During an audit of an access control system, an IS auditor finds that RFID card readers are not connected via the network to a central server.
Which of the following is the GREATEST risk associated with this finding?
Click on the arrows to vote for the correct answer
A. B. C. D.D.
The correct answer is A. Lost or stolen cards cannot be disabled immediately.
Explanation: RFID (Radio Frequency Identification) card readers are devices that use radio waves to communicate with RFID tags, which are attached to objects or individuals. RFID card readers are commonly used in access control systems to grant or deny access to physical spaces, such as office buildings or rooms.
When RFID card readers are not connected via the network to a central server, there is a risk that lost or stolen cards cannot be disabled immediately. This means that if an employee loses their RFID card or if it is stolen, an unauthorized individual could potentially use it to gain access to secure areas. Without a centralized system, the process of disabling the lost or stolen card will likely require manual intervention, which could be slow and error-prone, increasing the risk of unauthorized access.
Option B is not the greatest risk because card reader firmware updates can still be rolled out manually, albeit with some inconvenience. Option C is not relevant as it refers to scalability, which is not directly related to the risk of unauthorized access. Option D is not the greatest risk as incidents can still be investigated through other means, such as physical security measures, eyewitness accounts, and CCTV footage.
Therefore, the greatest risk associated with the finding that RFID card readers are not connected via the network to a central server is that lost or stolen cards cannot be disabled immediately, increasing the risk of unauthorized access.