Describe some of the physical security policies in your organization. Express them in terms that
could be implemented in a computerized door locking system.
What will be an ideal response?
For QMUL Computer Science Department (as in 2000):
• staff have access to all areas of the department except the offices of others, at all hours;
• students of the department have access to teaching laboratories and classrooms at all times except 0.00to 0.400and to other areas of the department, except private offices, during office hours;
• students of other departments taking courses in Computer Science have access to classrooms at all time
and to teaching laboratories at designated times according tothe the courses taken;
• visitors have access to the Departmental Office during office hours;
• a master key holder has access to all offices.
Note:
– Access rights should be withdrawn when a user ceases to be a member of staff or a student.
– Changes in policy should be immediately effective.
You might also like to view...
Assume you have two integer variables, num1 and num2. Which of the following is the correct way to swap the values in these two variables?
a. ``` int temp = num1; num2 = num1; num1 = num2; ``` b. ``` int temp = num2; num2 = num1; num1 = temp; ``` c. ``` num1 = num2; num2 = num1; ``` d. ``` int temp = num1; num2 = temp; temp = num2; num1 = temp; ``` e. None of these
Each adjustment creates its own independent ____________________, which you can tweak repeatedly until you get the look you desire.
Fill in the blank(s) with the appropriate word(s).
A limits report allows you to quantify the reliability of a solution produced by Solver.
Answer the following statement true (T) or false (F)
The process of integrating information security perspectives into the hiring process begins with reviewing and updating all job descriptions.
Answer the following statement true (T) or false (F)