Describe some of the physical security policies in your organization. Express them in terms that could be implemented in a computerized door locking system.

What will be an ideal response?


For QMUL Computer Science Department (as in 2000):

• staff have access to all areas of the department except the offices of others, at all hours;

• students of the department have access to teaching laboratories and classrooms at all times except 0.00 to 0.400 and to other areas of the department, except private offices, during office hours;
• students of other departments taking courses in Computer Science have access to classrooms at all times and to teaching laboratories at designated times according tothe the courses taken;

• visitors have access to the Departmental Office during office hours;
• a master key holder has access to all offices. Note:

– Access rights should be withdrawn when a user ceases to be a member of staff or a student.

– Changes in policy should be immediately effective.

Computer Science & Information Technology

You might also like to view...

Which of the following is true?

A) The ListIterator interface is a subinterface of the Iterator interface B) The ListIterator interface is a superinterface of the Iterator interface C) The ListIterator interface extends the List interface D) None of the above

Computer Science & Information Technology

What is the result of 45 / 4?

a. 10 b. 11 c. 11.25 d. 12

Computer Science & Information Technology

A(n) ________ chart is often the best choice for displaying trends over time

Fill in the blank(s) with correct word

Computer Science & Information Technology

The ____________________ function determines whether a filename specifies a directory.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology