Table 2: Advantages and Disadvantages of Critical Measures used Protecting Operating …show more content…
1.1.1 Smart card technologies The need to verify the identity of user every day is remedied; it can also monitor conveniently the location or “whereabouts” of a certain user or individual; “Access changes” can be done with ease upon employee’s termination / resignation and badge loss; It can also limit the number of password for each user and access system;
It can result to work efficiency through less work hours in resetting passwords and “locked out systems” (Wees, 2012). Costly and also prone to replication of smart cards that can result in authorized system access (Wees, 2012)
2 Access control Limit user’s access to data, applications, communication, networks and system after the identification and authentication process
(Wees, 2012); Protect systems against internal and external …show more content…
Unsolicited files or documents must not be uploaded (Belthoff, 2003) Need cost, time and effort for regular system maintenance, monitoring and security procedures; Employee training and the use of software applications for internal audit / assessment can be costly and
“extensive” (Kakareka, as cited in Wees, 2012). Cited in: Kent & Steiner, 2012, p. 5; Belthoff, 2003; Wees,