Question

In: Computer Science

Technology is used to protect assets in different environments. Identify two assets in your work or...

Technology is used to protect assets in different environments. Identify two assets in your work or school environment used by public safety to protect an asset from harm. What are advantages and disadvantages of these technologies?

Solutions

Expert Solution

There are many assets in our surroundings to protect assets in different environments. Some of them are;

1. CCTV

It is a system that allows you to keep an eye on what’s going on in and around your business. It contains a camera that can produce images or recordings for surveillance or other private purposes. Cameras can be either video cameras or digital stills cameras.

There are advantages and disadvantages for CCTV;

Advantage:

  1. By using CCTV, we can reduce crime
  2. CCTV Is a Cost-Effective Solution for protecting assets

  3. CCTV helps people to feel safe, particularly at night.

  4. CCTV helps to maintain Records

  5. Even if you’re away from your cameras, you’ll still be able to keep an eye on your office or house through a camera to check if everything is alright.

Disadvantages

  1. They can only monitor a limited area.
  2. Security cameras can be vulnerable
  3. If someone hacks the system, they get to know everything and can do anything.

2. Access Control

Access control systems have increased the ability of users to protect assets. If you can control who has authorized access to the area where the asset is located, then you can, of course, reduce your risks.

The access control systems available allow you to assign an access card or other identifier to gain access to a restricted area.

Advantages:

  1. An access control system allows you to decide who has access to each area of your business.
  2. With access control security, you save money on locks and security personnel.
  3. We can keep track of who comes and goes.
  4. It can reduce theft and accidents.

Disadvantages:

  1. If someone steals your access card, that person could gain authorized access to the restricted areas
  2. It can be hacked
  3. Expensive

PLEASE UPVOTE if you find this helpful...


Related Solutions

You identify two bacterial species growing together in different environments: species A is an organoheterotroph and...
You identify two bacterial species growing together in different environments: species A is an organoheterotroph and species B is a lithoautotroph. Below are three environments (E1-E3) that both bacteria can grow and reproduce in, different only in the one environmental change highlighted, that you use to test the assumptions of the Molecular Clock hypothesis. You create a taxonomic tree comparing rRNA from one environment (no parentheses) with another control environment (parentheses). Assuming the theory is correct, choose one prediction (A...
How your personnality impacts your work environments/ relationships?
How your personnality impacts your work environments/ relationships?
different styles of communication would benefit different types of work environments and positions. write about why...
different styles of communication would benefit different types of work environments and positions. write about why and how ones communication style needs to match the work environment and the individual position. provide three examples of different communication styles and how they would play influence in ones work type of work environment.
A security policy is a document that states how the organisation plans to protect the organisations information Technology assets.
A security policy is a document that states how the organisation plans to protect the organisations information Technology assets. In your own words, state how a security policy affects the organisation's culture and the two things the policy must balance.
the data used in the processes at your work place, identify at least five attributes with...
the data used in the processes at your work place, identify at least five attributes with mixed types from ordinal, nominal, symmetric binary, and asymmetric binary. You may choose any combination of them, but there must be at least three types in your data chosen from the data types given above. (a) Identify the five attributes that you have chosen, their types and the possible values that these attributes may hold. In case of an ordinal variable (if you’ve chosen...
What are the different types of projects and organization structures used in supply chain environments? Also,...
What are the different types of projects and organization structures used in supply chain environments? Also, how do you go about calculating the critical path and the duration of a project?
Essay Questions Briefly describe internal control and how can it be used to protect assets. How...
Essay Questions Briefly describe internal control and how can it be used to protect assets. How can petty cash funds be used for internal control purposes? Why are bank accounts used? What is bank reconciliation, and why should a business use it? Why is it necessary to record journal entries after the bank reconciliation has been prepared? Calculate and compare your selected Target corporation's cash to its biggest competitor for the two years preceding the current year. What does the...
Briefly describe internal control and how can it be used to protect assets. How can petty...
Briefly describe internal control and how can it be used to protect assets. How can petty cash funds be used for internal control purposes? Why are bank accounts used? What is bank reconciliation, and why should a business use it? Why is it necessary to record journal entries after the bank reconciliation has been prepared? Calculate and compare Target Corporation's cash to its biggest competitor for the two years preceding the current year. What does the cash ratio help to...
Give examples of two different biochemical tests that can be used to phenotypically identify microbes.
Give examples of two different biochemical tests that can be used to phenotypically identify microbes.
discuss two different programs conducted by police departments to protect communities.
discuss two different programs conducted by police departments to protect communities.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT