Protecting Availability

As a chief information security officer, I would use many different types of protection to ensure availability to my system. I would have the basic protection system for anything that is valuable or important which is to have cameras and restricted access to getting into the place the system is based. I would have access control implemented because it will only allow certain personnel access to parts of the system and have it restricted to others. It would have a list of the personnel’s names and their role which will then allow for what they can access. The way to follow this is to use the two-factor authentication method rather than just using a password for access. Of course, you would need both but having the two-factor authentication would allow for better protection. A fingerprint or iris would be better rather than a physical key card that anyone could gain access to is crucial. I would use this over just a password because it makes security better and has less possibility of being tampered with. I would have an incident response if such a system is tampered with or hacked. All personnel would be educated about our incident policy, how to identify an incident, and what to do if an event occurred. Our system will have the basics of alerts of unusual activity and logs to who accessed what.

Leave a Reply

Your email address will not be published. Required fields are marked *