Your Perfect Assignment is Just a Click Away
We Write Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!

glass
pen
clip
papers
heaphones

Information Technology & and Physical Security convergence

Information Technology & and Physical Security convergence

Good evening fellow classmates and Professor,

In this weeks forum we are continuing the conversation of Information Technology & and Physical Security convergence and how it enhances the over security of an organization. In this weeks reading we learned that the fundamentals of Information Technology security are authentication, authorization and secure communication. Authentication is used to ensure that the user is who they say they are. This process generally requires some form of identification like password, ID card, biometrics or some other proof that an individual is who they say. Authorization is used to grant people certain types of access to areas or information. This prevents breaches or unauthorized access to information that people have no need to know or need to access whether it be personal identification information(PII), finance information, logistics or any other information that needs to be protected. The last fundamental of information technology security is secure communication. This includes the use of encoding or encrypting information to prevent unauthorized access. There are various types and levels or layers of encryption depending on the sensitivity of the information. An easy way to think about it is the use of firewalls on a computer to prevent viruses or hacking, IT professionals have the ability to create multiple layers of these encrypted firewalls so if one is breached than there are others to back it up.

The topic of integration is important when discussing the unification of information technology(IT) security and physical security as well. “The target landscape for threat actors today is rich and safe for the threat actors. More sophisticated modern attackers are uncovering and utilizing cross-platform exploits that use the cracks between physical and IT security systems to attack the organization. This approach is new, like ransomware was new just a couple of years ago. But today, more than half of malware attacks carry a ransomware payload. In a couple of years, it is likely that cross-platform attacks will be very common, and existentially destructive.”(Norman, 2017) Because these technological security breaches are usually combined with physical security breaches it is important that they are integrated in order to provide a more secure environment for an organization.

-David Werlinger

References:

Kovari, P. (2005). WebSphere Security Fundamentals: IBM Redbooks. Retrieved from http://www.redbooks.ibm.com/abstracts/redp3944.html

Norman, Thomas L., CPP/PSP (2017), Compelling Case for Unifying IT and Physical Security, https://www.securityindustry.org/2017/11/20/the-compelling-case-for-unifying-it-and-physical-security/

Order Solution Now

Our Service Charter

1. Professional & Expert Writers: Topnotch Essay only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided byTopnotch Essay are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Topnotch Essay is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Topnotch Essay, we have put in place a team of experts who answer to all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.