Requirement/Question:
Examine (see below) your classmates' proposed security protocols and point out any areas where you believe their intended security protocols might be vulnerable, as well as ways to improve such strategies. If there are no noted vulnerabilities, proposed strategies to enhance his or her security recommendations.
Respond to at least 2 of your classmates' posts with a minimum of 200 words each. You must have a minimum of 3 credible citations to support your claims or arguments. You must also have a reference list for the citations in the responses.
I need a response/comment for below assignment (3 in text citation needed 200 words)
Information transmission between financial markets in Chicago and New York
Every organization needs to ensure that there is the security of data centers or any place that holds valuable assets belonging to the people. When an organization fails to foresee scenarios, there could be occurrence security breaches since it will be convenient for people trying to breach the data center due to vulnerabilities. The physical security of the data centers is a necessary component of any information security strategy (Shein, 2010). Different risks can lead to failure of the physical security of the data centers of an organization, which may include inadequate management of the data center keys, external hackers, and ineffective monitoring of the behavior of onsite individuals.
Chicago collocation center is a scenario where physical security failed, and according to the research, it was reported that the organization was breached four times between 2005 and 2007 (Laughlin, Aguirre, & Grundfest, 2014). The people responsible for the management of the data center did not ensure that there is security to prevent the occurrence of these unfortunate events. In this attack, there was an intrusion that involves two masked persons who entered the facility after the cut the reinforcement walls with a power saw. This attack was made when the security personnel in the facility were way, and they found it easy for them to break into the data center. The intruders were able to steal the vital information of the organization.
The best practice to ensure the data center’s physical security is to know where the people are (Patel, & Shah, 2005). The critical component for the security of the data centers is the physical access management as it is a vital tool for overall environment physical security. Therefore, the security persons need to provide access and understand the movement through the data center. For the organization to ensure that the access to spaces is authorized and monitored, Mantraps, anti-tailgating systems, biometric readers, and other physical controls should be used.
In the increasingly digitized world, data centers represent a key technology since they house the storage systems and servers (Miller, & Beckman, 2013). The physical infrastructure in data centers should provide power and cooling for the ...
Interactive Powerpoint_How to Master effective communication
RequirementQuestionExamine (see below) your classmates propos.docx
1. Requirement/Question:
Examine (see below) your classmates' proposed security
protocols and point out any areas where you believe their
intended security protocols might be vulnerable, as well as ways
to improve such strategies. If there are no noted vulnerabilities,
proposed strategies to enhance his or her security
recommendations.
Respond to at least 2 of your classmates' posts with a minimum
of 200 words each. You must have a minimum of 3 credible
citations to support your claims or arguments. You must also
have a reference list for the citations in the responses.
I need a response/comment for below assignment (3 in text
citation needed 200 words)
Information transmission between financial markets in Chicago
and New York
Every organization needs to ensure that there is the security of
data centers or any place that holds valuable assets belonging to
the people. When an organization fails to foresee scenarios,
there could be occurrence security breaches since it will be
convenient for people trying to breach the data center due to
vulnerabilities. The physical security of the data centers is a
necessary component of any information security strategy
(Shein, 2010). Different risks can lead to failure of the physical
security of the data centers of an organization, which may
include inadequate management of the data center keys, external
hackers, and ineffective monitoring of the behavior of onsite
individuals.
Chicago collocation center is a scenario where physical security
failed, and according to the research, it was reported that the
organization was breached four times between 2005 and 2007
2. (Laughlin, Aguirre, & Grundfest, 2014). The people responsible
for the management of the data center did not ensure that there
is security to prevent the occurrence of these unfortunate
events. In this attack, there was an intrusion that involves two
masked persons who entered the facility after the cut the
reinforcement walls with a power saw. This attack was made
when the security personnel in the facility were way, and they
found it easy for them to break into the data center. The
intruders were able to steal the vital information of the
organization.
The best practice to ensure the data center’s physical security is
to know where the people are (Patel, & Shah, 2005). The
critical component for the security of the data centers is the
physical access management as it is a vital tool for overall
environment physical security. Therefore, the security persons
need to provide access and understand the movement through
the data center. For the organization to ensure that the access to
spaces is authorized and monitored, Mantraps, anti-tailgating
systems, biometric readers, and other physical controls should
be used.
In the increasingly digitized world, data centers represent a key
technology since they house the storage systems and servers
(Miller, & Beckman, 2013). The physical infrastructure in data
centers should provide power and cooling for the components.
The monitoring of the components should also be permitted for
all the operating parameters. Therefore, physical security in
data centers is crucial for every organization.
Key issues in data center security
Internal testing of physical controls is an essential concept
concerning the physical security of an organization (Niles,
2004). It is essential to validate the access grants, testing the
video footage to ensure that it is recording and also verification
of anti-tailgate mechanisms to ensure that they are working
effectively. The responsible team should ensure that physical
testing is part of the operating procedures. Through testing, the
3. data centers of the organization will be secure from the
intrusion.
The people responsible for maintaining the physical security of
the data centers should be trained to ensure that they adhere to
the physical security procedures (Knapp, Denney, & Barner,
2011). Trained personnel must understand the importance of
their responsibilities to the physical security programs of the
data center. Intruders of the data centers look at the weak links
to access the location, and these vulnerabilities can often be on
the human side of the equation. However, training people will
help in the identification of the vulnerabilities and maintenance
of the physical security of the data center in an organization.
Various processes and structures must collaborate with the
company to ensure robust physical security, such as process
management, access controls, and perimeter security.
For the physical security of data centers to be maintained, the
server room should only be access by the service engineers and
other administrative staff (Skorin-Kapov, Furdek, Zsigmond, &
Wosinska, 2016). At the entrance doors, there should be signs
which prohibit staff from bringing drinks, cigarettes, or food
within the room. The rooms should have two doors to help the
staff in case of an emergency. Adequate fire prevention
mechanisms should be deployed in data centers.
In every organization, the physical access to the data center
should be guarded to measure that there is no unauthorized
access (Shim, Qureshi, & Siegel, 2013). The walls need to be
made secure and thick to avoid intrusion. Data centers should
also have CCTV cameras to maintain security. Through these
measures, data centers will be secured against potential
vulnerabilities.
References
4. Laughlin, G., Aguirre, A., & Grundfest, J. (2014). Information
transmission between financial markets in Chicago and New
York. Financial Review, 49(2), 283-312.
Knapp, K. J., Denney, G. D., & Barner, M. E. (2011). Key
issues in data center security: An investigation of government
audit reports. Government Information Quarterly, 28(4), 533-
541.
Miller, K. C., & Beckman, P. C. (2013). U.S. Patent No.
8,528,101. Washington, DC: U.S. Patent and Trademark Office.
Niles, S. (2004). Physical security in mission-critical facilities.
Schneider Electric.
Patel, C. D., & Shah, A. J. (2005). Cost model for planning,
development, and operation of a data center.
Shein, R. (2010, March). Security measures for advanced
metering infrastructure components. In 2010 Asia-Pacific Power
and Energy Engineering Conference (pp. 1-3). IEEE.
Shim, J., Qureshi, A. A., & Siegel, J. G. (2013). The
International Handbook of Computer Security. Routledge.
Skorin-Kapov, N., Furdek, M., Zsigmond, S., & Wosinska, L.
(2016). Physical-layer security in evolving optical networks.
IEEE Communications Magazine, 54(8), 110-117.
Requirment/Question:
Examine (see below) your classmates' proposed security
protocols and point out any areas where you believe their
intended security protocols might be vulnerable, as well as ways
to improve such strategies. If there are no noted vulnerabilities,
proposed strategies to enhance his or her security
5. recommendations.
Respond to at least 2 of your classmates' posts with a minimum
of 200 words each. You must have a minimum of 3 credible
citations to support your claims or arguments. You must also
have a reference list for the citations in the responses.
I need a response/comment for below assignment (3 in text
citation needed 200 words)
Panda Habitat Break-in
Physical security is critical in any habitat to protect the animals
enclosed from getting out and preventing external intruders
from getting into the area. However, the main emphasis is
currently put on preventing the animals from escaping. It
resulted in a break-in at the Gulin Zoo's Panda exhibit
(Goodman, 2016). The security breach occurred during the
regular operational hours of the day when a student went over
the fence into the zoo. The wall was approximately 6.5 feet
long. That fence was the only security guarding the habitat from
external physical attacks.
This physical security breach was a result of unbalanced
security measures. The fence might be enough for keeping a dog
or any pet locked inside, but the presence of the dog is an extra
measure of security to complement the wall (Harpham, 2017).
Fortunately, the panda did not get out, but the student rescued
after sustaining bites and bruises. The fence is established as a
boundary the pandas and not as a measure of protection against
external intruders.
If I were in charge of the security in the zoo, I would put in
place the following protocols to ensure the break-in does not
happen again. I would enhance the protection of the zoo by
electrifying the fence around the habitat to discourage external
intruders (Narisi, 2015). I would also increase the number of
security guards both at the entrances as well as those on patrols
around the zoo. The other measures I would implement are
providing improved training to the physical security personnel
6. not only on how to deal with the animals but also on the best
way to prevent external intruders who might endanger the safety
of the animals.
Baghdad bank security fail
The physical security failure in Baghdad bank resulted in the
loss of a quarter-billion dollars in cash. According to the
information provided, the security guards of the bank involves
in the security failure at the institution (Alissa, 2015). It is still
unknown how the money was in US dollars and not in dinars
currency, considering the bank is in Iraq. It is also unclear
how the robbers were able to move the money from the bank
with all the security cameras in place.
This security breach in the bank stemmed from an improper
hiring as well as a procedural process. The criteria for
recruiting such security guards must have been sloppy. The
guards suspected were said to have had records of robbery in
the past (Slater, 2016). The vaults in the bank were left
unsupervised t night. Another cause identified was that the
security cameras in the catacombs were not up to date.
If I were in charge of the security of the bank, I would have
enhanced the process of recruiting and hiring to be thorough to
get employees who are trustworthy and will guard the bank with
integrity (Scalet, 2016). I would adequately secure the bank
both in the inside and its surrounding with up-to-date security
cameras. Further, I would increase the number of regular
physical patrols to detect and prevent security breaches in
financial institutions quickly.
References
Alissa, R. (2015). Physical Security Breach in Baghdad bank.
The New York Times.
Goodman, R. (2016). The Biggest Security Failures of All Time.
The Washington Post.
7. Harpham, B. (2017). Physical security has many holes that
should be plugged. CSO Feature.
Narisi, S. (2015). One basic security threat many organizations
ignore. IT is manager daily.
Scalet, S. (2016). Ways to Build Physical Security in an
Organization. International Journal on Organizational Security,
23-26.
Slater, D. (2016). The Illustrated Guide to Security. Journal on
Cyber and Physical Security, 10-13.