SlideShare a Scribd company logo
1)Take a tour of your building on campus or at work. What is
secured at night when workers are absent? Record the location
and type of physical access control devices.How do these access
controls change at night when workers are absent? How well
trained do guards and other employees appear to be? Do they
allow, “piggybacking” (somebody slipping into a facility behind
an authorized individual without being challenged)? What are
the policies for visitors and contractors? How does this all
impact physical security?
2)If possible at either your place of employment or your school,
attempt to determine how easy it would be to perform dumpster
diving to gain access to information at the site. Are trash
receptacles easy to gain access to? Are documents shredded
before being discarded? Are areas where trash is stored easily
accessible?
3)How are authentication and authorization alike and how are
they different? What is the relationship, if any, between the
two?
4)Discuss the differences between an anomaly-based and a
misuse based detection model. Which would you use to protect
a corporate network of 10,000 users? Why would you choose
that model?
I need each question atleast 1and half page with 0% plagiarism

More Related Content

Similar to 1)Take a tour of your building on campus or at work. What is secured.docx

003 P1 Friends Essay Thatsnotus. Online assignment writing service.
003 P1 Friends Essay  Thatsnotus. Online assignment writing service.003 P1 Friends Essay  Thatsnotus. Online assignment writing service.
003 P1 Friends Essay Thatsnotus. Online assignment writing service.
Donna Sims
 
Profiling information sources and services for discovery
Profiling information sources and services for discoveryProfiling information sources and services for discovery
Profiling information sources and services for discovery
Mathieu d'Aquin
 
Bt0084 technical communications 2
Bt0084 technical communications 2Bt0084 technical communications 2
Bt0084 technical communications 2
Techglyphs
 
Implementing ‘Namebers’ Using Microchip Implants: The Black Box Beneath The Skin
Implementing ‘Namebers’ Using Microchip Implants: The Black Box Beneath The SkinImplementing ‘Namebers’ Using Microchip Implants: The Black Box Beneath The Skin
Implementing ‘Namebers’ Using Microchip Implants: The Black Box Beneath The Skin
FoCAS Initiative
 
Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004
Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004
Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004
Jason Hong
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Dinesh O Bareja
 
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
Jason Hong
 
BYOD: Beating IT's Kobayashi Maru
BYOD: Beating IT's Kobayashi MaruBYOD: Beating IT's Kobayashi Maru
BYOD: Beating IT's Kobayashi Maru
Michele Chubirka
 
The Big Online Picture
The Big Online PictureThe Big Online Picture
The Big Online Picture
Neville Hobson
 
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
Varun Mithran
 
Activity Streaming as Information X-Docking
Activity Streaming as Information X-DockingActivity Streaming as Information X-Docking
Activity Streaming as Information X-Docking
Kai Riemer
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
donnajames55
 
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTUREA USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTURE
IJCNC
 
Concept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxConcept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptx
VaibhavYadav297587
 
Concept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxConcept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptx
NarangYadav
 
CIS502 discussion post responses.Respond to the colleagues posts.docx
CIS502 discussion post responses.Respond to the colleagues posts.docxCIS502 discussion post responses.Respond to the colleagues posts.docx
CIS502 discussion post responses.Respond to the colleagues posts.docx
mccormicknadine86
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model
tmbainjr131
 
apidays LIVE London 2021 - Building Trust in API Ecosystems by David O'Neill,...
apidays LIVE London 2021 - Building Trust in API Ecosystems by David O'Neill,...apidays LIVE London 2021 - Building Trust in API Ecosystems by David O'Neill,...
apidays LIVE London 2021 - Building Trust in API Ecosystems by David O'Neill,...
apidays
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
Gowdhaman Jothilingam
 
Case Cyber Security.docx
Case Cyber Security.docxCase Cyber Security.docx
Case Cyber Security.docx
bkbk37
 

Similar to 1)Take a tour of your building on campus or at work. What is secured.docx (20)

003 P1 Friends Essay Thatsnotus. Online assignment writing service.
003 P1 Friends Essay  Thatsnotus. Online assignment writing service.003 P1 Friends Essay  Thatsnotus. Online assignment writing service.
003 P1 Friends Essay Thatsnotus. Online assignment writing service.
 
Profiling information sources and services for discovery
Profiling information sources and services for discoveryProfiling information sources and services for discovery
Profiling information sources and services for discovery
 
Bt0084 technical communications 2
Bt0084 technical communications 2Bt0084 technical communications 2
Bt0084 technical communications 2
 
Implementing ‘Namebers’ Using Microchip Implants: The Black Box Beneath The Skin
Implementing ‘Namebers’ Using Microchip Implants: The Black Box Beneath The SkinImplementing ‘Namebers’ Using Microchip Implants: The Black Box Beneath The Skin
Implementing ‘Namebers’ Using Microchip Implants: The Black Box Beneath The Skin
 
Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004
Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004
Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
 
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
 
BYOD: Beating IT's Kobayashi Maru
BYOD: Beating IT's Kobayashi MaruBYOD: Beating IT's Kobayashi Maru
BYOD: Beating IT's Kobayashi Maru
 
The Big Online Picture
The Big Online PictureThe Big Online Picture
The Big Online Picture
 
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
 
Activity Streaming as Information X-Docking
Activity Streaming as Information X-DockingActivity Streaming as Information X-Docking
Activity Streaming as Information X-Docking
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTUREA USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTURE
 
Concept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxConcept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptx
 
Concept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxConcept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptx
 
CIS502 discussion post responses.Respond to the colleagues posts.docx
CIS502 discussion post responses.Respond to the colleagues posts.docxCIS502 discussion post responses.Respond to the colleagues posts.docx
CIS502 discussion post responses.Respond to the colleagues posts.docx
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model
 
apidays LIVE London 2021 - Building Trust in API Ecosystems by David O'Neill,...
apidays LIVE London 2021 - Building Trust in API Ecosystems by David O'Neill,...apidays LIVE London 2021 - Building Trust in API Ecosystems by David O'Neill,...
apidays LIVE London 2021 - Building Trust in API Ecosystems by David O'Neill,...
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
 
Case Cyber Security.docx
Case Cyber Security.docxCase Cyber Security.docx
Case Cyber Security.docx
 

More from swannacklanell

1. Police investigating an apparent suicide collect the following it.docx
1. Police investigating an apparent suicide collect the following it.docx1. Police investigating an apparent suicide collect the following it.docx
1. Police investigating an apparent suicide collect the following it.docx
swannacklanell
 
1. Original Discussion PostClearly, Donald J. Trump did not run.docx
1. Original Discussion PostClearly, Donald J. Trump did not run.docx1. Original Discussion PostClearly, Donald J. Trump did not run.docx
1. Original Discussion PostClearly, Donald J. Trump did not run.docx
swannacklanell
 
1. Please download data (T-bill rate, inflation rate, GDP growth.docx
1. Please download data (T-bill rate, inflation rate, GDP growth.docx1. Please download data (T-bill rate, inflation rate, GDP growth.docx
1. Please download data (T-bill rate, inflation rate, GDP growth.docx
swannacklanell
 
1. Please discuss health heritage of the Appalachian and Arab people.docx
1. Please discuss health heritage of the Appalachian and Arab people.docx1. Please discuss health heritage of the Appalachian and Arab people.docx
1. Please discuss health heritage of the Appalachian and Arab people.docx
swannacklanell
 
1. On what criteria (differentiationeconomyinteraction) should App.docx
1. On what criteria (differentiationeconomyinteraction) should App.docx1. On what criteria (differentiationeconomyinteraction) should App.docx
1. On what criteria (differentiationeconomyinteraction) should App.docx
swannacklanell
 
1. List and describe briefly the economic policy objectives of the n.docx
1. List and describe briefly the economic policy objectives of the n.docx1. List and describe briefly the economic policy objectives of the n.docx
1. List and describe briefly the economic policy objectives of the n.docx
swannacklanell
 
1. In your opinionexperience, what is the primary reason a public a.docx
1. In your opinionexperience, what is the primary reason a public a.docx1. In your opinionexperience, what is the primary reason a public a.docx
1. In your opinionexperience, what is the primary reason a public a.docx
swannacklanell
 
1. It is  Litarature Review about Critical Pedagogy and Globalizatio.docx
1. It is  Litarature Review about Critical Pedagogy and Globalizatio.docx1. It is  Litarature Review about Critical Pedagogy and Globalizatio.docx
1. It is  Litarature Review about Critical Pedagogy and Globalizatio.docx
swannacklanell
 
1. In what ways are the health professionals perception, diagnosis .docx
1. In what ways are the health professionals perception, diagnosis .docx1. In what ways are the health professionals perception, diagnosis .docx
1. In what ways are the health professionals perception, diagnosis .docx
swannacklanell
 
1. In accordance with FAA regulations that require commercial airl.docx
1. In accordance with FAA regulations that require commercial airl.docx1. In accordance with FAA regulations that require commercial airl.docx
1. In accordance with FAA regulations that require commercial airl.docx
swannacklanell
 
1. In these sections of the book, two main characters are introduced.docx
1. In these sections of the book, two main characters are introduced.docx1. In these sections of the book, two main characters are introduced.docx
1. In these sections of the book, two main characters are introduced.docx
swannacklanell
 
1. In the first paragraph, describe some of the challenges Chinese i.docx
1. In the first paragraph, describe some of the challenges Chinese i.docx1. In the first paragraph, describe some of the challenges Chinese i.docx
1. In the first paragraph, describe some of the challenges Chinese i.docx
swannacklanell
 
1. Identify the kinds of myths that are perpetuated by the media, .docx
1. Identify the kinds of myths that are perpetuated by the media, .docx1. Identify the kinds of myths that are perpetuated by the media, .docx
1. Identify the kinds of myths that are perpetuated by the media, .docx
swannacklanell
 
1. If a diet is inadequate (or malnutrition is present) are foodstuf.docx
1. If a diet is inadequate (or malnutrition is present) are foodstuf.docx1. If a diet is inadequate (or malnutrition is present) are foodstuf.docx
1. If a diet is inadequate (or malnutrition is present) are foodstuf.docx
swannacklanell
 
1. Discussion Question How do the media contribute to gender ro.docx
1. Discussion Question How do the media contribute to gender ro.docx1. Discussion Question How do the media contribute to gender ro.docx
1. Discussion Question How do the media contribute to gender ro.docx
swannacklanell
 
1. Discuss what the term audit evidence means and explain the need f.docx
1. Discuss what the term audit evidence means and explain the need f.docx1. Discuss what the term audit evidence means and explain the need f.docx
1. Discuss what the term audit evidence means and explain the need f.docx
swannacklanell
 
1. I Need The Four Paragraphs Done By Monday Morning. These Four Par.docx
1. I Need The Four Paragraphs Done By Monday Morning. These Four Par.docx1. I Need The Four Paragraphs Done By Monday Morning. These Four Par.docx
1. I Need The Four Paragraphs Done By Monday Morning. These Four Par.docx
swannacklanell
 
1. How have the Internet, intranets, and extranets affected the type.docx
1. How have the Internet, intranets, and extranets affected the type.docx1. How have the Internet, intranets, and extranets affected the type.docx
1. How have the Internet, intranets, and extranets affected the type.docx
swannacklanell
 
1. Discuss the two conditions that can result in the revocation .docx
1. Discuss the two conditions that can result in the revocation .docx1. Discuss the two conditions that can result in the revocation .docx
1. Discuss the two conditions that can result in the revocation .docx
swannacklanell
 
1. Has society become too dependent on computer applications for com.docx
1. Has society become too dependent on computer applications for com.docx1. Has society become too dependent on computer applications for com.docx
1. Has society become too dependent on computer applications for com.docx
swannacklanell
 

More from swannacklanell (20)

1. Police investigating an apparent suicide collect the following it.docx
1. Police investigating an apparent suicide collect the following it.docx1. Police investigating an apparent suicide collect the following it.docx
1. Police investigating an apparent suicide collect the following it.docx
 
1. Original Discussion PostClearly, Donald J. Trump did not run.docx
1. Original Discussion PostClearly, Donald J. Trump did not run.docx1. Original Discussion PostClearly, Donald J. Trump did not run.docx
1. Original Discussion PostClearly, Donald J. Trump did not run.docx
 
1. Please download data (T-bill rate, inflation rate, GDP growth.docx
1. Please download data (T-bill rate, inflation rate, GDP growth.docx1. Please download data (T-bill rate, inflation rate, GDP growth.docx
1. Please download data (T-bill rate, inflation rate, GDP growth.docx
 
1. Please discuss health heritage of the Appalachian and Arab people.docx
1. Please discuss health heritage of the Appalachian and Arab people.docx1. Please discuss health heritage of the Appalachian and Arab people.docx
1. Please discuss health heritage of the Appalachian and Arab people.docx
 
1. On what criteria (differentiationeconomyinteraction) should App.docx
1. On what criteria (differentiationeconomyinteraction) should App.docx1. On what criteria (differentiationeconomyinteraction) should App.docx
1. On what criteria (differentiationeconomyinteraction) should App.docx
 
1. List and describe briefly the economic policy objectives of the n.docx
1. List and describe briefly the economic policy objectives of the n.docx1. List and describe briefly the economic policy objectives of the n.docx
1. List and describe briefly the economic policy objectives of the n.docx
 
1. In your opinionexperience, what is the primary reason a public a.docx
1. In your opinionexperience, what is the primary reason a public a.docx1. In your opinionexperience, what is the primary reason a public a.docx
1. In your opinionexperience, what is the primary reason a public a.docx
 
1. It is  Litarature Review about Critical Pedagogy and Globalizatio.docx
1. It is  Litarature Review about Critical Pedagogy and Globalizatio.docx1. It is  Litarature Review about Critical Pedagogy and Globalizatio.docx
1. It is  Litarature Review about Critical Pedagogy and Globalizatio.docx
 
1. In what ways are the health professionals perception, diagnosis .docx
1. In what ways are the health professionals perception, diagnosis .docx1. In what ways are the health professionals perception, diagnosis .docx
1. In what ways are the health professionals perception, diagnosis .docx
 
1. In accordance with FAA regulations that require commercial airl.docx
1. In accordance with FAA regulations that require commercial airl.docx1. In accordance with FAA regulations that require commercial airl.docx
1. In accordance with FAA regulations that require commercial airl.docx
 
1. In these sections of the book, two main characters are introduced.docx
1. In these sections of the book, two main characters are introduced.docx1. In these sections of the book, two main characters are introduced.docx
1. In these sections of the book, two main characters are introduced.docx
 
1. In the first paragraph, describe some of the challenges Chinese i.docx
1. In the first paragraph, describe some of the challenges Chinese i.docx1. In the first paragraph, describe some of the challenges Chinese i.docx
1. In the first paragraph, describe some of the challenges Chinese i.docx
 
1. Identify the kinds of myths that are perpetuated by the media, .docx
1. Identify the kinds of myths that are perpetuated by the media, .docx1. Identify the kinds of myths that are perpetuated by the media, .docx
1. Identify the kinds of myths that are perpetuated by the media, .docx
 
1. If a diet is inadequate (or malnutrition is present) are foodstuf.docx
1. If a diet is inadequate (or malnutrition is present) are foodstuf.docx1. If a diet is inadequate (or malnutrition is present) are foodstuf.docx
1. If a diet is inadequate (or malnutrition is present) are foodstuf.docx
 
1. Discussion Question How do the media contribute to gender ro.docx
1. Discussion Question How do the media contribute to gender ro.docx1. Discussion Question How do the media contribute to gender ro.docx
1. Discussion Question How do the media contribute to gender ro.docx
 
1. Discuss what the term audit evidence means and explain the need f.docx
1. Discuss what the term audit evidence means and explain the need f.docx1. Discuss what the term audit evidence means and explain the need f.docx
1. Discuss what the term audit evidence means and explain the need f.docx
 
1. I Need The Four Paragraphs Done By Monday Morning. These Four Par.docx
1. I Need The Four Paragraphs Done By Monday Morning. These Four Par.docx1. I Need The Four Paragraphs Done By Monday Morning. These Four Par.docx
1. I Need The Four Paragraphs Done By Monday Morning. These Four Par.docx
 
1. How have the Internet, intranets, and extranets affected the type.docx
1. How have the Internet, intranets, and extranets affected the type.docx1. How have the Internet, intranets, and extranets affected the type.docx
1. How have the Internet, intranets, and extranets affected the type.docx
 
1. Discuss the two conditions that can result in the revocation .docx
1. Discuss the two conditions that can result in the revocation .docx1. Discuss the two conditions that can result in the revocation .docx
1. Discuss the two conditions that can result in the revocation .docx
 
1. Has society become too dependent on computer applications for com.docx
1. Has society become too dependent on computer applications for com.docx1. Has society become too dependent on computer applications for com.docx
1. Has society become too dependent on computer applications for com.docx
 

Recently uploaded

The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
NelTorrente
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Ashish Kohli
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 

Recently uploaded (20)

The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 

1)Take a tour of your building on campus or at work. What is secured.docx

  • 1. 1)Take a tour of your building on campus or at work. What is secured at night when workers are absent? Record the location and type of physical access control devices.How do these access controls change at night when workers are absent? How well trained do guards and other employees appear to be? Do they allow, “piggybacking” (somebody slipping into a facility behind an authorized individual without being challenged)? What are the policies for visitors and contractors? How does this all impact physical security? 2)If possible at either your place of employment or your school, attempt to determine how easy it would be to perform dumpster diving to gain access to information at the site. Are trash receptacles easy to gain access to? Are documents shredded before being discarded? Are areas where trash is stored easily accessible? 3)How are authentication and authorization alike and how are they different? What is the relationship, if any, between the two? 4)Discuss the differences between an anomaly-based and a misuse based detection model. Which would you use to protect a corporate network of 10,000 users? Why would you choose that model? I need each question atleast 1and half page with 0% plagiarism