Part I – Answer the module review questions listed below. These questions were chosen to demonstrate your understanding and help you assess your progress.
Part II – Go to a popular online electronic commerce site like Amazon.com. Select several items for your shopping cart and go to check out. When you get to the screen that asks for your credit card number, right click on the web browser and select “Properties.” What can you find out about the crypto systems and protocols in use to protect this transaction? Repeat this exercise for a different website. Does this site use similar or different crypto systems and protocols? Describe them.
Part III – List and describe the four primary types of UPS systems. Which is the most effective in protecting computer systems? Which is the most expensive? Why?
Part IV – In this module, you will produce another key component of your security plan, the Physical Security Policy.
Using the airport case we have established in module three, using what you have learned in this module, and using the Web for examples of Physical Security Policies, create a Physical Security Policy applicable to your airport project. You may use the Physical Access Policy template (.docx) as a guide or modify it as applicable to write your Physical Security Policy.
Part V – Answer the Module Review Questions listed below. These questions were chosen to demonstrate your understanding and help you assess your progress.
Part VI: Select a system of your choice, describe the acquisition process, and develop a detailed outline of a SEMP for the program in question.
Part VII – Who should be responsible for preparing the SEMP: Consumer, Producer, Contractor, Sub-contractor, or Supplier? Discuss some of the conditions and interfaces as applicable.