There are many different encryption algorithms that you can choose from when trying to achieve one of the four goals of cryptography. In this video, learn about some of the key criteria that should be used when selecting encryption algorithms, including the use of proven technology, key length, and the trade-off between cipher strength and performance.
- [Instructor] You may need to allow visitors … access to your secure facilities. … It's important to have visitor control procedures in place … that describe who may authorize visitor access … and how visitors may behave in your facilities. … Your visitor access procedures should clearly identify … the allowable reasons that a visitor … might enter your facilities … and the appropriate levels of approval required … for different types of visitors … under different circumstances. … These procedures should also explain … what types of visitors, if any, … may be granted unescorted access to the facility, … and who may escort other visitors. … Each time a visitor enters a secure facility, … you should maintain a log of that access. … This may be as simple as asking visitors … to sign a paper visitor register, … or it may use a more complex electronic process. … All individuals inside a secure facility … should wear identification badges … that they clearly display on their person. … Badges for visitors should be distinctive enough …
Released
10/29/2020We are a CompTIA Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
Share this video
Embed this video
Video: Visitor management