Verified Document

Intruder Has Gained Access To A Secure Essay

¶ … intruder has gained access to a secure place despite the said place having in place several security precautions such as code entry and CCTV. It is important to note that an intruder who succeeds in gaining access to a secure place can do just about anything he or she wants, from alteration to information theft to destruction. Analysis of the Situation

While some organizational security precautions like code entry may make it difficult for outsiders to gain access to secure areas and/or equipment, such security measures can in some circumstances be circumvented by unscrupulous insiders. In our case, a number of factors could have eased or facilitated the intruder's access to the secure place.

The security cameras could have been unplugged or compromised.

The intruder could have used stolen code access data to gain access.

From the above, it seems highly likely that the intruder could have colluded with insiders at some point to obtain access privileges. In basic terms, an insider could be defined an individual who currently has, or has in the past had, any association with an entity. An insider could therefore be a current or former contractor or employee. This is the meaning of an insider that will be adopted in this assessment.

Likely Extent of Damage

The damage occasioned by the intrusion highlighted in this case could be mild or extensive. This is however largely dependent on the amount of time the intruder spent in the premises, and what exactly he or she did within...

However, it is highly likely that:
1. Personally identifiable information of the company's clients could have been stolen.

2. Malicious software could have been installed on the company's machines.

3. The intruder could have downloaded sensitive data onto removable media.

4. Some organizational information could have been destroyed or disposed off.

5. Some physical property of the organization could have been stolen.

Findings

As I have already pointed out in the section titled "analysis of the situation" above, it is highly likely that the intruder managed to circumvent the control systems in place by colluding with insiders. According to Garcia (2007), physical protection alone is in most cases enough to deter outsiders working alone. In our case therefore, one could conclude that the security precautions in place, i.e. code entry and CCTV, would have been enough to deter an outsider working alone. It is for this reason that I conclude that to effectively defeat the security precautions identified above and gain access to a secure place, the said intruder must have colluded with an insider.

Insider-outsider collusion is one of the trickiest issues organizations have to deal with as they seek to guarantee the security of organizational resources (Garcia, 2007). In the words of Garcia (2007, p.29), "insiders may exploit their knowledge of facility operations and security systems performance." To effectively deal with insiders who misuse their…

Sources used in this document:
References

Garcia, M.L., 2007. The Design and Evaluation of Physical Protection Systems. 2nd ed. Burlington, MA: Butterwort-Heinemann.

Newton, M., 2008. The Encyclopedia of Crime Scene Investigation. New York, NY: Infobase Publishing, Inc.
Cite this Document:
Copy Bibliography Citation

Related Documents

Cybersecurity Recent Case Studies of
Words: 4325 Length: 16 Document Type: Term Paper

The level and sophistication of this attack on the Department of Defense's systems suggests that professionals conducted this attack with significant resources at their disposal and an interest in the national security secrets of the United States. The data mining operation was so successful that, while detected, still managed to make-off with a significant amount of information. Since the attack, the United States responded in a number of critical ways.

Physical Security Models
Words: 822 Length: 2 Document Type: Essay

These can be layered by razor spiral at the top all around the perimeter wall. There could also be a second perimeter wall after the main one as well as security personnel patrolling the perimeter wall to handle any intrusions once detected. This type of perimeter wall works effectively in the layered security model since it gives the detection systems an inhibition backing to prevent intruders from accessing the

Accounting and Intrusion Detection in a Report
Words: 6872 Length: 25 Document Type: Term Paper

Accounting and Intrusion Detection In a report issued by Paladin Technologies, Inc., entitled: "Security Metrics: Providing Cost Justification for Security Projects," 273 organizations were surveyed on the topic of security. The report illustrates in quantifiable terms the depth and reach of intrusion detection on the financial viability of the organization. The combined reported losses from the firms surveyed totaled $265.6 million in 1999. The highest loss categories were reported as follows: Type

Computer and Network Security Analysis
Words: 2033 Length: 7 Document Type:

Report of The Analysis and Attack Strategy Information on the Organization Bain & Company is a global management consultancy that has its headquarters in Boston. The company offers advice to private, public, and non-profit organizations across the world. Bain & Company advises leaders on marketing, strategy, operations, IT, and organization. Since it is a consultancy organization it has access to sensitive information from the organization that it consults for stored in its

ERP and Information Security
Words: 8373 Length: 26 Document Type: Term Paper

ERP and Information Security Introduction to ERP Even though the plans of information security include the prevention of outsiders to gain access of internal network still the risk from the outsiders still exists. The outsiders can also represent themselves as authorized users in order to cause damage to the transactions of the business systems. Therefore, strict prevention measures should be taken to avoid such situations. The threats of both the hackers have been

Security - Agip Kazakhstan North
Words: 14948 Length: 35 Document Type: Term Paper

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now