Application of Knowledge

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course (Access Control) have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

Requirements: 500

Course Objectives

Upon completion of this course:

Determine appropriate security controls for infrastructure.

Evaluate ways to secure facilities with biometric technologies.

Review classification standards for infrastructure access.

Implement remote access solutions.

Utilize procedures to maintain access control.

Answer preview

Prior to offering this advice to management personnel, the company had just gotten rid of its server room and opted for a data center. As such, they dedicated an unused section of the building to serve as its data center. Very few employees had access to this room, and those that did had to key in a password at the entrance to gain access to the data center. In order to improve the security of the company and client data stored within this room, I advised the company to add another layer of protection. This extra layer would be a biometric authentication system. In addition to requiring authorized employees to key in their password, they will also have to place their finger onto a scanner to verify their identity. Thus, an employee will have to key in their password and then slide their finger into a scanner with their fingerprint record to complete the identity verification process. Without these two, an employee cannot gain access to the company’s data center.

[619 Words]

Application of Knowledge