This website uses cookies to ensure you have the best experience. Learn more

Access Control Systems Essay

2942 words - 12 pages

Abstract
Access control systems were examined to determine if a network based system would be more reliable and beneficial. Two major systems were determined to be very beneficial to the company. In contrast, the systems would consume a great deal of resources in order to be put into full working order at all sites worldwide. Together these findings suggest that using a network based system can ultimately serve the company better and create a more secure environment for the research and the employees.

Keywords: Access control, CCURE, Locknetics, security, networking  
Network Based Access Control Systems: What Are They?
Personal and confidential information can easily be accessed ...view middle of the document...

” (Laudon, & Laudon, 2010) Some devices that would be considered in the access control system family are passwords, tokens, smart cards, biometrics, firewalls, intrusion detections systems, and keypads. As most of you know we already utilize a great deal of these systems at Bristol-Myers Squibb. However, there is much more we can do to better protect ourselves and utilize these systems to the best of their ability.
Brief Background
Bristol-Myers Squibb is a Fortune 500, New Jersey based company with many sites worldwide. Often known as BMS, the company took on the name in 1989 after the merger of two world renown pharmaceutical and overall health companies, E.R. Squibb and Bristol-Myers. Up until late 2009 BMS produced such common products as the Burt’s Bees line, Clairol, and Enfamil. (Bristol-Myers Squibb, 2011) On December 23, 2009 BMS sold all of their shares of Mead Johnson (the producer of Enfamil, Burt’s Bees, and Clariol) to redirect its focus to strictly biopharmaceuticals. BMS’s new mission is to “discover, develop and deliver innovative medicines that help patients prevail over serious diseases.” (Bristol-Myers Squibb, 2011) BMS announced “Project Focus” to their employees in 2009 and has since completed the first stage of it. The first phase of project focus is reorganizing BMS to free up as many funds and positions as possible that do not focus on research and development, thus contracting out many positions that were once filled by BMS employees. Johnson Controls Inc. won the contract for majority of Facilities; this includes security, building maintenance and operations for the Americas. While Veolia won the contract for Europe and Asia.
This is where access control systems come into play. Since there is a constant movement of people it is a necessity to keep the sites secure to the best of our abilities. BMS is filtering many new employees in and old employees out which becomes a problem with manual programming. Because of BMS’s large size and many research and development sites with critical areas it would be extremely advantageous to use a universal network based access control system. BMS currently uses many variations of access control systems, such as, HID card readers, biometrics, firewalls, VPN, CCURE 800 and Locknetics. The largest problems with BMS’s current setup are the many vendors that are used to implement these systems, the different variations of systems are used, and that some of the systems require manual programming. Many of the systems are not universally networked causing many man hours to be spent programming each system individually.
By using different vendors it allows many companies to know the inner workings of BMS and gives these outside company’s access to what we want everyone not to see. For instance, the companies Access Systems Integration (ASI) and Deterrent Technologies installed the majority of the access systems for the Hopewell, New Jersey site but not for the...

Other Papers Like Access Control Systems

Disaster Recovery Plan Essay

590 words - 3 pages . Remote Network Access 5 3. Security Network Ports 5 4. Encryption 5 5. PKI Compliance Requirements 5 6. Passwords, Pins, and Other Forms of Access 5 C. Physical Access Controls 5 1. Classified Storage and Handling 5 2. Badges, Memory Cards, and Smartcards 5 3. Physical Tokens and Physical Intrusion Detection 5 V. Access Control Integration and Administrative Strategies 5 A. Biometric Systems 5 B. Separation of Duties

Access Control Methods for Companies Essay

614 words - 3 pages control mechanism for most desktop operating systems. Which is appropriate for the company because they are desktop dependant. This allows for enforcement of a good security policy. 2. Top Ads is a small advertising company consisting of 12 computers that have Internet Access. All employees communicate using smart phones. For this scenario I would implement Role Based/ Software controls. With software controls you can determine who has the

File Management

807 words - 4 pages control scheme with each user assigned unique user identification number or user ID. Since the access control data is focused on one singular place, switching access control data is easier and there is less requirements for space. Regarding 5,000 users in a UNIX based schemes; an extended access control list is needed. This approach is supported by most of the modern UNIX and UNIX-based operating systems using the FreeBSD approach, whereas the

Herman Miller

884 words - 4 pages rapidly and are penetrating the market with a number of I/O channels. SCADA systems evolved from hardware and software in the 1970s to current systems that include standard PCs and operating systems, and Internet access. As we know that Security of control systems became a concern issue since the emergence of Internet and the rise in terrorist threats. SCADA systems are exposed to the same cyberspace threats as any business system

Unit 2 Assignment 1

559 words - 3 pages user’s logon/password credentials prior to accessing shared drives? Windows Server 2012 R2 does require a user's logon/password prior to accessing a shared drive. 6. When granting access to network systems for guests (i.e., auditors, consultants, third-party individuals, etc.), what security controls do you recommend implementing to maximize CIA of production systems and data? The security controls recommended for third party auditing

Internal Control and Risk Evaluation

845 words - 4 pages Internal Control and Risk Evaluation Lauren A Lewis Accounting Information Systems ACC/542 June 23,2014 Yasin Dadabhoy Internal Control and Risk Evaluation       Internal controls and risk assessments are an essential part for an organization to be successful. Management at Kudler Fine Foods has reviewed the flowcharts prepared and is requesting information on controls that will be required. Risks are the negative events that may occur

Cis 210 - Access Control System

1264 words - 6 pages -Controller [pic] Two-Door IP-Controller [pic] Two-Door IP-Controller (Controlling Entry & eEit on one Door) [pic] Biometric Reader [pic] References Benantar, M. (2006). Acess control systems: Security, identity management and trust models. Chicago: Springer. Ramachandran, J. (2002). Designing security architecture solutions. NY: John Wiley & Sons. Sandhu, R., & Munawer, Q. (2002). Configuring role based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security, Vol. 3, No. 2.

Test

379 words - 2 pages desktop services to remotely access the TargetWindows01 server. Finally, you tested the security layers you placed in the previous parts of the lab by using each new user account to access and modify the nested folders on the remote server. Lab Assessment Questions & Answers 1. What are the three fundamental elements of an effective security program for information systems? 2. Of these three fundamental controls, which two are used by the Domain

File Management

572 words - 3 pages File Management Duane Borchick POS/355 December 24, 2012 Paul Rouk File Management Considering a system that is to support 5000 users, but is only to allow 4990 of the users to have access to one file can be accomplished in a variety of different ways. There are two different options of how to complete this task that will be discussed in this paper. The first and most popular way to accomplish this task is to have an access control

Military Information Systems

652 words - 3 pages attacking hackers can consider the possible effects and causes when stealing and gathering military information illegally (Neil C. Rowe, 2004). For example, the main way of hackers is to attack the military information systems by making problems in regulating the power control telecommunications and power distribution in military. The ability of hackers is to attack the computing designs of military information systems in order to knockout the power

Internal Controls

1129 words - 5 pages accuracy and reliability of accounting data, to promote operational efficiency, and to encourage adherence to prescribed managerial policies. First, there we will identify the risks and internal control points by incorporating these risks into the flowcharts provided in the information systems. The risks for the payroll system are bad inputs that would lead to deficient or distorted payroll amounts (requiring input controls), improper access of

Related Essays

Access Control Policy Essay

542 words - 3 pages Associate Level Material Appendix F Access Control Policy Student Name: Christopher Waller University of Phoenix IT/244 Intro to IT Security Instructor’s Name: Romel Llarena Date: May 13, 2012 Access Control Policy Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems 1 Authentication Describe how and why

Unit 6 Assignment 6.3

602 words - 3 pages Managing Microsoft Account and File Systems Access Controls In order to truly protect a company’s’ data, a multi-layered security approach using access controls must be developed and utilized keeping in mind that data has two states that has to be protected equally; data at rest (DAR) and data in motion (DIM). When securing DAR on a file system whole disk encryption is an essential first step followed by physical security (backups

Protection Scheme Essay

670 words - 3 pages access control list made up with the names of all 5,000 users on it. In this paper I will be discussing and giving you a look into a protection scheme that could be used in an efficient way that will provide that protection to the system. There are certain techniques to protect the systems directories, files, and folders. Most Information Technology (IT) departments will set up appropriate file permissions on the files, set up certain tools to

Access Control Policy Essay

1684 words - 7 pages Associate Level Material Appendix F Access Control Policy Student Name: Charles Williams University of Phoenix IT/244 Intro to IT Security Instructor’s Name: Tarik Lles Date: December 4, 2011 Access Control Policy Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems Access control is used to restrict operations, which authorized users can