Describe some of the physical security policies in your organization. Express them in terms that could be implemented in a computerized door locking system.
What will be an ideal response?
For QMUL Computer Science Department (as in 2000):
• staff have access to all areas of the department except the offices of others, at all hours;
• students of the department have access to teaching laboratories and classrooms at all times except 0.00 to 0.400 and to other areas of the department, except private offices, during office hours;
• students of other departments taking courses in Computer Science have access to classrooms at all times and to teaching laboratories at designated times according tothe the courses taken;
• visitors have access to the Departmental Office during office hours;
• a master key holder has access to all offices. Note:
– Access rights should be withdrawn when a user ceases to be a member of staff or a student.
– Changes in policy should be immediately effective.
You might also like to view...
?Once a Cascading Style Sheets (CSS) grid is established, a specific element within a _____ is placed at the intersection of a specified row and column.
A. ?stack B. ?grid cell C. ?sibling element D. ?track-list
The computer at your email service provider that handles outgoing email messages is called the ____.
A. Internet service provider B. email service provider C. outgoing service provider D. outgoing email server