Question

Now it is time to write the complete report and plan for the company. Your full...

Now it is time to write the complete report and plan for the company. Your full report will include:

1. Determine where to relocate the Data Center - be as specific as possible about the best site for the center in relation to the main facility (task 3)

2. Decide what physical security is needed to secure the site. Be detailed on all levels of security. (task 3)

3. Determine threats (task 2) and appropriate countermeasures to deal with common threats.

4. Develop a set of measures to review security regularly and countermeasures to address the most common social engineering attacks. This will include physical and personnel countermeasures. (task 4)

5. Develop a set of posters for employees. (You will use task 1 and add any new information you believe employees need to know)

6. An executive summary (maximum 2 pages that summarizes findings and recommendations)

Homework Answers

Answer #1

Hi, I would love to answer you with the questions, hope you will like an answer and get an idea related to the same. So let's move with the question.

Ans.1 Determine where to relocate the Data Center - be as specific as possible about the best site for the center in relation to the main facility?

  • The Data center for the company needs to be relocated and the site is required, as per my suggestion the organisation must look for its branches if there is any in the other countries then it must be preferred and if specifically want more exact the data center must be somewhere away from the general reach of the people in the city so as resulting in the layer of the security and the physical security must be ensured. As there are many giant company you may know had its data center underwater in the sea.

Ans.2 Decide what physical security is needed to secure the site. Be detailed on all levels of security?

The measures for assuring the physical security are as follows:

  • Guards must be available at the entrance of an organisation for the manual security checks
  • Cameras must be available for every single spot related to the data center
  • Biometric authentication for the entrance in the premises
  • Double Factor authentication through the smart cards for the allowed personals
  • Inside the center devices security must be proper by deploying the guards and the cameras
  • Fire alarm and the prevention system
  • Multifactor authentication and authorization at the Hard room entry
  • Walls of the building must be high and spikes must be implanted
  • No Weapon policy for anyone whether the owner except the guards

Ans.3 Determine threats (task 2) and appropriate countermeasures to deal with common threats.

  • DDOS attack - The Distributed Denial of Service attack is the most common and the fearful threat for the companies as the services may not be accessed if the attack succeeds as the millions of payloads attack the one single IP and the services stops working as unable to handle the load. This may be prevented as not maintaining the whole server on the single IP and it should be using the VPN and the sandbox and honeypots must be deployed by the security team so as resulting in the prevention of the DDOS attacks.
  • Social Engineering attacks - This is most powerful weapon for the attackers by tricking the person and gathering the crucial information and exploit the target and this is the how the attackers can target the employees by spoofed mails and phishing. To avoid such attacks the employees must be provided the basic training for these related attacks and how to ignore these practices to prevent themselves and the organisation
  • Physical Security Threats - If the physical security is not been implemented then the attackers may enter the security zones and try to access the data in an unauthorized manner. This can be mitigated by deploying guards , cameras and the multifactor authentication for the authorized physical access.

Ans.4 Develop a set of measures to review security regularly and countermeasures to address the most common social engineering attacks. This will include physical and personnel countermeasures.

  • ​​​​​​​Training sessions for the employees to prevent from the social engineering attacks
  • Never open any liks or download any attachment till not trusted
  • Regular checking of the physical security if the center and the company
  • Do not enter any credentials in front of anyone else
  • Never fill credentials on the links by someone else till trusted
  • Never insert any untrusted external device like pen drive , CD etc.
  • Lock you device everytime you move away

Ans.5  Develop a set of posters for employees. (You will use task 1 and add any new information you believe employees need to know)

  • Posters representing the laws of the comany
  • Posters related to securing themselves
  • Posters for the proper usage of the resources
  • Posters for the security of company assets

Ans.6 Summary

I would not be going in the deep to summarise the above functions for the security the bullets point must be visited so as to understand better and in a quick manner and generalising the whole concept behind the same.

  • Data center must be out of the reach of the normal citizens
  • Physical security must be a priority
  • Cyber threats must be properly handeled
  • Social engineering attack mitigations must be applied
  • Multifactor authentication must be enabled wherever possible
  • Posters for the reminder to the employees

These are the basic summary points which must be adopted to provide the security to a company.

Hope you got a clear idea for th question

Please like and answer and do comment for any queries

Thanks and Happy to help :)

​​​​​​​HAPPY LEARNING

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Overview Your assignment is to complete a wireless network design for a small company. You will...
Overview Your assignment is to complete a wireless network design for a small company. You will place a number of network elements on the diagram and label them appropriately. A network diagram is important to communicate the design features of a network between network administrators, system administrators and cyber-security analysts. It helps to create a shared mental model between these different technologists, yet each will have their own perspective on what is important to have documented on the diagram. Please...
Case Study 11.1 – TATA’S HANDLING OF THE MUMBAI TERRORIST ATTACKS Tata, a global group of...
Case Study 11.1 – TATA’S HANDLING OF THE MUMBAI TERRORIST ATTACKS Tata, a global group of companies headquartered in India, operates in seven busi­ness sectors: communications and information technology, engineering, materials, services, energy, consumer products and chemicals. The group operates in more than 80 countries across six continents, with 58 per cent of its revenues coming from business outside of India. Well-known companies within the group include Tata Steel, Tata Motors, Tata Consultancy services, Tata Tea and Taj Hotels. Whilst...
provide 3-4 paragraphs post (team 2) 1-What are 4 key things you learned about the topic...
provide 3-4 paragraphs post (team 2) 1-What are 4 key things you learned about the topic from reading their paper? 2-How does the topic relate to you and your current or past job? 3-Critique the paper in terms of the organization and quality.1- Employee Stress and how it has an Adverse Effect on a Company This paper explores employee stress and how it has an adverse effect on a company, its employees and the organization. Job stress can have a...
Please answer this question in short essay form (2-4 paragraphs) Considering that cultures as complicated and...
Please answer this question in short essay form (2-4 paragraphs) Considering that cultures as complicated and socially constructed through the communicative interaction of organizational members. Briefly describe how the organizational concepts of complicated, emergent, unitary, and ambiguous apply to the sample auto-ethnography. Sample Auto-ethnography: Required Reading Auto-ethnography of College X Joe Student Organizational Culture and Diversity 223-58000 “The organization’s culture has both a direct and an indirect impact on the allocation of power among diverse groups. The values and ideologies...
1.Establishing the virtual Management: As known, managing virtual staff requires a different method or approach than...
1.Establishing the virtual Management: As known, managing virtual staff requires a different method or approach than managing local staff. Due to that reason, Golden Scent has developed a strategic plan to successfully manage its virtual staff in the USA. Identify the suitable manager. to make sure our work will proceed as we planned, Golden Scent willrecruit a virtual manager with the essential skills and knowledge required to manage virtual employees. Find the skilled people to work with. Since not everyone...
Scenario Pigs R Us is a second generation, family-owned Richmond-based company with about 400 employees. It...
Scenario Pigs R Us is a second generation, family-owned Richmond-based company with about 400 employees. It slaughters, manufactures, and sells pork food products.  Pigs R Us (PRU) is a low-tech, hands-on, “bricks and mortar” type of company with solid brand recognition, an impeccable reputation for high quality and ethical standards. The processes used in manufacturing are with the highest ISO20002 standards, and the plant is maintained immaculately. The personnel are comprised of an older work force (average employee age is late...
Scenario Pigs R Us is a second generation, family-owned Richmond-based company with about 400 employees. It...
Scenario Pigs R Us is a second generation, family-owned Richmond-based company with about 400 employees. It slaughters, manufactures, and sells pork food products.  Pigs R Us (PRU) is a low-tech, hands-on, “bricks and mortar” type of company with solid brand recognition, an impeccable reputation for high quality and ethical standards. The processes used in manufacturing are with the highest ISO20002 standards, and the plant is maintained immaculately. The personnel are comprised of an older work force (average employee age is late...
Wal-Mart Online Wal-Mart is one of the largest companies in America. It is definitely the largest...
Wal-Mart Online Wal-Mart is one of the largest companies in America. It is definitely the largest retailer, both in terms of the number of stores (8,970 worldwide in 2011) and the level of sales ($419 billion from the 2011 Annual Report). By pushing suppliers to continually reduce costs, Wal-Mart is known for pursuing low prices and the stores often attract customers solely in-terested in lower prices. With Wal-Mart’s expansion into groceries, the company has be-come the largest retail grocer in...
In the case below please answer the following 4- 6 pages 1. State the ethical issues...
In the case below please answer the following 4- 6 pages 1. State the ethical issues 2. State the legal issues 3. Discuss the options/debate the issues 4. Discuss extra info needed to make decision Rina Cummings has worked three 12-hour shifts every week at Amazon’s gargantuan New York City warehouse, called JFK8, on Staten Island since it first began operations in late 2018. As a sorter on the outbound ship dock, her job is to inspect and scan a...
Using the model proposed by Lafley and Charan, analyze how Apigee was able to drive innovation....
Using the model proposed by Lafley and Charan, analyze how Apigee was able to drive innovation. case:    W17400 APIGEE: PEOPLE MANAGEMENT PRACTICES AND THE CHALLENGE OF GROWTH Ranjeet Nambudiri, S. Ramnarayan, and Catherine Xavier wrote this case solely to provide material for class discussion. The authors do not intend to illustrate either effective or ineffective handling of a managerial situation. The authors may have disguised certain names and other identifying information to protect confidentiality. This publication may not be...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT