Introduction
For the last few years, our organization faced the threat of access to sensitive information by unauthorized personnel. Due to that security challenge, the organization stakeholder has planned to install an access control system in place to patch possible weakness in our organization system. The access control system will be installed on our servers which will be used to authenticate and authorize users of the system to log in. Each user of the system will use a unique username and a password which will be stored in the system's user database for authentication purposes.
Also, the organization will incorporate fingerprint scanner on the doors whereby all employees' fingerprints will be captured and stored in employees' database. The employee will be required to place their finger on the scanner for the door to open so that they can enter in their respective office.
Implementation of the access control system will restrict unauthorized personnel from sensitive offices and access to the organization's system. The legitimate users of the system will key in their username and password to access the system. Therefore, strangers will not have any access to the system. The organization's information will be secure and confidential.
Fact Sheet
Due to the overwhelming threat of unauthorized access to an organization's computer system and sensitive information, the organization has to install an access control system in their server. The logical access control system enhances the integrity and confidentiality of the organization's data. For instance, financial data need to be safe and confidential.
Description of the Access Control System
The system used by the organization to achieve its goals and mission like capturing product details and financial data of the organization must have a dashboard where user have to log in before they access organization's information. Abrams (3008) argues that users of the system are managed by the system administrator who can register and delete user information in the user's system database (Abrams, 2008). The username and password have to be unique so that user can be distinguished. Also, the organization can incorporate biometrics of the employees in the employee's database such that employee place their fingers in the fingerprint scanner for office door to open.
The Rationale for Implementation of the Access Control System
The access control system will have its scope within the organization premise. The access control system will majorly encompass authentication and authorization of people to have access to an organization's resources. The logic behind the implementation of user authentication is restricted strangers from accessing sensitive information of the company or organization. When sensitive information of an organization land on hands of unwanted person it can be risky. Above all the reason for user authentication to maintain integrity and confidentiality of sensitive information of the organization so that I can be reliable when making critical decision and evaluation of the organization's progress.
Summary of the Implementation Phases
The first phase is to install an access control system to create a user database and management tool in the organization system. User database will be used to store system user credentials to enable them to login into the system. The send phase is to capture the username and password of the system users and store them in the user's system database. Third phase will include the installation of a fingerprint scanner on the office doors. The fourth phase will involve testing of the system to check whether it will take a function as it is anticipated. Then the last phase will be user training on how to use their credentials to login into the system to execute their duties.
Planning involves laying down ideas or thoughts on how to accomplish a specific task. Planning for the writing process if paramount because you have to determine the structure of the article to write like memo and a fact paper. Memo has its specific structure right from the beginning up to the end the same way fact sheet does. Planning enables me to achieve my goals and objectives with ease.
Multiple of drafting in the writing process the writer to refine the paper required standards. The first draft acts as a blueprint of the final paper which is written in point form without too much elaboration. The second draft with involves removal of any unnecessary content in the first draft and addition of any viable information which might be omitted in the first draft. Revising and editing makes the final paper more presentable and appealing to the reader.
Subject knowledge of access control system made it easy for CIO to explain it to the IT technicians so that they can implement cybersecurity. Position in the organization has a great impact because CIO is in charge of information communication in the entire organization. Therefore, he or she is responsible for the budget of the access control system installation. Personal attitude has to be positive about any change in an organization for one to adapt easily. Generally, readers have a different perspective. Therefore, the writer of the paper has to be precise and direct to the point. Primary readers are the intended audience of the paper whereas secondary and international readers are the passive audience of the paper.
References
Abrams, M., & Weiss, J. (2008). Malicious control system cyber security attack case study-Maroochy Water Services, Australia. McLean, VA: The MITRE Corporation.
Cite this page
Research Paper Example on Cybersecurity. (2022, Nov 01). Retrieved from https://midtermguru.com/essays/research-paper-example-on-cybersecurity
If you are the original author of this essay and no longer wish to have it published on the midtermguru.com website, please click below to request its removal:
- Trauma Informed Parents: Analysis of the Website
- The Cyber Security Implementation Plan in the Healthcare System
- Questions and Answers on Identification of the Potential Causes of a Problem
- Digitalization in Business - Essay Example
- System Security Manager at Microsoft Corporation: Securing Business Information - Essay Sample
- The Inventor of the World Wide Web: Tim Berners-Lee - Essay Sample
- Technology Revolution: How Smartphones and the Internet Changed the World - Essay Sample