These strategies leverage finite resources against adaptive threats to protect

These strategies leverage finite resources against

This preview shows page 14 - 17 out of 19 pages.

These strategies leverage finite resources against adaptive threats to protect GFI resources and personnel. The security risk management identifies what assets are at risk and aids the defense ofthe criticality assessment and products. A risk reduction decision based on a clear understanding of what is important, the estimated threat,and how the asset might be damaged/destroyed, is then developed through a logical process involving asset criticality assessment, threat assessment, andvulnerability assessment.Physical SecurityTo prevent unauthorized access to any GFI property without proper access to enter the reinforcement of physical security is a need. Physical security is the part of communications security resulting from the use of all physical measures necessary to safeguard communications security material from access by unauthorized persons. Physical security measures include the application of control procedures and physical barriers. Physical security also ensures continued
Background image
GFI Risk Assessmentintegrity, prevents access by unauthorized persons, and controls the spread of communications security techniques and technology when not in the best interest of the GFI. Common physical security measures include verifying the need to know and clearance of personnel granted access, following proper storage and handling procedures, accurately accounting for all materials, transporting materials using authorized means, and immediately reporting the loss or possible compromise of materials.EncryptionOne of the best ways of hiding a message is by talking in a special code. At its basic level, this is all that encryption is. Encryption is the process of transforming a plain text message into cipher text. Decryption is the process of transforming cipher text back into plain text. In order for these processes to work, both the sending and receiving systems must share a common key and use thesame algorithm. There are three major wireless encryption algorithms: Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and WPA2.Wireless AccessRisk assessment of wireless access should be thoroughly analyzed. The growth of wireless technology has been explosive so fast that most audit teams and IT departments have fallen behind in making it a part of the scope of their annual risk assessments. Unfortunately, there are numerous potential abuses of wireless technologies and very few rock-solid control mechanisms available to mitigate the associated risks. Likewise, as wireless security has rapidly grown and evolved, the underground community has continued to discover new ways to circumvent the available controls. (Kalmes, 2006) Companies with the ability to have wireless access should
Background image
GFI Risk Assessmentconsider implementing how effective the access is managed and to ensure that it is audited to up to regulations and standards. GFI should create policies that enforces audits and security updates are properly done and to make additional changes when needed and to keep track of activity as well. GFI has faced breaches and having Wifi capability throughout the company leaves a chance
Background image
Image of page 17

You've reached the end of your free preview.

Want to read all 19 pages?

  • Fall '14
  • GFI

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes