Rosete, MI

2
Rosete, Herrika Red G. Permit #52435KK Scene 1 Ethan Hunt, Ilsa Faust and Benji Dunn went to the power station without being captured by the security personnel. The two, Hunt and Faust broke the glass in the station and went down to access the server in the underwater tank. When they had already stopped the cooling system, Hunt jumped into the water to change the access control of the security profiles so that Dunn can pass through the profile analyzer. Because of their detailed plans and knowledge of the security systems, they had successfully stolen the ledger containing the names of all the Syndicate agents. This scene just shows the lack of physical and security controls for the protection of the central computer terminal underwater. Although the server is difficult to access because of its location, the station still needs to improve its security and access controls so that unauthorized individuals can not have easy access to the server. The station lacks security personnel that should be watching over the entrance of the power station and roaming around it. Also, the data stored underwater should have been protected by setting more access controls like safety storage with passwords and locks so that it cannot be easily accessed so that data stored in the terminal cannot be changed, like what Hunt did. The station’s system also used detection controls in which it was able to detect that the cooling system had stopped operating. I think it would be better if they employed personnel that would look into the system and investigate irregularities that it had detected. In the movie, access and security controls are employed to protect the system. This also applies to the business in which controls are also used to manage risks in the organization. Proper controls would able the organization to protect its

description

hhh

Transcript of Rosete, MI

Page 1: Rosete, MI

Rosete, Herrika Red G.Permit #52435KK

Scene 1

Ethan Hunt, Ilsa Faust and Benji Dunn went to the power station without being captured by the security personnel. The two, Hunt and Faust broke the glass in the station and went down to access the server in the underwater tank. When they had already stopped the cooling system, Hunt jumped into the water to change the access control of the security profiles so that Dunn can pass through the profile analyzer. Because of their detailed plans and knowledge of the security systems, they had successfully stolen the ledger containing the names of all the Syndicate agents. This scene just shows the lack of physical and security controls for the protection of the central computer terminal underwater. Although the server is difficult to access because of its location, the station still needs to improve its security and access controls so that unauthorized individuals can not have easy access to the server. The station lacks security personnel that should be watching over the entrance of the power station and roaming around it. Also, the data stored underwater should have been protected by setting more access controls like safety storage with passwords and locks so that it cannot be easily accessed so that data stored in the terminal cannot be changed, like what Hunt did. The station’s system also used detection controls in which it was able to detect that the cooling system had stopped operating. I think it would be better if they employed personnel that would look into the system and investigate irregularities that it had detected.

In the movie, access and security controls are employed to protect the system. This also applies to the business in which controls are also used to manage risks in the organization. Proper controls would able the organization to protect its resources and be able to detect fraud, errors and inefficiencies. Physical control can help the business protect its assets and records. Authorization for access to data files, resources and computer programs may help in identifying and recording valid transactions.

Scene 2

William Brandt called Dunn to stop the takeoff of a plane which had a package of a destructive gas. When the plane started to takeoff, Hunt suddenly appeared on the scene and asked Dunn to let the plane’s door be opened so that he can go inside it. Hunt was able to get into the plane since Luther Stickell had successfully hacked the satellite, overwrote codes and let Dunn be connected to the control system of the plane. The pilot had detected that some doors had opened and let his co-pilot checked what was happening. They later find out that someone, Hunt, had already got into the plane and took away the package of destructive gas with his parachute.

Page 2: Rosete, MI

This scene shows how computer systems can be sabotaged by hackers. Hacking enabled Dunn to control the system in the plane thus gaining unauthorized access and control over the system.

In business, security measures are employed to protect the system in which the business is relying on. Security controls like firewalls and anti-viruses prevent threats like hackers and viruses from accessing the system. Business information like banking and financial accounts, customer’s accounts, databases, and others must be protected from any unauthorized access by changing passwords often so that hackers won’t easily infiltrate the system.