After reading this week\'s materials, please respond to TWO of the following que
ID: 3819466 • Letter: A
Question
After reading this week's materials, please respond to TWO of the following questions. PROVIDE CITATION IN APA
1. Describe the main components of a CCTV system. What are some of the concerns with CCTV deployments?
2. Define the different types of trusted recovery. What is meant by the term “fail secure”?
3. What is Change Management and how is it used to control security breaches? What is Configuration Management and how is it used to control security breaches? What is Patch management and how is it used to control security breaches?
Explanation / Answer
ANSWER:
1. Main Components of CCTV system
1. The Camera
2. The Monitor
3. The recorder
The Camera: Camera is the starting node of this system. It will take pictures and transmit to the control. Basically Camera can be of three types in this system:
Body camera - used in commercial properties for prevention against crime
Bullet style Camera - It is basically for night view and has infra-red built in it. Used in both domestic and commercial properties when a clear and crisp look is required.
Dome camera - It can range in size as per the needs, these cameras can be or cannot be infra-red built. It can be placed anywhere -either mounted on walls or flat surface -these cameras are movable and zoom controlled.
The Monitor: It is same as a television just the fact it does not have a tuning circuit. All the pictures taken by camera are sending to this control position.
The recorder: It records and saves the complete footage in the hard disk. The size of hard disk can vary depending on footage being recorded. The footage can be archived and can be used later. it can also be connected to LAN for remote viewing.
Concerns with CCTV deployment
> A responsible person is required to regularly monitor the video footage.
> Poor camera placement, incorrect equipment, bad light can compromise video quality.
> The Power supply of your wired or wireless CCTV is working properly.
> Use the Camera with latest firmware, or get it updated.
2. Types of Trusted Recovery:
1. System Reboot
2. Emergency sytem restart
3. System Cold Start
System reboot is shutting down the system in a proper manned approach.
When a TCB fails following which a system fails in an improper manner, an Emergency system restart is done.
When an unexpected TCB fail occurs and the recovery procedures are not sufficient enough to bring back the system in place, System Cold Start will be required in this case.
Fail Secure means in case there is a security failure; there won’t be any unauthorized access or misuse of data. In case of a failure also, everything will be secured.
3. Change Management is a step by step approach to deal with a change both from organization and individual point of view.
Change Management is all about
Adapting a change
Controlling the change
Effecting change
Change management is about defining and implementing procedures to deal with changes in the business environment.
Each change in an organization introduces a new risk in form of a potential attack surface. If we consider security as a part of change management, data compromise and security breaches will decrease.
Considering the example - a new software or hardware is introduces, we can use temporary measures to assist deployment. Say, we enable a port in the firewall to allow patch update or install a new system. We need a change management process for these small changes.
The organization can align the key processes to ensure that change in their environment is authorized, availability of system is not hampered and maintaining the compliance with security standards. This can be achieved through
Automated Assessments
Real time Monitoring
Enforcements
Configuration Management is a process to maintain the consistency in the performance, functional and physical attributes of a product. The products design, requirement and operational information need to be same throughout the lifespan of the product.
Patch management is used to manage the patches available in the market or the latest upgrades for a software application or different technologies making it secure against various defined attacks. Patch management ensures that the latest appropriate patches are installed properly, systems are tested after the installation and all the required procedures have been documented properly.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.