Verified Document

Intruder Has Gained Access To A Secure Essay

¶ … intruder has gained access to a secure place despite the said place having in place several security precautions such as code entry and CCTV. It is important to note that an intruder who succeeds in gaining access to a secure place can do just about anything he or she wants, from alteration to information theft to destruction. Analysis of the Situation

While some organizational security precautions like code entry may make it difficult for outsiders to gain access to secure areas and/or equipment, such security measures can in some circumstances be circumvented by unscrupulous insiders. In our case, a number of factors could have eased or facilitated the intruder's access to the secure place.

The security cameras could have been unplugged or compromised.

The intruder could have used stolen code access data to gain access.

From the above, it seems highly likely that the intruder could have colluded with insiders at some point to obtain access privileges. In basic terms, an insider could be defined an individual who currently has, or has in the past had, any association with an entity. An insider could therefore be a current or former contractor or employee. This is the meaning of an insider that will be adopted in this assessment.

Likely Extent of Damage

The damage occasioned by the intrusion highlighted in this case could be mild or extensive. This is however largely dependent on the amount of time the intruder spent in the premises, and what exactly he or she did within...

However, it is highly likely that:
1. Personally identifiable information of the company's clients could have been stolen.

2. Malicious software could have been installed on the company's machines.

3. The intruder could have downloaded sensitive data onto removable media.

4. Some organizational information could have been destroyed or disposed off.

5. Some physical property of the organization could have been stolen.

Findings

As I have already pointed out in the section titled "analysis of the situation" above, it is highly likely that the intruder managed to circumvent the control systems in place by colluding with insiders. According to Garcia (2007), physical protection alone is in most cases enough to deter outsiders working alone. In our case therefore, one could conclude that the security precautions in place, i.e. code entry and CCTV, would have been enough to deter an outsider working alone. It is for this reason that I conclude that to effectively defeat the security precautions identified above and gain access to a secure place, the said intruder must have colluded with an insider.

Insider-outsider collusion is one of the trickiest issues organizations have to deal with as they seek to guarantee the security of organizational resources (Garcia, 2007). In the words of Garcia (2007, p.29), "insiders may exploit their knowledge of facility operations and security systems performance." To effectively deal with insiders who misuse their…

Sources used in this document:
References

Garcia, M.L., 2007. The Design and Evaluation of Physical Protection Systems. 2nd ed. Burlington, MA: Butterwort-Heinemann.

Newton, M., 2008. The Encyclopedia of Crime Scene Investigation. New York, NY: Infobase Publishing, Inc.
Cite this Document:
Copy Bibliography Citation

Related Documents

Home Security Vulnerabilities Intruders Are Constantly Looking
Words: 957 Length: 3 Document Type: Essay

Home Security Vulnerabilities Intruders are constantly looking for home security vulnerabilities that might make their invasion easy and swift. This effectively means that the more vulnerable a home is, the higher its chances of being targeted by robbers. In this text, I keenly observe my residence from the outside in an attempt to identify potential security vulnerabilities. In addition to identifying the specific areas burglars would likely focus on; I also

Analysis of Operating Systems Protective Measures
Words: 2837 Length: 8 Document Type: Research Paper

Operating Systems Protection Operating systems are the collection of programs that assist users operating computer hardware to control and managing the computer resources, providing the user interface and enforcing security measures. An operating system is referred as the physical environment that provides an interface between the underlying computer hardware and data. The advent of information and networking systems has led to the connectivity of the computer system that assists in

Cybersecurity Recent Case Studies of
Words: 4325 Length: 16 Document Type: Term Paper

The level and sophistication of this attack on the Department of Defense's systems suggests that professionals conducted this attack with significant resources at their disposal and an interest in the national security secrets of the United States. The data mining operation was so successful that, while detected, still managed to make-off with a significant amount of information. Since the attack, the United States responded in a number of critical ways.

Advances in Technology Have Transformed the Way
Words: 1448 Length: 5 Document Type: Essay

advances in technology have transformed the way that firms are addressing security related issues. This is because most devices have become much smaller and they are often focused on providing users with remote access. As a result, these kinds of platforms are a potential danger to all organizations. ("Guidelines for Securing Mobile Devices," 2012) Evidence of this can be seen with observations in a report prepared by Stanford University which

General Aspects on Social Engineering
Words: 5828 Length: 18 Document Type: Research Paper

Social Engineering as it Applies to Information Systems Security The research takes into account several aspects that better create an overview of the term and the impact it has on security systems. In this sense, the first part of the analysis reviews the concept of social engineering and the aspects it entails. Secondly, it provides a series of cases that were influenced by social engineering and the effects each had on

Security Implementation of Microsoft Windows
Words: 1851 Length: 6 Document Type: Research Proposal

Window Security Implementation Scenario NextGard Technologies specializes in the network consulting services for small, medium and large organizations inside and outside the United States. Currently, NextGard has approximately 250,000 employees in 5 countries and the company corporate headquarter is located at Phoenix, AZ. However, the company decides to secure and upgrade its current network to enhance organization efficiencies. Currently, the company has 5 district offices at the following locations: New York City, New

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now