In: Computer Science
You are the security Manager for a medium-sized bank You have been asked to design a security solution to keep intruders out of the bank after hours. The three areas of the bank you need to secure are the parking lot, the building perimeter, and the vault. List what technologies you would use in each of these areas and explain why you would use them. Please write your answer in the box below.
You have been hired as a security consultant for the Contoso Corporation. One day, you are working with the CIO on a new comprehensive security policy for the company. Although the CIO is not a programmer herself, she wants to understand how she can keep programmers from creating a backdoor on the programs they create for the company. What do you tell her? Why?
These are a portion of the advances that could be utilized as a part of each of the ranges:
Parking lot(external border):
surveillance cameras
Parking area lights
Border fence
Entryway with protect
Entryway with get to identification peruser
Guard patrols
Building border (inward edge):
Locks (outside entryways, inner entryways, office entryways,
work areas, documenting cabinets,etc.)
Keypads
Surveillance cameras
Identification perusers (on entryways and lifts)
Watch work area
Watch watches
Smoke identifiers
Gates
Mantrap
Vault (secure region):
Identification perusers
Keypads
Biometric innovation (unique finger impression scanner, retinal
scanner, voicerecognition)
Security entryways
X-beam scanners
Metal identifier
Cameras
Interruption recognition frameworks (Light bar, infrared,
microwave, and ultrasonic
2.
When you have software engineers making applications for your association, you have to build up a survey and evaluating process that will check their work. This would incorporate checking on all source code