a)
Explanation of Solution
Walls and Doors:
Walls and doors act as the obstacles and prevent form stealing resources or information...
b)
Explanation of Solution
Access Control:
Access control is categorized into two. They are:
Physical access control: The objective of physical access control is to guard the physical resources of a particular organization. The physical resources may be people, systems, hardware and so on.
Logical access control: The objective of physical access control is to guard the critical data that could be taken by an intruder without accessing physical devices. They are technology-based control that includes intrusion detection system, antivirus software, and firewalls.
Factors considered for the server room:
The organization will consider many security controls to protect their resources and precious data...
c)
Explanation of Solution
Fire detection:
Fire detectors are used to find out the phenomena resulting from fire like, smoke, gas, ultraviolet radiation, infrared radiation, etc. By using fire detectors, it is possible to save lots of lives and protects assets in an organization...
d)
Explanation of Solution
Fire suppression:
- Fire suppressor is used to eliminate fire from particular areas. They are of portable and manual types. Mostly portable extinguishers are more efficient for smaller fire.
- Fire suppression system quells fires by eliminating either oxygen or fuel, or it reduces the temperature.
- Fire extinguishers usually contain carbon-di-oxide that eliminates oxygen supply. It might harm living beings so they are not used in residential areas...
e)
Explanation of Solution
Heating, Ventilating, and air conditioning:
Heating, ventilation as well as air conditioning system could have impact on operations of
f)
Explanation of Solution
Power quality and distribution:
In order to avoid power quality, proper UPS should be used. They act as a backup power supply for computers. The powering capacity of UPS is usually measured in volt-ampere. A normal computer uses 200 VA and during interruptions or power fluctuations, it gets efficient power supply from UPS which provides up to 1,000 VA...
Trending nowThis is a popular solution!
Chapter 9 Solutions
Principles Of Information Security, Loose-leaf Version
- Subject: Software Engineering You are designing an intrusion detection system (IDS) to prevent theft at a bank occupying a 60-floor downtown Chicago building.  IDS interfaces with motion sensors located both inside and     outside of the building as its only means of sensing intrusion.  IDS must satisfy the following: Ensurethat a police officer arrives at the location of any intrusion quickly; Makeany intruder run away quickly; Ensure that a maintenance worker arrives at the location of any failed sensor quickly. Questions: Specify a minimal set of signals to support the C-C-I and H-C-I of IDS and its partners. Use pseudo-code to show the operation of the system. Note: If you are writing a question by hand, the font should be cleararrow_forwardSubject: Software Engineering  An ATM’s PIN entry screen has been designed to display a warning message if the user pushes the submit button before entering a digit in each of four required fields.  This is an example of: a)H-C-I. b)Anattempt to increase SA. c)Defensivedesign. d)Securityengineering. e)All ofthe above.   What does the Lexington Airport Crash case tell us about Team SA: a)TeamSA requires an unambiguous definition of who is on which team. b)TeamSA is impacted by both H-H-I and H-C-I. c)TeamSA is highest early in the day. d)TeamSA involves runtime binding. e)Noneof the above.arrow_forwardFill in the blanks with the best description of the following: 5-system is one that can run without fail for long periods of time. 6- A device that, if it fails, will cause significant harm.7- If a device fails in this state, no harm will occur.8- is one that is needed to complete its work within a certain amount of time.9. Providing redundancy in an RT system is a measure of the expense of a mission failing.10-The machine self-tests its components on a regular basis. The machine reconfigures itself automatically.11- are typically created by the system in response to some external stimulus.arrow_forward
- Let's imagine that your organisation has decided to construct a server room that is capable of operating totally on its own. When there is no lighting present in a server room, we refer to it as being "lights-out." Just specify what type of locks and alarms you would place on the doors and windows to protect yourself and your belongings from potential intruders.arrow_forwardElectronic voting system is an automated system that will help to manage elections easily and securely. The voting system can be used for casting votes during the elections held in local level to national level. In this system, a voter has to go to the respective polling booth to cast his/her vote. For casting votes, each voter needs to pass the authentication step. A voter swipes his/her smart card (with a magnetic chip containing social security number) into the electronic voting machine (EVM). After reading data from the card, the voter is asked to give his fingerprint which must match with the fingerprint stored in the national database. A voter can see the list of candidates after passing the authentication step. Then s/he can choose only one candidate from the list whom s/he wants to vote for. Once a voter submits his/her vote, the vote will be casted. The confidentiality of voters will be strictly maintained. If a voter submits his/her vote once, s/he will no longer be a…arrow_forwardDefine safe state and unsafe state in system.arrow_forward
- VAP is an integral part of a security program that involves tracking issues and problems in the security of the environment. These could be technical issues, process issues, or something else.  The program includes actual testing of the program to assure it is working properly. Some of these tests are required by the frameworks such as PCI DSS and ISO27001. Others are based on knowledge of the platform and the need to know where issues reside. Here are some examples of the tests:    1. User Reviews of every system where users are configured. These reviews look for accounts of employees that are no longer on the payroll, have changed roles, or no longer need access.    2. Firewall Reviews look for ingress and egress rules that may no longer be required, present a security risk, or were added without proper approval or vetting.    3. Configuration Reviews that verify configuration settings for security devices and appliances to assure they are properly configured and functioning.    4.…arrow_forwardGive an explanation of what a "heated zone" is, how it operates, and what restrictions could be imposed on its usage.arrow_forwardOf the following list, which techniques could be employed to lessen the risk of mass wasting? Select one or more: Build a retaining wall Perform undercutting O Terracing O Removing vegetation from slopes Planting vegetation on slopes Install rock boltsarrow_forward
- Subject : Software Engineering You are designing the H-C-I system for a remotely-operated drone aircraft.  The human operator will interact directly with your system to operate the drone which will typically be flying thousands of miles away.  Which of the following might affect the operator’s Level 3 SA? a)Whetheror not the operator had a good night’s sleep. b)Thetime required for C-C-I communication between the system and the drone. c)Thespeed at which the drone is moving. d)Theeffectiveness of the training session which taught the operator how to use the system. e)All ofthe above.  Which of the following best describes automation: a)Itrequires a common solution to a common problem. b)It requiresan unambiguous series of iterations. c)Itrequires reliable partner systems using C-C-I. d)It requiresa handler for any possible exception. e)All ofthe above.arrow_forwardIn the context of an office setting where resources such as printers and personal computers are shared, what kinds of precautions may be taken to guarantee that these resources are kept safe?arrow_forwardLet's pretend your company wants to build a server room that can run itself with no help from other employees. A lights-out server room is one in which the equipment is kept in complete darkness. Specify what kind of locks, alarms, and other physical precautions you'd put in place to keep the space secure.arrow_forward
- Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning