rosete

2
Rosete, Herrika Red G. Permit #52435KK Scene 1 Hunt, Faust and Dunn went to the power station without being captured by the security personnel. The two, Hunt and Faust broke the glass in the station and went down to access the server in the underwater tank. When they had already stopped the cooling system, Hunt jumped into the water to change the access control of the security profiles so that Dunn can pass through the profile analyzer. Because of their detailed plans and knowledge of the security systems, they had successfully stolen the ledger containing the names of all the Syndicate agents. This scene just shows the lack of physical and security controls for the protection of the central computer terminal underwater. Although the server is difficult to access because of its location, the station still needs to improve its security and access controls so that unauthorized individuals can not have easy access to the server. The station lacks security personnel that should be watching over the entrance of the power station and roaming around it. Also, the data stored underwater should have been protected by setting more access controls like safety storage with passwords and locks so that it cannot be easily accessed so that data stored in the terminal cannot be changed, like what Hunt did. The station’s system also used detection controls in which it was able to detect that the cooling system had stopped operating. I think it would be better if they employed personnel that would look into the system and investigate irregularities that it had detected. In the movie, access and security controls are employed to protect the system. This also applies to the business in which controls are also used to manage risks in the organization. Proper controls would able the organization to protect its

Upload: herrika-red-gullon-rosete

Post on 01-Feb-2016

223 views

Category:

Documents


0 download

DESCRIPTION

hj

TRANSCRIPT

Page 1: Rosete

Rosete, Herrika Red G.Permit #52435KK

Scene 1

Hunt, Faust and Dunn went to the power station without being captured by the security personnel. The two, Hunt and Faust broke the glass in the station and went down to access the server in the underwater tank. When they had already stopped the cooling system, Hunt jumped into the water to change the access control of the security profiles so that Dunn can pass through the profile analyzer. Because of their detailed plans and knowledge of the security systems, they had successfully stolen the ledger containing the names of all the Syndicate agents. This scene just shows the lack of physical and security controls for the protection of the central computer terminal underwater. Although the server is difficult to access because of its location, the station still needs to improve its security and access controls so that unauthorized individuals can not have easy access to the server. The station lacks security personnel that should be watching over the entrance of the power station and roaming around it. Also, the data stored underwater should have been protected by setting more access controls like safety storage with passwords and locks so that it cannot be easily accessed so that data stored in the terminal cannot be changed, like what Hunt did. The station’s system also used detection controls in which it was able to detect that the cooling system had stopped operating. I think it would be better if they employed personnel that would look into the system and investigate irregularities that it had detected.

In the movie, access and security controls are employed to protect the system. This also applies to the business in which controls are also used to manage risks in the organization. Proper controls would able the organization to protect its resources and be able to detect fraud, errors and inefficiencies. Physical control can help the business protect its assets and records. Authorization for access to data files, resources and computer programs may help in identifying and recording valid transactions.

Scene 2

Brandt called Benjie to stop the takeoff of a plane which had a package of a destructive gas. When the plane started to takeoff, Ethan suddenly appeared on the scene and asked Benjie to let the plane’s door to be opened so that he can go inside the plane. Ethan was able to get into the plane since Luther had successfully hacked the Russian satellite and let Benjie be connected control the system of the plane.

Page 2: Rosete

. After having stolen what they believe to be a ledger containing the names of all Syndicate agents, Faust betrays the others and flees with the data on aUSB flash drive; Ethan, his group, Brandt and Stickell, and Syndicate members chase Faust. Faust escapes, but Dunn revealed that he has already made a copy of the data.