Describe how physical security controls are needed to augment logical security controls in a typical data center. What physical security controls would you recommend for server rooms or network switching equipment closets if a full-blown data center is not practical?
The main purpose of data centers is to store the data on the
servers. It is important to know that data centers should maintain
very high security in terms of both physical and network sides. The
security issues mostly cause due to the employees within it.
There are many ways to protect security wise like
- keep survelliance through camera videos
- Single entry point
- biometric access
- keeping high alarms to protect from natural disasters.
- fire suppression
- glasses which protect from bullets.
Server can be placed in rooms that are kept very secured,
so the following things needs to be followed
temperature control, motion sensors, High resolution camera.
Describe how physical security controls are needed to augment logical security controls in a typical data...
The main threats that physical security components combat are theft, interruptions to services, physical damage, compromised systems and environment integrity, and unauthorized access. However, the information held within the equipment may be much more valuable than the equipment itself. Which controls we choose to use to mitigate risks to our information depend not only on the value we assign to that information, but also on the dynamic state of that information. Our data exists in one of three states: at...
Question 2 (20 marks) – Improving network design Jim is impressed by your report and asks you to write a proposal to improve the network, although his budget is limited he tells you that if you can justify your design choices you may be able to purchase some more equipment. You will need to provide a new network design diagram in PowerPoint format, thankfully Jim has included a couple of slides with various network equipment elements that you can use...
Instructions: For the scenarios that follow, identify the data that would need to be protected. Recommend how you would implement one or more of the access controls (listed after the scenarios) for the given scenario and justify your recommendation. Scenarios: 1. Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. 2. Top Ads is a small advertising company consisting of 12 computers that have internet access. All employees communicate using smartphones. 3. NetSeclt...
ONLY REALISTIC ANSWERS PLS QUESTION: 21 A newly hired Chief Information Security Officer (CISO) is reviewing the organization’s security budget from the previous year. The CISO notices $100,000 worth of fines were paid for not properly encrypting outbound email messages. The CISO expects next year’s costs associated with fines to double and the volume of messages to increase by 100%. The organization sent out approximately 25,000 messages per year over the last three years. Given the table below: Security Product...
Physical Security we will survey the security issues identified with the offices, that is, the framework and utilities we requirement for our business, and how we can continue giving them at the same quality with no interference. It's implied that you ought to begin with an all around outlined occurrence reaction, calamity recuperation, and business congruity arrangement. In the event that you review the discourses from the security arranging module (part 4), excess is the catchphrase in all answers for...
Please choose 5 questions from 20 and answer them. 1. How can a security framework assist in the design and implementation of a security infrastructure? What is information security governance? Who in the organization should plan for it? 2. Where can a security administrator find information on established security frameworks? 3. What is the ISO 27000 series of standards? Which individual standards make up the series? 4. What are the issues associated with adopting a formal framework or model? 5....
Scenaric im runs a small consulting firm, Soylent Co, with 30 employees spread between accounts, human resources, administration, and engineering. Jim's son, Tony, knows a bit about computers and so Jim has asked him to upgrade the company network. You went to high school with Tony. You receive a panicked phone call from Tony telling you that he has spent the last two days trying to find why his father's newly upgraded network is having significant stability problems. You've agreed...
List and describe at least four benefits of maintaining fitness, including how physical activity conveys the benefits you covered. Describe what is meant by the term cardiorespiratory conditioning. Distinguish between exercises that are aerobic and those that become anaerobic. Describe physiologically what happens during intense activity when muscle cells convert to anaerobic respiration. Alan is training for the upcoming Boston Marathon, a 26 mile run that takes place every year. In addition to physical training, Alan has adjusted his diet...
Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable detail how a company leverages an ERP system and how its operations are improved after installing an ERP system like SAP. Explain how a supply chain management system helps an organization make its operations more efficient What is Upstream and Downstream management of the supply chain? Explain the concept of “Supply Network”, its benefits, and how technology made this concept available Explain the difference...
• Describe in detail a problem domain in the area of GIS. • Explain in detail how you would gather data needed to address this problem. Is there a public dataset available? Would you need to purchase the data you need? • Explain how you would model and/or store the data. Would you use a relational database? A NoSQL database? A GIS-specific database? A flat file? What would your data model look like and why? How (if at all) would...