Theories of Security Management

Theories of Security Management

Collapse

Overall Rating:

1 2 3 4 5

Your Rating:

1 2 3 4 5

“Access Control” Please respond to the following:

If you were going to design an access system that would control people getting into your favorite or most valued items, what things would you consider based on your readings from Chapter 1? Make sure you address all the possible avenues of attack that could be exploited. Remember, security measures are designed to slow and draw attention to attackers. No system can completely prevent successful attack.