Premium Essay

Case 3: Physical Security

In:

Submitted By dainisboy5
Words 354
Pages 2
CASE 3: PHYSICAL SECURITY p.64
Required:
1. Why are the auditors of Avatar stressing the need to have a better physical environment for the server? If Avatar has proper software controls in place, would that not be enough to secure the information?
Ans. Auditors of Avatar are stressing the need to have a better physical environment for the server to secure and protect the infrastructure itself (hardware, sorftware and networking devices) as well as the information they hold from possible threats. The company may not only lose the investment they put for the servers and data but it can also impair their ability to function as a business. Evidently, software controls that are currently in place are not enough to secure the information. Additional control features must be considered to guarantee the security of the server and help them mitigate risks. 2. Name the six essential control features that contribute directly to the security of the computer server
Ans.
a. The physical location of the computer center directly affects the risk of destruction to a natural or man-made disaster. b. Computer center should be located in a single-story building of solid construction with controlled access c. Access to the computer center should be limited to the operators and other employees who work there. d. Computers function best in an air-conditioned environment, and providing adequate air conditioning is often a requirement of the vendor’s warranty e. The implementation of an effective fire suppression system is essential as fire could seriously endanger a firm’s computer equipment f. Fault tolerance which is the property that enables a system to continue operating properly in the event of the failure of (or one or more faults within) some of its components.

CASE 4: Disaster Recovery Plans p.64-65
Required
1. Describe the computer

Similar Documents

Premium Essay

Close Protection Public Services Unit 18

... 04/04/16 Unit Title: Security Procedures in the Public Services Unit N: 18 P1. Identify the threats and the consequences of a failure in securities that exist to the security of people, property and premises in a public service. ..For this example we take a nightclub with a capacity of about 300 people. My role is DS – doorman. We have to secure the safety of premises, people and everyone. Potential threats that we possibly can have are: 1. Drunken people coming in 2. Drug pushers trying to get in and sell their drugs inside 3. Overcrowding 4. People bringing weapons in M1. Explain the use and application of the most suitable security measure to deal appropriately with the threats. In this case the most suitable security measures to deal appropriately with these threats would be: 1. Drunken people – you can refuse the entry for them. 2. Drug pushers - you can search them; if the drug is found you confiscate it, secure in a secured place and then refuse the entry for them 3. Overcrowding – you use the special counter to count the amount of people who went in and when the critical mass is approaching (in our case it is something like 250-260 people) you have to come out to the queue and tell people that they may or may not be admitted because there is not enough space inside of a venue. 4. Weapons – you search them; if the weapon is found you confiscate it and refuse the entry. In some cases you may also say that you could...

Words: 1214 - Pages: 5

Premium Essay

Importance Of Information Security

...Information Security A company cannot be an open book in its inner workings and finer details if it means to protect itself from negative consequences such as theft or being overtaken by the competition. Companies have a duty to prevent unauthorized access, copying, or destruction of their digital and non-digital data. This endeavor is collectively referred to as information security. The management of information security depends on three areas of accountability: I.T Security, Information security, enterprise (physical) security (Gelbstein, 2013). Each of these 3 will be discussed with specific examples below. IT Security As per Wikipedia, IT security (computer security) is “ the protection...

Words: 948 - Pages: 4

Premium Essay

Maximum Security in Database Management

...Maximum Security in Database Management Maximum Security in Database Management Rackspace Introduction In the current world there people and organization experience un-eventualities and risk of their confidential information. My organization, Rackspace, is a hosting and cloud system organization. For this company it is vital that information is stored in data bases that are run by organizations, locally hosted on personal computers. Intruders can access this information if it is not properly secured. Therefore the purpose of this study is to inform about the current savvy technologies that can be applied to completely thwart intruders from accessing such delicate information within Rackspace. Part 1: Project Identification and Business Environment For this project to go on in a smooth and effective manner different individuals must carry on certain specified task. For Rackspace, this means that every person must hold on to a responsibility to properly and pursue it to the end. Some of the responsibilities are interdepended and other are depended. In case of an interdependent responsibility there will be a proper communicated channel of events that will ensure that information is traversed from one source to another to smoothen up events. Therefore, the following a list of responsible individuals who will implement the process of securing the database of an organization. Company Chief Executive Officer Responsible for overseeing the success of...

Words: 3927 - Pages: 16

Premium Essay

Nt1330 Unit 4

...comparable cost of the server virtualization implemented by Landmark Healthcare in 2009. PROPOSED Virtualized Infrastructure Phase I (2015) Existing physical Infrastructure 2015 Server Hardware $24,539 35 installed servers $76,000 125 installed servers Storage Hardware $- $- Direct attached storage only Network Switches $12,979 Two new switches purchased $38,937 6 installed switches Virtualization Software $3,600 VMware infrastructure 3 foundation and vCenter Foundation NA System Management Software $2,466 Costs for server based backup $12,694 Costs for server based backup Operating System Licensing $13,394 23 Windows Standard...

Words: 499 - Pages: 2

Premium Essay

Cis 550, Term Paper: Diginotar, Part 6b

...Running head: CIS 500, Case Study 1: Stratified Custom Manufacturing, Part 2 
 ABSTRACT This paper develops a security policy document for my mid-sized organization “Canar Networkung Organization”. The paper will include measures to protect against breaches and act as a proactive defense. It defines the segments of policy that are purpose, audience, document information and scope for the success of organization. This paper also develops the policy criteria that protect the organization from proactive defense and organizational risks. It examines the objectives, complains, responsibilities, implementations and control of policy criteria in order to enhance the organization. The paper also details the policy measurement in order to mitigate the organizational threats, and provides an effective security elements for the enhancement of the organization. Introduction: The policy This policy is the procedure and principle that guides the decisions and the rational outcomes of an organization. The subjective and the objective decisions can be assisted by policy in order to make better environment to the organization. Policies include the set of decision that can be associated by the senior management in an organization. Document information: The framework of Canar Networkung Organization could be provided by document information for the development of organization...

Words: 7361 - Pages: 30

Free Essay

Workpllace Violence

...Workplace Violence Case Study 01 Supervised by Dr. Hesham Sadek Prepared by Amr Mohamed Anwar (52 F) Workplace Violence Case Study 01 1 1- Problem Definition 1 2- Justification of the Problem 2 3- List of Alternatives 2 4- Evaluate Alternatives 2 a- Develop a violence Prevention Program. 2 b- Provide a policy on workplace violence and weapons 3 c- Implement Physical Security 3 d- Background Screening 4 5- Recommendations 4 1- Problem Definition Violence at workplace is the Violence against coworkers, supervisors, or managers by a present or former employee. It happens in the form of physical abuse and threat, that causes the murder of three supervisors with clear intentions from the murdered. 2- Justification of the Problem Violence at work may come from:  a- Unfair treatment. b- Unfair termination. c- Lack of justice. d- Persecution of supervisors or Managers. e- Workplace not safe and healthy enough. 3- List of Alternatives a- Develop a violence Prevention Program. b- Provide a policy on workplace violence and weapons. c- Implement Physical Security. d- Background Screening. 4- Evaluate Alternatives a- Develop a violence Prevention Program. Violence Prevention Program should provide the following: Develop and promote an incident reporting structure so employees have a mechanism for reporting incidents and threats of violence. The system should include a way for employees to give confidential information concerning threats...

Words: 683 - Pages: 3

Free Essay

Workplace Violence

...Workplace Violence Case Study Walaa Essam, Group 52F ESLSCA Business School Workplace Violence Case Study Introduction This case study addresses the problem of workplace violence by analyzing two actual incidents which took place at two renowned multinational firms, which are “DaimlerChrysler’s Toledo, Ohio, assembly plant” and “Lockheed Martin”. The purpose of this study is to help finding a useful managerial tool to decrease the potential for future workplace violence that may lead to loss of life and unnecessary monetary loss. Managers are not necessarily equipped to develop appropriate measures to effectively deal with violent issues. Given the proper tool, managers can often work wonders. But we first need to look at how we define the problem of workplace violence. Generally, people think of workplace violence solely in the context of physical assaults or homicides. Many mental health professionals consider such a definition too narrow, and instead define workplace violence more broadly, such as "any verbal or physical assault or any violence that occurs in the workplace even if its source is not related to the work environment or any abusive, threatening, intimidating, or assaulting conduct against a co-worker whether physical or verbal. Such conduct can be seen in the form of shaking fists, throwing objects, destroying company property, written or verbal threats, swearing, insults, condescending language, hitting, shoving, pushing, kicking...

Words: 3282 - Pages: 14

Premium Essay

Demat

...Dematerialisation is the process by which physical certificates of an investor are converted to an equivalent number of securities in electronic form. Rematerialization is the process of converting securities held in electronic form in a demat account back in physical certificate form. According to the Depositories Act, 1996, an investor has the option to hold securities either in physical or electronic form. Part of holding can be in physical form and part in demat form. However, SEBI has notified that settlement of market trades in listed securities should take place only in the demat mode. All types of equity/ debt instruments viz. equity shares, preference Shares, partly paid shares, bonds, debentures, commercial papers, certificates of deposit, government securities (G-EC) etc. irrespective of whether these instruments are listed / unlisted / privately placed can be dematerialized with depository, if they have been admitted with the depository. The depository system, which links the issuers, depository participants (DPs), Depositories and Clearing Corporation/ Clearing house of stock exchanges, facilitates holding of securities in dematerialised form and effects transfers by means of account transfers. This system which facilitates scripless trading offers various direct and indirect services to the market participants. A depository is an organisation which holds securities (like shares, debentures, bonds, government securities, mutual fund units etc.) of investors...

Words: 1644 - Pages: 7

Premium Essay

Wireless Networks

...Technical Writing Project Cover Sheet Capstone Proposal Project Name: Wireless Home Network Student Name: Degree Program: Information Technology Mentor Name: Signature Block Table of Contents Capstone Proposal Summary 1 Review of Other Work 2 Rationale and Systems Analysis 3 Project Goals and Objectives 5 Project Timeline and Milestones 6 Project Deliverables 8 References 10 Appendix 1: Competency Matrix 11 1 Capstone Proposal Summary This project is going to entail upgrading and installing new components to an existing wireless home network. This is a two story home with attic and basement. Inside this home, there are 8 rooms. A living area, an office area, kitchen, laundry room, 1 ½ bathrooms and 3 bedrooms. Following an interview and on site evaluation to assess what the current needs are, along with the direction of technology in the future. The new network needed to be focused on wireless connectivity of their various devices, which included smart phones, tablets and laptops. There also needed to be easy access for guests who wanted to connect to the wireless network for their own tablets, smart phones and laptops. Currently, the home has DSL internet service, with a basic wireless G router. The DSL service was adequate for the current network setup, but with more and more online content, they were having a problem with lag between devices. The current speed...

Words: 2803 - Pages: 12

Premium Essay

Demat

...with technological advancement have integrated international markets, which have facilitated the scope for uninterrupted mobility of funds in various financial markets. It has also led to efficient and low-cost transactions related to securities. This can be seen in the Indian financial sector reforms also, which started in the early 1990s. Dematerialization of financial securities is the first sign of financial reforms in India. Finance Ministry and SEBI realized the need of more efficient financial system. As a result of this NSDL and CDSL came into picture. It aims at ensuring the safety and soundness of Indian marketplaces by developing settlement solutions that increase efficiency, minimize risk and reduce costs. Our project on “Demat System in India” gave us a detailed picture of how securities are transferred electronically in the share market. In our project we had done a comparative study of the various Depository Participants in Ahmedabad on the basis of their services and charges. This study helped us in finding out what additional services other DPs provide and how the charges differ. Another aspect of our project was to get a feedback from the clients regarding the Demat services provided at Anagram Securities Ltd. By meeting the various clients we were able to find out the scope of improvement in the services provided at Anagram. It becomes increasingly important for students of management to understand the developments...

Words: 16654 - Pages: 67

Premium Essay

Hw3 Case Study for Undergrad Computing

...* Case Study 1: Harriet’s Fruit and Chocolate CompanyThis assignment is due for online students by midnight on Sunday of Week 3 and for on-ground students before Week 4’s class meeting. Submit your assignment to the course shell.Read the Harriet’s Fruit and Chocolate Company case study found in Chapter 2 of the textbook. Then, answer the questions below. Each response should be one (1) paragraph in length submitted in MS Word and the submission is not to exceed two (2) pages.Write a one to two (1-2) page paper that addresses: * What investigation will you do with regard to the physical infrastructure of the orchards, orchard shacks, and the cold storage building? * Make a list of business goals for Harriet’s Fruit and Chocolate Company. What are some constraints that will affect these goals? * Make a list of technical goals for Harriet’s Fruit and Chocolate Company. What tradeoffs might you need to make to meet these goals? * Will a wireless solution support the low delay that will be needed to meet the needs of the applications? Defend your answer. * What security concerns should you bring up as you design the network upgrade?The format of the paper is to be as follows: * Typed, double-spaced, Times New Roman font (size 12), one-inch margins on all sides, APA format. * Type the question followed by your answer to the question. * In addition to the one to two (1-2) pages required, a title page is to be included. The title page is to contain...

Words: 1387 - Pages: 6

Free Essay

Today

...SUBDOMAIN 426.1 - NETWORK SECURITY   Competencies: 426.1.1: Advanced Network Overview - The graduate compares and contrasts the common types of network topologies, network protocols, and network infrastructure components and their functions and identifies their strengths and weaknesses. 426.1.4: Establishing Physical Security - The graduate identifies and evaluates the appropriate security practices that are necessary to support physical security site operations. 426.1.5: Preventing Network Attacks - The graduate defines and evaluates different types of network security threats and selects appropriate countermeasures or controls to protect against them. 426.1.6: Intrusion Detection Systems (IDS) - The graduate analyzes network auditing tools related to intrusion detection. Introduction:   Myrtle & Associates and Bellview Law Group are two medium-sized law firms specializing in personal injury cases. The law firms have had a cooperative working relationship for the past 20 years. Recently, the firms have decided to consolidate and merge into one larger firm with a new name: MAB Law Firm. The challenge will be to integrate the computer systems from both firms into one large network. The two law firms are located across town from each other. The integration effort should be designed to combine the firms into a single logical site.   Myrtle & Associates has three servers that were recently upgraded to Windows Server 2008. One of them functions as a domain controller,...

Words: 575 - Pages: 3

Premium Essay

Map Hindustan

...Systems 1) Smartphones have the same security flaws as other Internet-connected devices. Answer: TRUE Diff: 2 Page Ref: 224 AACSB: Use of IT CASE: Comprehension 2) Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up. Answer: TRUE Diff: 2 Page Ref: 224 AACSB: Use of IT CASE: Comprehension 3) Viruses can be spread through e-mail. Answer: TRUE Diff: 1 Page Ref: 224 AACSB: Reflective Thinking CASE: Comprehension 4) The term cracker is used to identify a hacker whose specialty is breaking open security systems. Answer: FALSE Diff: 2 Page Ref: 228 AACSB: Use of IT CASE: Comprehension 5) To secure mobile devices, a company will need to implement special mobile device management software. Answer: TRUE Diff: 3 Page Ref: 248 AACSB: Use of IT CASE: Comprehension 6) Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan. Answer: TRUE Diff: 2 Page Ref: 225 AACSB: Use of IT CASE: Comprehension 7) Computer worms spread much more rapidly than computer viruses. Answer: TRUE Diff: 2 Page Ref: 226 AACSB: Reflective Thinking CASE: Comprehension 8) One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender. Answer: TRUE Diff: 2 Page Ref: 228 AACSB: Reflective Thinking CASE: Comprehension 9) Sniffers enable...

Words: 5826 - Pages: 24

Premium Essay

It 244 Week 1

...sections of an Information Security Policy. Final Project Timeline You should budget your time wisely and work on your project throughout the course. As outlined below, the assignments in the course are designed to assist you in creating your final project Information Security Policy. If you complete your course activities and use the feedback provided by the instructor, you will be on the right track to successfully complete your final project of creating an Information Security Policy. □ Week One: Introduction Review the two company profiles provided in your syllabus and select the one you will use for your final project company. You design the Information Security Policy for this company throughout the course. Once you have decided which company you are using, it may not be changed; therefore, considerable thought should be put into this decision. Next, decide which type of information security policy—program-level, program-framework, issue-specific, or system-specific—is appropriate for your final project company. Assignment: Final Project Information Security Policy: Introduction Complete and submit Appendix C. Note. Section 1 Introduction of Appendix C corresponds to Section 2 of Appendix B in the final compilation due in Week Nine. In completing Appendix C, provide an overview of your final project company, describe the type of security policy that is appropriate for your scenario, and explain your security goals in terms of confidentiality...

Words: 899 - Pages: 4

Free Essay

Shb123

...Countries. ONGC – Western Onshore Basin invites applications from young and energetic Indian Citizens for selection of following posts with valid registration of the employment exchanges located within the State of Gujarat. The Employment Exchange certificate / Card registration should be valid during the online registration process. SL. NO. 1 2 3 4 POST LEVEL TOTAL NO. OF POST 307 03 A-2 Level 171 02 PAY SCALE/ TOTAL EMOLUMENT `.11000- 24000/(Total emolument would be `.29000/Approx. per month.) `.12000-27000/(Total emolument would be `.32000/Approx. per month.) REMARKS Regular Regular Under SRD Regular Regular Under SRD A-1 Level Total emoluments includes :(a) Allowance @47% of Basic Pay under Cafeteria Approach. (b) Dearness Allowance. (c) Mining Allowance. (d) HRA/ Company Accommodation. (e) Contributory Provident Fund. (f) Performance Related Pay (PRP). (g) Medical Facility for self and Dependents. (h) Gratuity. (i) Self Contributory Post Retirement Benefit Scheme. (j) Composite Social Security Scheme as per Company Rules. Total post 483 Nos. The job demands outdoor field work in shifts requiring considerable physical efforts and technical skills. The job is transferable to any...

Words: 4451 - Pages: 18