Reference no: EM132386456
DISCUSSION-1
1. Most Compelling Lessons from the Course
Physical data is essential in protection of sensitive data, confidential information, information systems and personnel from any malicious individuals. The course explored the various means that one can use to take advantage of physical security to protect their assets. It includes ensuring the security and safety of the personnel from threats such as terrorism, and vandalism among other physical security threats. One of the most compelling lessons taken one could take from the course is the ability to use the natural landscape in enhancing physical security in a facility. For instance, if the facility is located in a desert, it can use the enhanced visibility the desert provides to increase security of the facility.
2. Enhancement to Learning Ability from Participating in the Discussion Board
The discussion forums in the course provided an environment for collaborative learning in which the students as well as the instructor participated. It made learning an active process in which each student had to post an initial post to which others comment with insightful contributions or corrections. The discussion prompts served as a challenge that allowed the learners to engage with the peers in the active discussion, allowing them to synthesize the information they each contribute which was helpful compared to just memorizing it. IT allowed one to understand how their colleagues understood the course lessons as well as appreciate the diverse perspective on the various topics of the discussions.
3. Uncertainties Related to Physical Security
Physical security is a wide field that is easy to ignore as one focusses on implementing technical security measures to protect their assets. While the course covered a wide array of topics related to physical security in the protection of hardware, networks, facilities, and other secure spaces, some of the concepts covered in the course were not easy to understand. For instance, the use of natural physical features to enhance surveillance, adding visibility that gives any potential offender the illusion of increased sense of being observed (Ariel, Bland & Sutherland, 2017). However, one can also take advantage of this increased visibility and openness such as one provided by low fencing to conduct surveillance on their target, and invade the homes when the owners are not there. It is, therefore, not easy to understand whether increased visibility provides security, or should be understood as a vulnerability in physical security.
DISCUSSION-2
1. The thing which caught the attention in this course is the various ways of protecting organization data from being used by hackers and other cybercriminals. The course enables one to identify the effective methods which can be used to prevent various threats to an organization's data and ensure that there is the security of the data. In this regard, It can be denoted that the course has been helpful as it has equipped individuals with knowledge on how to fight cybercrimes.
2. The discussion board discussion has enhanced ones learning by enabling them to understand deeply the various ways which are used to prevent the attacks to the organization's data. The discussion board denoted that various physical features also can be effectively used to prevent the intruders from accessing the organization. The course, in fact, enables one to understand various steps that should be taken to ensure that information of an organization is secure.
3. The things which individuals are uncertain in regards to physical security is the design of an organization security system to ensure that any suspicious behavior is detected and any heinous activities are thwarted before it is carried out by criminals. In essence, it is apparent that the customers and the intruders of an organization are similar and thus sophisticated systems should be put in place to ensure that they are differentiated in order to maintain secure information in an organization.