Cybersecurity Illustrated by Kim Peter
Author:Kim, Peter
Language: eng
Format: epub
Publisher: UNKNOWN
Published: 2016-12-11T05:00:00+00:00
If your organization is doing a good job practicing the above security measures, you may deem those security measures sufficient. Implementing the above security measures may be easy for a small company but if you have a large company, then it may be harder for you to track who has the keys to enter the equipment room and who’s actually going in and what’s actually being performed.
Alternative Security Measures to Consider for Equipment Room
You might want to consider the following measures as an alternative.
Allow only a few key personnel to have a copy of the key to the equipment room. The key should not be easily copied. For the sake of this example let’s say Joe and Tom have the only two keys.
When someone – say Jennifer - must go into the equipment room, then Jennifer must request the key to the equipment room from either Joe or Tom. She goes to Tom.
Jennifer must explain to Tom what she needs to get done in the equipment room. Tom approves. Jennifer and Tom sign a document that verifies Tom has given the key to Jennifer.
Jennifer must return the key to Tom before the end of the day or when she completes the task. This is both Tom and Jennifer’s responsibility. Jennifer and Tom sign a document that verifies that Tom now has the key.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Mikado Method by Ola Ellnestam Daniel Brolund(23577)
Hello! Python by Anthony Briggs(22713)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(21531)
Kotlin in Action by Dmitry Jemerov(20576)
Dependency Injection in .NET by Mark Seemann(20496)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(20392)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(19541)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(18340)
Grails in Action by Glen Smith Peter Ledbrook(17464)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16984)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(14874)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(12837)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11249)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10604)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(10490)
Hit Refresh by Satya Nadella(9141)
The Kubernetes Operator Framework Book by Michael Dame(8546)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8374)
Robo-Advisor with Python by Aki Ranin(8319)