This essay focuses on a well-organized paper with distinct sections.. The first should include a security rating based on attractiveness of target .The Nature of the data and the level of security applied. You should show a rating for each component as well as a total rating for the network.
a well-organized paper with distinct sections
. The first should include a security rating based on attractiveness of target. Nature of the data and the level of security applied.
You should show a rating for each component as well as a total rating for the network. Be sure to describe the reasoning for the rating you scored each component Provide recommendations .Improve the overall security score. Since you don’t have detail information on the campus network. You will need to make some reasonable assumptions on the data a typical college. Would have and they security controls they would likely have deploy. Do not apply this to your home network. Ensure that your document is 2 to 3 pages and includes charts.
- Firstly, Level 1 Security provides the lowest level of security .A well organized paper. This basic security requirement is refer to as overt security printing methods (or methods needing special optical tools). Overt surface level security features include using ultra violet, threads, watermarks, holograms, security designs, micro text, fibers and other discernible features into the paper substance or on its surface during the paper making process. These are complement by applied security features, such as OVD’s or iridescent stripes, heat sensitive ink, optical variable ink and various high end printing methods or technologies. Printed personalise data is a part of this level of security and are static in nature .A well organized paper With the easy availability of technology today, such security features have become more easily tamper or copy.
L1S features provide the advantage of easy a well organize
- and quick cursory visual verification of identity information without the use of specific or specialized tools. However, an expert with specific tools will be necessary to identify forgeries or tampering. Due to the basic and visual nature of verification of these features, L1S features alone are no longer secure and can, in some instances where poorly implement, increase the incidences of identity theft, abuse and document forgery. In addition, because such features and information printed using L1S are static, there are inherent limitations on the depth and validity of the identity information being protected as well as if such information is most up-to-date.
- Level 2 Security (L2S) EMBEDDED Data—Level 2 Security improves upon the physical security mechanisms of Level 1 Security by taking information protection to a covert and embedd level. This prevents casual intruders from gaining access to. Encoded confidential information inside an embedd chip or other means of encoding. Technologies at this level include smart chips, magnetic strips, Radio Frequency Identification (RFID), contactless chips or smart chips with embedd identity and biometric data. With the right tools, L2S schemes allows the capability to capture, register and authenticate document. Holders’ identity information and, of late, biometric identity information. The encode data is limit by the chip memory size and capability. A specialized access mechanism (i.e. the reader and encoder device) is require. To obtain access to the relevant data source and write data onto the embedd medium.
- L2S has been breach by technological advancements and can no longer be considere as 100% secure. With today’s technology, counterfeiting is no longer unusual and identity document. Information can be potentially tamper, modify, stolen and duplicate. Another document to be use for unauthorise or illegal purposes.