Information Technology Reference
In-Depth Information
table 3.4
iA 2 F V iews: enironment examples
IA 2  F Views
Details
People
The organizational culture includes both white-collar and
blue-collar workers. Most blue-collar workers are members
of a union. There is acute awareness of personal privacy
within all employees. Moreover, existing legislation governs
what information we may gather, how we can use it, what
we must protect, and minimal protection requirements.
Employees are also aware of the need for shorter processing
times for entry/exit to the facilities.
Policy
Policy modifications must reflect appropriate guidelines
within TBD legislation. Policy may also address the increase
in safety by accounting for all employees in the event of
emergency.
Business process
The business process environment is the workflow of getting
employees in/out of facilities. Additional processes that may
be affected are HR (time accounting for entry/exit) and
security operations monitoring for false-positives (grant
entry when should not) and false-negatives (deny entry
when should).
Systems and
applications
The systems and applications environment includes a new
RFID system and log analysis software. This system will
integrate to the existing network operations center (NOC)
and security operations center (SOC).
Data/information
New data at rest includes digital representation of biometric
and RFID no. on the RFID card; additionally, new data at rest
includes database fields for the same. Data in transit
includes transmission of RFID card information to card
reader and card reader to database for authentication and
authorization.
Infrastructure
Infrastructure environment includes physical entry/exit areas
to channel people for effective card reading. The
environment also includes a secondary reader system for
failures and manual backup (visual validation by guard) for
secondary failure.
Internal to the
organization
Environment is internal only.
External to the
organization
N/A
 
Search WWH ::




Custom Search