SlideShare a Scribd company logo
1 of 7
Requirement/Question:
Examine (see below) your classmates' proposed security
protocols and point out any areas where you believe their
intended security protocols might be vulnerable, as well as ways
to improve such strategies. If there are no noted vulnerabilities,
proposed strategies to enhance his or her security
recommendations.
Respond to at least 2 of your classmates' posts with a minimum
of 200 words each. You must have a minimum of 3 credible
citations to support your claims or arguments. You must also
have a reference list for the citations in the responses.
I need a response/comment for below assignment (3 in text
citation needed 200 words)
Information transmission between financial markets in Chicago
and New York
Every organization needs to ensure that there is the security of
data centers or any place that holds valuable assets belonging to
the people. When an organization fails to foresee scenarios,
there could be occurrence security breaches since it will be
convenient for people trying to breach the data center due to
vulnerabilities. The physical security of the data centers is a
necessary component of any information security strategy
(Shein, 2010). Different risks can lead to failure of the physical
security of the data centers of an organization, which may
include inadequate management of the data center keys, external
hackers, and ineffective monitoring of the behavior of onsite
individuals.
Chicago collocation center is a scenario where physical security
failed, and according to the research, it was reported that the
organization was breached four times between 2005 and 2007
(Laughlin, Aguirre, & Grundfest, 2014). The people responsible
for the management of the data center did not ensure that there
is security to prevent the occurrence of these unfortunate
events. In this attack, there was an intrusion that involves two
masked persons who entered the facility after the cut the
reinforcement walls with a power saw. This attack was made
when the security personnel in the facility were way, and they
found it easy for them to break into the data center. The
intruders were able to steal the vital information of the
organization.
The best practice to ensure the data center’s physical security is
to know where the people are (Patel, & Shah, 2005). The
critical component for the security of the data centers is the
physical access management as it is a vital tool for overall
environment physical security. Therefore, the security persons
need to provide access and understand the movement through
the data center. For the organization to ensure that the access to
spaces is authorized and monitored, Mantraps, anti-tailgating
systems, biometric readers, and other physical controls should
be used.
In the increasingly digitized world, data centers represent a key
technology since they house the storage systems and servers
(Miller, & Beckman, 2013). The physical infrastructure in data
centers should provide power and cooling for the components.
The monitoring of the components should also be permitted for
all the operating parameters. Therefore, physical security in
data centers is crucial for every organization.
Key issues in data center security
Internal testing of physical controls is an essential concept
concerning the physical security of an organization (Niles,
2004). It is essential to validate the access grants, testing the
video footage to ensure that it is recording and also verification
of anti-tailgate mechanisms to ensure that they are working
effectively. The responsible team should ensure that physical
testing is part of the operating procedures. Through testing, the
data centers of the organization will be secure from the
intrusion.
The people responsible for maintaining the physical security of
the data centers should be trained to ensure that they adhere to
the physical security procedures (Knapp, Denney, & Barner,
2011). Trained personnel must understand the importance of
their responsibilities to the physical security programs of the
data center. Intruders of the data centers look at the weak links
to access the location, and these vulnerabilities can often be on
the human side of the equation. However, training people will
help in the identification of the vulnerabilities and maintenance
of the physical security of the data center in an organization.
Various processes and structures must collaborate with the
company to ensure robust physical security, such as process
management, access controls, and perimeter security.
For the physical security of data centers to be maintained, the
server room should only be access by the service engineers and
other administrative staff (Skorin-Kapov, Furdek, Zsigmond, &
Wosinska, 2016). At the entrance doors, there should be signs
which prohibit staff from bringing drinks, cigarettes, or food
within the room. The rooms should have two doors to help the
staff in case of an emergency. Adequate fire prevention
mechanisms should be deployed in data centers.
In every organization, the physical access to the data center
should be guarded to measure that there is no unauthorized
access (Shim, Qureshi, & Siegel, 2013). The walls need to be
made secure and thick to avoid intrusion. Data centers should
also have CCTV cameras to maintain security. Through these
measures, data centers will be secured against potential
vulnerabilities.
References
Laughlin, G., Aguirre, A., & Grundfest, J. (2014). Information
transmission between financial markets in Chicago and New
York. Financial Review, 49(2), 283-312.
Knapp, K. J., Denney, G. D., & Barner, M. E. (2011). Key
issues in data center security: An investigation of government
audit reports. Government Information Quarterly, 28(4), 533-
541.
Miller, K. C., & Beckman, P. C. (2013). U.S. Patent No.
8,528,101. Washington, DC: U.S. Patent and Trademark Office.
Niles, S. (2004). Physical security in mission-critical facilities.
Schneider Electric.
Patel, C. D., & Shah, A. J. (2005). Cost model for planning,
development, and operation of a data center.
Shein, R. (2010, March). Security measures for advanced
metering infrastructure components. In 2010 Asia-Pacific Power
and Energy Engineering Conference (pp. 1-3). IEEE.
Shim, J., Qureshi, A. A., & Siegel, J. G. (2013). The
International Handbook of Computer Security. Routledge.
Skorin-Kapov, N., Furdek, M., Zsigmond, S., & Wosinska, L.
(2016). Physical-layer security in evolving optical networks.
IEEE Communications Magazine, 54(8), 110-117.
Requirment/Question:
Examine (see below) your classmates' proposed security
protocols and point out any areas where you believe their
intended security protocols might be vulnerable, as well as ways
to improve such strategies. If there are no noted vulnerabilities,
proposed strategies to enhance his or her security
recommendations.
Respond to at least 2 of your classmates' posts with a minimum
of 200 words each. You must have a minimum of 3 credible
citations to support your claims or arguments. You must also
have a reference list for the citations in the responses.
I need a response/comment for below assignment (3 in text
citation needed 200 words)
Panda Habitat Break-in
Physical security is critical in any habitat to protect the animals
enclosed from getting out and preventing external intruders
from getting into the area. However, the main emphasis is
currently put on preventing the animals from escaping. It
resulted in a break-in at the Gulin Zoo's Panda exhibit
(Goodman, 2016). The security breach occurred during the
regular operational hours of the day when a student went over
the fence into the zoo. The wall was approximately 6.5 feet
long. That fence was the only security guarding the habitat from
external physical attacks.
This physical security breach was a result of unbalanced
security measures. The fence might be enough for keeping a dog
or any pet locked inside, but the presence of the dog is an extra
measure of security to complement the wall (Harpham, 2017).
Fortunately, the panda did not get out, but the student rescued
after sustaining bites and bruises. The fence is established as a
boundary the pandas and not as a measure of protection against
external intruders.
If I were in charge of the security in the zoo, I would put in
place the following protocols to ensure the break-in does not
happen again. I would enhance the protection of the zoo by
electrifying the fence around the habitat to discourage external
intruders (Narisi, 2015). I would also increase the number of
security guards both at the entrances as well as those on patrols
around the zoo. The other measures I would implement are
providing improved training to the physical security personnel
not only on how to deal with the animals but also on the best
way to prevent external intruders who might endanger the safety
of the animals.
Baghdad bank security fail
The physical security failure in Baghdad bank resulted in the
loss of a quarter-billion dollars in cash. According to the
information provided, the security guards of the bank involves
in the security failure at the institution (Alissa, 2015). It is still
unknown how the money was in US dollars and not in dinars
currency, considering the bank is in Iraq. It is also unclear
how the robbers were able to move the money from the bank
with all the security cameras in place.
This security breach in the bank stemmed from an improper
hiring as well as a procedural process. The criteria for
recruiting such security guards must have been sloppy. The
guards suspected were said to have had records of robbery in
the past (Slater, 2016). The vaults in the bank were left
unsupervised t night. Another cause identified was that the
security cameras in the catacombs were not up to date.
If I were in charge of the security of the bank, I would have
enhanced the process of recruiting and hiring to be thorough to
get employees who are trustworthy and will guard the bank with
integrity (Scalet, 2016). I would adequately secure the bank
both in the inside and its surrounding with up-to-date security
cameras. Further, I would increase the number of regular
physical patrols to detect and prevent security breaches in
financial institutions quickly.
References
Alissa, R. (2015). Physical Security Breach in Baghdad bank.
The New York Times.
Goodman, R. (2016). The Biggest Security Failures of All Time.
The Washington Post.
Harpham, B. (2017). Physical security has many holes that
should be plugged. CSO Feature.
Narisi, S. (2015). One basic security threat many organizations
ignore. IT is manager daily.
Scalet, S. (2016). Ways to Build Physical Security in an
Organization. International Journal on Organizational Security,
23-26.
Slater, D. (2016). The Illustrated Guide to Security. Journal on
Cyber and Physical Security, 10-13.

More Related Content

Similar to RequirementQuestionExamine (see below) your classmates propos.docx

InstructionsAssignment #6Write a 1 to 2 page essay paper th.docx
InstructionsAssignment #6Write a 1 to 2 page essay paper th.docxInstructionsAssignment #6Write a 1 to 2 page essay paper th.docx
InstructionsAssignment #6Write a 1 to 2 page essay paper th.docxLaticiaGrissomzz
 
12022, 929 AM Originality Reporthttpsucumberlands.bl
12022, 929 AM Originality Reporthttpsucumberlands.bl12022, 929 AM Originality Reporthttpsucumberlands.bl
12022, 929 AM Originality Reporthttpsucumberlands.blBenitoSumpter862
 
12022, 929 AM Originality Reporthttpsucumberlands.bl
12022, 929 AM Originality Reporthttpsucumberlands.bl12022, 929 AM Originality Reporthttpsucumberlands.bl
12022, 929 AM Originality Reporthttpsucumberlands.blCicelyBourqueju
 
Implementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control PlanImplementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control PlanAngie Willis
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxaudeleypearl
 
Electronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare OrganizationsElectronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare Organizationsijtsrd
 
CSIA 310 Cybersecurity Processes & TechnologiesCase Study #2 T.docx
CSIA 310 Cybersecurity Processes & TechnologiesCase Study #2 T.docxCSIA 310 Cybersecurity Processes & TechnologiesCase Study #2 T.docx
CSIA 310 Cybersecurity Processes & TechnologiesCase Study #2 T.docxannettsparrow
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security PolicyRobot Mode
 
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxRunning Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxjeanettehully
 
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxRunning Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxtodd521
 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationIJERA Editor
 
IRJET-Ethical Hacking
IRJET-Ethical HackingIRJET-Ethical Hacking
IRJET-Ethical HackingIRJET Journal
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docxtoltonkendal
 
BASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGBASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGDrm Kapoor
 
Running head CHALLENGES OF CYBER SECURITY9.docx
Running head CHALLENGES OF CYBER SECURITY9.docxRunning head CHALLENGES OF CYBER SECURITY9.docx
Running head CHALLENGES OF CYBER SECURITY9.docxsusanschei
 
Healthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questioHealthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questioSusanaFurman449
 
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...Alexander Decker
 
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...Alexander Decker
 

Similar to RequirementQuestionExamine (see below) your classmates propos.docx (20)

InstructionsAssignment #6Write a 1 to 2 page essay paper th.docx
InstructionsAssignment #6Write a 1 to 2 page essay paper th.docxInstructionsAssignment #6Write a 1 to 2 page essay paper th.docx
InstructionsAssignment #6Write a 1 to 2 page essay paper th.docx
 
12022, 929 AM Originality Reporthttpsucumberlands.bl
12022, 929 AM Originality Reporthttpsucumberlands.bl12022, 929 AM Originality Reporthttpsucumberlands.bl
12022, 929 AM Originality Reporthttpsucumberlands.bl
 
12022, 929 AM Originality Reporthttpsucumberlands.bl
12022, 929 AM Originality Reporthttpsucumberlands.bl12022, 929 AM Originality Reporthttpsucumberlands.bl
12022, 929 AM Originality Reporthttpsucumberlands.bl
 
Implementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control PlanImplementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control Plan
 
Bis Chapter15
Bis Chapter15Bis Chapter15
Bis Chapter15
 
WPCCS 16 Presentation
WPCCS 16 PresentationWPCCS 16 Presentation
WPCCS 16 Presentation
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
 
Electronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare OrganizationsElectronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare Organizations
 
CSIA 310 Cybersecurity Processes & TechnologiesCase Study #2 T.docx
CSIA 310 Cybersecurity Processes & TechnologiesCase Study #2 T.docxCSIA 310 Cybersecurity Processes & TechnologiesCase Study #2 T.docx
CSIA 310 Cybersecurity Processes & TechnologiesCase Study #2 T.docx
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security Policy
 
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxRunning Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
 
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxRunning Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an Organization
 
IRJET-Ethical Hacking
IRJET-Ethical HackingIRJET-Ethical Hacking
IRJET-Ethical Hacking
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docx
 
BASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGBASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKING
 
Running head CHALLENGES OF CYBER SECURITY9.docx
Running head CHALLENGES OF CYBER SECURITY9.docxRunning head CHALLENGES OF CYBER SECURITY9.docx
Running head CHALLENGES OF CYBER SECURITY9.docx
 
Healthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questioHealthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questio
 
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
 
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
 

More from audeleypearl

Mr. Bush, a 45-year-old middle school teacher arrives at the emergen.docx
Mr. Bush, a 45-year-old middle school teacher arrives at the emergen.docxMr. Bush, a 45-year-old middle school teacher arrives at the emergen.docx
Mr. Bush, a 45-year-old middle school teacher arrives at the emergen.docxaudeleypearl
 
Movie Project Presentation Movie TroyInclude Architecture i.docx
Movie Project Presentation Movie TroyInclude Architecture i.docxMovie Project Presentation Movie TroyInclude Architecture i.docx
Movie Project Presentation Movie TroyInclude Architecture i.docxaudeleypearl
 
Motivation and Retention Discuss the specific strategies you pl.docx
Motivation and Retention Discuss the specific strategies you pl.docxMotivation and Retention Discuss the specific strategies you pl.docx
Motivation and Retention Discuss the specific strategies you pl.docxaudeleypearl
 
Mother of the Year In recognition of superlative paren.docx
Mother of the Year         In recognition of superlative paren.docxMother of the Year         In recognition of superlative paren.docx
Mother of the Year In recognition of superlative paren.docxaudeleypearl
 
Mrs. G, a 55 year old Hispanic female, presents to the office for he.docx
Mrs. G, a 55 year old Hispanic female, presents to the office for he.docxMrs. G, a 55 year old Hispanic female, presents to the office for he.docx
Mrs. G, a 55 year old Hispanic female, presents to the office for he.docxaudeleypearl
 
Mr. Rivera is a 72-year-old patient with end stage COPD who is in th.docx
Mr. Rivera is a 72-year-old patient with end stage COPD who is in th.docxMr. Rivera is a 72-year-old patient with end stage COPD who is in th.docx
Mr. Rivera is a 72-year-old patient with end stage COPD who is in th.docxaudeleypearl
 
Mr. B, a 40-year-old avid long-distance runner previously in goo.docx
Mr. B, a 40-year-old avid long-distance runner previously in goo.docxMr. B, a 40-year-old avid long-distance runner previously in goo.docx
Mr. B, a 40-year-old avid long-distance runner previously in goo.docxaudeleypearl
 
Moving members of the organization through the change process ca.docx
Moving members of the organization through the change process ca.docxMoving members of the organization through the change process ca.docx
Moving members of the organization through the change process ca.docxaudeleypearl
 
Mr. Friend is acrime analystwith the SantaCruz, Califo.docx
Mr. Friend is acrime analystwith the SantaCruz, Califo.docxMr. Friend is acrime analystwith the SantaCruz, Califo.docx
Mr. Friend is acrime analystwith the SantaCruz, Califo.docxaudeleypearl
 
Mr. E is a pleasant, 70-year-old, black, maleSource Self, rel.docx
Mr. E is a pleasant, 70-year-old, black, maleSource Self, rel.docxMr. E is a pleasant, 70-year-old, black, maleSource Self, rel.docx
Mr. E is a pleasant, 70-year-old, black, maleSource Self, rel.docxaudeleypearl
 
Motor Milestones occur in a predictable developmental progression in.docx
Motor Milestones occur in a predictable developmental progression in.docxMotor Milestones occur in a predictable developmental progression in.docx
Motor Milestones occur in a predictable developmental progression in.docxaudeleypearl
 
Most women experience their closest friendships with those of th.docx
Most women experience their closest friendships with those of th.docxMost women experience their closest friendships with those of th.docx
Most women experience their closest friendships with those of th.docxaudeleypearl
 
Most patients with mental health disorders are not aggressive. Howev.docx
Most patients with mental health disorders are not aggressive. Howev.docxMost patients with mental health disorders are not aggressive. Howev.docx
Most patients with mental health disorders are not aggressive. Howev.docxaudeleypearl
 
Most of our class readings and discussions to date have dealt wi.docx
Most of our class readings and discussions to date have dealt wi.docxMost of our class readings and discussions to date have dealt wi.docx
Most of our class readings and discussions to date have dealt wi.docxaudeleypearl
 
Most people agree we live in stressful times. Does stress and re.docx
Most people agree we live in stressful times. Does stress and re.docxMost people agree we live in stressful times. Does stress and re.docx
Most people agree we live in stressful times. Does stress and re.docxaudeleypearl
 
Most of the ethical prescriptions of normative moral philosophy .docx
Most of the ethical prescriptions of normative moral philosophy .docxMost of the ethical prescriptions of normative moral philosophy .docx
Most of the ethical prescriptions of normative moral philosophy .docxaudeleypearl
 
Most healthcare organizations in the country are implementing qualit.docx
Most healthcare organizations in the country are implementing qualit.docxMost healthcare organizations in the country are implementing qualit.docx
Most healthcare organizations in the country are implementing qualit.docxaudeleypearl
 
More work is necessary on how to efficiently model uncertainty in ML.docx
More work is necessary on how to efficiently model uncertainty in ML.docxMore work is necessary on how to efficiently model uncertainty in ML.docx
More work is necessary on how to efficiently model uncertainty in ML.docxaudeleypearl
 
Mortgage-Backed Securities and the Financial CrisisKelly Finn.docx
Mortgage-Backed Securities and the Financial CrisisKelly Finn.docxMortgage-Backed Securities and the Financial CrisisKelly Finn.docx
Mortgage-Backed Securities and the Financial CrisisKelly Finn.docxaudeleypearl
 
Moral Development  Lawrence Kohlberg developed six stages to mora.docx
Moral Development  Lawrence Kohlberg developed six stages to mora.docxMoral Development  Lawrence Kohlberg developed six stages to mora.docx
Moral Development  Lawrence Kohlberg developed six stages to mora.docxaudeleypearl
 

More from audeleypearl (20)

Mr. Bush, a 45-year-old middle school teacher arrives at the emergen.docx
Mr. Bush, a 45-year-old middle school teacher arrives at the emergen.docxMr. Bush, a 45-year-old middle school teacher arrives at the emergen.docx
Mr. Bush, a 45-year-old middle school teacher arrives at the emergen.docx
 
Movie Project Presentation Movie TroyInclude Architecture i.docx
Movie Project Presentation Movie TroyInclude Architecture i.docxMovie Project Presentation Movie TroyInclude Architecture i.docx
Movie Project Presentation Movie TroyInclude Architecture i.docx
 
Motivation and Retention Discuss the specific strategies you pl.docx
Motivation and Retention Discuss the specific strategies you pl.docxMotivation and Retention Discuss the specific strategies you pl.docx
Motivation and Retention Discuss the specific strategies you pl.docx
 
Mother of the Year In recognition of superlative paren.docx
Mother of the Year         In recognition of superlative paren.docxMother of the Year         In recognition of superlative paren.docx
Mother of the Year In recognition of superlative paren.docx
 
Mrs. G, a 55 year old Hispanic female, presents to the office for he.docx
Mrs. G, a 55 year old Hispanic female, presents to the office for he.docxMrs. G, a 55 year old Hispanic female, presents to the office for he.docx
Mrs. G, a 55 year old Hispanic female, presents to the office for he.docx
 
Mr. Rivera is a 72-year-old patient with end stage COPD who is in th.docx
Mr. Rivera is a 72-year-old patient with end stage COPD who is in th.docxMr. Rivera is a 72-year-old patient with end stage COPD who is in th.docx
Mr. Rivera is a 72-year-old patient with end stage COPD who is in th.docx
 
Mr. B, a 40-year-old avid long-distance runner previously in goo.docx
Mr. B, a 40-year-old avid long-distance runner previously in goo.docxMr. B, a 40-year-old avid long-distance runner previously in goo.docx
Mr. B, a 40-year-old avid long-distance runner previously in goo.docx
 
Moving members of the organization through the change process ca.docx
Moving members of the organization through the change process ca.docxMoving members of the organization through the change process ca.docx
Moving members of the organization through the change process ca.docx
 
Mr. Friend is acrime analystwith the SantaCruz, Califo.docx
Mr. Friend is acrime analystwith the SantaCruz, Califo.docxMr. Friend is acrime analystwith the SantaCruz, Califo.docx
Mr. Friend is acrime analystwith the SantaCruz, Califo.docx
 
Mr. E is a pleasant, 70-year-old, black, maleSource Self, rel.docx
Mr. E is a pleasant, 70-year-old, black, maleSource Self, rel.docxMr. E is a pleasant, 70-year-old, black, maleSource Self, rel.docx
Mr. E is a pleasant, 70-year-old, black, maleSource Self, rel.docx
 
Motor Milestones occur in a predictable developmental progression in.docx
Motor Milestones occur in a predictable developmental progression in.docxMotor Milestones occur in a predictable developmental progression in.docx
Motor Milestones occur in a predictable developmental progression in.docx
 
Most women experience their closest friendships with those of th.docx
Most women experience their closest friendships with those of th.docxMost women experience their closest friendships with those of th.docx
Most women experience their closest friendships with those of th.docx
 
Most patients with mental health disorders are not aggressive. Howev.docx
Most patients with mental health disorders are not aggressive. Howev.docxMost patients with mental health disorders are not aggressive. Howev.docx
Most patients with mental health disorders are not aggressive. Howev.docx
 
Most of our class readings and discussions to date have dealt wi.docx
Most of our class readings and discussions to date have dealt wi.docxMost of our class readings and discussions to date have dealt wi.docx
Most of our class readings and discussions to date have dealt wi.docx
 
Most people agree we live in stressful times. Does stress and re.docx
Most people agree we live in stressful times. Does stress and re.docxMost people agree we live in stressful times. Does stress and re.docx
Most people agree we live in stressful times. Does stress and re.docx
 
Most of the ethical prescriptions of normative moral philosophy .docx
Most of the ethical prescriptions of normative moral philosophy .docxMost of the ethical prescriptions of normative moral philosophy .docx
Most of the ethical prescriptions of normative moral philosophy .docx
 
Most healthcare organizations in the country are implementing qualit.docx
Most healthcare organizations in the country are implementing qualit.docxMost healthcare organizations in the country are implementing qualit.docx
Most healthcare organizations in the country are implementing qualit.docx
 
More work is necessary on how to efficiently model uncertainty in ML.docx
More work is necessary on how to efficiently model uncertainty in ML.docxMore work is necessary on how to efficiently model uncertainty in ML.docx
More work is necessary on how to efficiently model uncertainty in ML.docx
 
Mortgage-Backed Securities and the Financial CrisisKelly Finn.docx
Mortgage-Backed Securities and the Financial CrisisKelly Finn.docxMortgage-Backed Securities and the Financial CrisisKelly Finn.docx
Mortgage-Backed Securities and the Financial CrisisKelly Finn.docx
 
Moral Development  Lawrence Kohlberg developed six stages to mora.docx
Moral Development  Lawrence Kohlberg developed six stages to mora.docxMoral Development  Lawrence Kohlberg developed six stages to mora.docx
Moral Development  Lawrence Kohlberg developed six stages to mora.docx
 

Recently uploaded

Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Recently uploaded (20)

Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

RequirementQuestionExamine (see below) your classmates propos.docx

  • 1. Requirement/Question: Examine (see below) your classmates' proposed security protocols and point out any areas where you believe their intended security protocols might be vulnerable, as well as ways to improve such strategies. If there are no noted vulnerabilities, proposed strategies to enhance his or her security recommendations. Respond to at least 2 of your classmates' posts with a minimum of 200 words each. You must have a minimum of 3 credible citations to support your claims or arguments. You must also have a reference list for the citations in the responses. I need a response/comment for below assignment (3 in text citation needed 200 words) Information transmission between financial markets in Chicago and New York Every organization needs to ensure that there is the security of data centers or any place that holds valuable assets belonging to the people. When an organization fails to foresee scenarios, there could be occurrence security breaches since it will be convenient for people trying to breach the data center due to vulnerabilities. The physical security of the data centers is a necessary component of any information security strategy (Shein, 2010). Different risks can lead to failure of the physical security of the data centers of an organization, which may include inadequate management of the data center keys, external hackers, and ineffective monitoring of the behavior of onsite individuals. Chicago collocation center is a scenario where physical security failed, and according to the research, it was reported that the organization was breached four times between 2005 and 2007
  • 2. (Laughlin, Aguirre, & Grundfest, 2014). The people responsible for the management of the data center did not ensure that there is security to prevent the occurrence of these unfortunate events. In this attack, there was an intrusion that involves two masked persons who entered the facility after the cut the reinforcement walls with a power saw. This attack was made when the security personnel in the facility were way, and they found it easy for them to break into the data center. The intruders were able to steal the vital information of the organization. The best practice to ensure the data center’s physical security is to know where the people are (Patel, & Shah, 2005). The critical component for the security of the data centers is the physical access management as it is a vital tool for overall environment physical security. Therefore, the security persons need to provide access and understand the movement through the data center. For the organization to ensure that the access to spaces is authorized and monitored, Mantraps, anti-tailgating systems, biometric readers, and other physical controls should be used. In the increasingly digitized world, data centers represent a key technology since they house the storage systems and servers (Miller, & Beckman, 2013). The physical infrastructure in data centers should provide power and cooling for the components. The monitoring of the components should also be permitted for all the operating parameters. Therefore, physical security in data centers is crucial for every organization. Key issues in data center security Internal testing of physical controls is an essential concept concerning the physical security of an organization (Niles, 2004). It is essential to validate the access grants, testing the video footage to ensure that it is recording and also verification of anti-tailgate mechanisms to ensure that they are working effectively. The responsible team should ensure that physical testing is part of the operating procedures. Through testing, the
  • 3. data centers of the organization will be secure from the intrusion. The people responsible for maintaining the physical security of the data centers should be trained to ensure that they adhere to the physical security procedures (Knapp, Denney, & Barner, 2011). Trained personnel must understand the importance of their responsibilities to the physical security programs of the data center. Intruders of the data centers look at the weak links to access the location, and these vulnerabilities can often be on the human side of the equation. However, training people will help in the identification of the vulnerabilities and maintenance of the physical security of the data center in an organization. Various processes and structures must collaborate with the company to ensure robust physical security, such as process management, access controls, and perimeter security. For the physical security of data centers to be maintained, the server room should only be access by the service engineers and other administrative staff (Skorin-Kapov, Furdek, Zsigmond, & Wosinska, 2016). At the entrance doors, there should be signs which prohibit staff from bringing drinks, cigarettes, or food within the room. The rooms should have two doors to help the staff in case of an emergency. Adequate fire prevention mechanisms should be deployed in data centers. In every organization, the physical access to the data center should be guarded to measure that there is no unauthorized access (Shim, Qureshi, & Siegel, 2013). The walls need to be made secure and thick to avoid intrusion. Data centers should also have CCTV cameras to maintain security. Through these measures, data centers will be secured against potential vulnerabilities. References
  • 4. Laughlin, G., Aguirre, A., & Grundfest, J. (2014). Information transmission between financial markets in Chicago and New York. Financial Review, 49(2), 283-312. Knapp, K. J., Denney, G. D., & Barner, M. E. (2011). Key issues in data center security: An investigation of government audit reports. Government Information Quarterly, 28(4), 533- 541. Miller, K. C., & Beckman, P. C. (2013). U.S. Patent No. 8,528,101. Washington, DC: U.S. Patent and Trademark Office. Niles, S. (2004). Physical security in mission-critical facilities. Schneider Electric. Patel, C. D., & Shah, A. J. (2005). Cost model for planning, development, and operation of a data center. Shein, R. (2010, March). Security measures for advanced metering infrastructure components. In 2010 Asia-Pacific Power and Energy Engineering Conference (pp. 1-3). IEEE. Shim, J., Qureshi, A. A., & Siegel, J. G. (2013). The International Handbook of Computer Security. Routledge. Skorin-Kapov, N., Furdek, M., Zsigmond, S., & Wosinska, L. (2016). Physical-layer security in evolving optical networks. IEEE Communications Magazine, 54(8), 110-117. Requirment/Question: Examine (see below) your classmates' proposed security protocols and point out any areas where you believe their intended security protocols might be vulnerable, as well as ways to improve such strategies. If there are no noted vulnerabilities, proposed strategies to enhance his or her security
  • 5. recommendations. Respond to at least 2 of your classmates' posts with a minimum of 200 words each. You must have a minimum of 3 credible citations to support your claims or arguments. You must also have a reference list for the citations in the responses. I need a response/comment for below assignment (3 in text citation needed 200 words) Panda Habitat Break-in Physical security is critical in any habitat to protect the animals enclosed from getting out and preventing external intruders from getting into the area. However, the main emphasis is currently put on preventing the animals from escaping. It resulted in a break-in at the Gulin Zoo's Panda exhibit (Goodman, 2016). The security breach occurred during the regular operational hours of the day when a student went over the fence into the zoo. The wall was approximately 6.5 feet long. That fence was the only security guarding the habitat from external physical attacks. This physical security breach was a result of unbalanced security measures. The fence might be enough for keeping a dog or any pet locked inside, but the presence of the dog is an extra measure of security to complement the wall (Harpham, 2017). Fortunately, the panda did not get out, but the student rescued after sustaining bites and bruises. The fence is established as a boundary the pandas and not as a measure of protection against external intruders. If I were in charge of the security in the zoo, I would put in place the following protocols to ensure the break-in does not happen again. I would enhance the protection of the zoo by electrifying the fence around the habitat to discourage external intruders (Narisi, 2015). I would also increase the number of security guards both at the entrances as well as those on patrols around the zoo. The other measures I would implement are providing improved training to the physical security personnel
  • 6. not only on how to deal with the animals but also on the best way to prevent external intruders who might endanger the safety of the animals. Baghdad bank security fail The physical security failure in Baghdad bank resulted in the loss of a quarter-billion dollars in cash. According to the information provided, the security guards of the bank involves in the security failure at the institution (Alissa, 2015). It is still unknown how the money was in US dollars and not in dinars currency, considering the bank is in Iraq. It is also unclear how the robbers were able to move the money from the bank with all the security cameras in place. This security breach in the bank stemmed from an improper hiring as well as a procedural process. The criteria for recruiting such security guards must have been sloppy. The guards suspected were said to have had records of robbery in the past (Slater, 2016). The vaults in the bank were left unsupervised t night. Another cause identified was that the security cameras in the catacombs were not up to date. If I were in charge of the security of the bank, I would have enhanced the process of recruiting and hiring to be thorough to get employees who are trustworthy and will guard the bank with integrity (Scalet, 2016). I would adequately secure the bank both in the inside and its surrounding with up-to-date security cameras. Further, I would increase the number of regular physical patrols to detect and prevent security breaches in financial institutions quickly. References Alissa, R. (2015). Physical Security Breach in Baghdad bank. The New York Times. Goodman, R. (2016). The Biggest Security Failures of All Time. The Washington Post.
  • 7. Harpham, B. (2017). Physical security has many holes that should be plugged. CSO Feature. Narisi, S. (2015). One basic security threat many organizations ignore. IT is manager daily. Scalet, S. (2016). Ways to Build Physical Security in an Organization. International Journal on Organizational Security, 23-26. Slater, D. (2016). The Illustrated Guide to Security. Journal on Cyber and Physical Security, 10-13.