Studyspark Study Document

Intruder Has Gained Access to a Secure Essay

Pages:3 (936 words)

Sources:2

Subject:Geography

Topic:Place

Document Type:Essay

Document:#76540556


intruder has gained access to a secure place despite the said place having in place several security precautions such as code entry and CCTV. It is important to note that an intruder who succeeds in gaining access to a secure place can do just about anything he or she wants, from alteration to information theft to destruction.

Analysis of the Situation

While some organizational security precautions like code entry may make it difficult for outsiders to gain access to secure areas and/or equipment, such security measures can in some circumstances be circumvented by unscrupulous insiders. In our case, a number of factors could have eased or facilitated the intruder's access to the secure place.

The security cameras could have been unplugged or compromised.

The intruder could have used stolen code access data to gain access.

From the above, it seems highly likely that the intruder could have colluded with insiders at some point to obtain access privileges. In basic terms, an insider could be defined an individual who currently has, or has in the past had, any association with an entity. An insider could therefore be a current or former contractor or employee. This is the meaning of an insider that will be adopted in this assessment.

Likely Extent of Damage

The damage occasioned by the intrusion highlighted in this case could be mild or extensive. This is however largely dependent on the amount of time the intruder spent in the premises, and what exactly he or she did within that period of time. However, it is highly likely that:

1. Personally identifiable information of the company's clients could have been stolen.

2. Malicious software could have been installed on the company's machines.

3. The intruder could have downloaded sensitive data onto removable media.

4. Some organizational information could have been destroyed or disposed off.

5. Some physical property of the organization could have been stolen.

Findings

As I have already pointed out in the section titled "analysis of the situation" above, it is highly likely that the intruder managed to circumvent the control systems in place by colluding with insiders. According to Garcia (2007), physical protection alone is in most cases enough to deter outsiders working alone. In our case therefore, one could conclude that the security precautions in place, i.e. code entry and CCTV, would have been enough to deter an outsider working alone. It is for this reason that I conclude that to effectively defeat the security precautions identified above and gain access to a secure place, the said intruder must have colluded with an insider.

Insider-outsider collusion is one of the trickiest issues organizations have to deal with as they seek to guarantee the security of organizational resources (Garcia, 2007). In the words of Garcia (2007, p.29), "insiders may exploit their knowledge…


Sample Source(s) Used

References

Garcia, M.L., 2007. The Design and Evaluation of Physical Protection Systems. 2nd ed. Burlington, MA: Butterwort-Heinemann.

Newton, M., 2008. The Encyclopedia of Crime Scene Investigation. New York, NY: Infobase Publishing, Inc.

Cite this Document

Join thousands of other students and "spark your studies."

Sign Up for FREE
Related Documents

Studyspark Study Document

Home Security Vulnerabilities Intruders Are Constantly Looking

Pages: 3 (957 words) Sources: 2 Subject: Urban Studies Document: #8146607

Home Security Vulnerabilities Intruders are constantly looking for home security vulnerabilities that might make their invasion easy and swift. This effectively means that the more vulnerable a home is, the higher its chances of being targeted by robbers. In this text, I keenly observe my residence from the outside in an attempt to identify potential security vulnerabilities. In addition to identifying the specific areas burglars would likely focus on; I also

Studyspark Study Document

Analysis of Operating Systems Protective Measures

Pages: 8 (2837 words) Sources: 5 Subject: Black Studies - Philosophy Document: #50760519

Operating Systems Protection Operating systems are the collection of programs that assist users operating computer hardware to control and managing the computer resources, providing the user interface and enforcing security measures. An operating system is referred as the physical environment that provides an interface between the underlying computer hardware and data. The advent of information and networking systems has led to the connectivity of the computer system that assists in

Studyspark Study Document

Cybersecurity Recent Case Studies of

Pages: 16 (4325 words) Sources: 6 Subject: Education - Computers Document: #46428563

The level and sophistication of this attack on the Department of Defense's systems suggests that professionals conducted this attack with significant resources at their disposal and an interest in the national security secrets of the United States. The data mining operation was so successful that, while detected, still managed to make-off with a significant amount of information. Since the attack, the United States responded in a number of critical ways.

Studyspark Study Document

Advances in Technology Have Transformed the Way

Pages: 5 (1448 words) Sources: 4 Subject: Education - Computers Document: #45012893

advances in technology have transformed the way that firms are addressing security related issues. This is because most devices have become much smaller and they are often focused on providing users with remote access. As a result, these kinds of platforms are a potential danger to all organizations. ("Guidelines for Securing Mobile Devices," 2012) Evidence of this can be seen with observations in a report prepared by Stanford University which

Studyspark Study Document

General Aspects on Social Engineering

Pages: 18 (5828 words) Sources: 12 Subject: Engineering Document: #6466480

Social Engineering as it Applies to Information Systems Security The research takes into account several aspects that better create an overview of the term and the impact it has on security systems. In this sense, the first part of the analysis reviews the concept of social engineering and the aspects it entails. Secondly, it provides a series of cases that were influenced by social engineering and the effects each had on

Studyspark Study Document

Security Implementation of Microsoft Windows

Pages: 6 (1851 words) Sources: 5 Subject: Education - Computers Document: #75302596

Window Security Implementation Scenario NextGard Technologies specializes in the network consulting services for small, medium and large organizations inside and outside the United States. Currently, NextGard has approximately 250,000 employees in 5 countries and the company corporate headquarter is located at Phoenix, AZ. However, the company decides to secure and upgrade its current network to enhance organization efficiencies. Currently, the company has 5 district offices at the following locations: New York City, New

Join thousands of other students and

"spark your studies".