SlideShare a Scribd company logo
1 of 1
The goal is to design a Physical Security infrastructure for
securing a data center.
Below are some hints as to different ways to build physical
security into a data center by using your textbook at a guide.
Such as “Mantraps, access control systems, bollards, and
surveillance.” Your group project is to secure the data center
against physical threats and intrusions.
Research Question :
What are the criteria security decision-makers use to evaluate
the trustworthiness of a data center for critical data?

More Related Content

More from rtodd194

The Futile Pursuit of HappinessBy Jon Gertner· Sept. 7, 2003.docx
The Futile Pursuit of HappinessBy Jon Gertner· Sept. 7, 2003.docxThe Futile Pursuit of HappinessBy Jon Gertner· Sept. 7, 2003.docx
The Futile Pursuit of HappinessBy Jon Gertner· Sept. 7, 2003.docx
rtodd194
 
The function of a short story’s exposition is to __________. (.docx
The function of a short story’s exposition is to __________. (.docxThe function of a short story’s exposition is to __________. (.docx
The function of a short story’s exposition is to __________. (.docx
rtodd194
 
THE FRANKENSTEIN PAPER!!!!!!!!!!!! For this paper, you.docx
THE FRANKENSTEIN PAPER!!!!!!!!!!!!   For this paper, you.docxTHE FRANKENSTEIN PAPER!!!!!!!!!!!!   For this paper, you.docx
THE FRANKENSTEIN PAPER!!!!!!!!!!!! For this paper, you.docx
rtodd194
 
The freedom of the press was included in the First Amendment to gu.docx
The freedom of the press was included in the First Amendment to gu.docxThe freedom of the press was included in the First Amendment to gu.docx
The freedom of the press was included in the First Amendment to gu.docx
rtodd194
 
The fourth mission of the Department of Homeland Security is to sa.docx
The fourth mission of the Department of Homeland Security is to sa.docxThe fourth mission of the Department of Homeland Security is to sa.docx
The fourth mission of the Department of Homeland Security is to sa.docx
rtodd194
 
The fourth step in planning a unit plan is to research and decid.docx
The fourth step in planning a unit plan is to research and decid.docxThe fourth step in planning a unit plan is to research and decid.docx
The fourth step in planning a unit plan is to research and decid.docx
rtodd194
 
The Fracturing of the New Deal CoalitionThe credibility” issu.docx
The Fracturing of the New Deal CoalitionThe credibility” issu.docxThe Fracturing of the New Deal CoalitionThe credibility” issu.docx
The Fracturing of the New Deal CoalitionThe credibility” issu.docx
rtodd194
 
The four steps for MLA citation ENC1102You must follow these sp.docx
The four steps for MLA citation ENC1102You must follow these sp.docxThe four steps for MLA citation ENC1102You must follow these sp.docx
The four steps for MLA citation ENC1102You must follow these sp.docx
rtodd194
 
The four C.O.R.E. perspectives, as well as Blended Categories, f.docx
The four C.O.R.E. perspectives, as well as Blended Categories, f.docxThe four C.O.R.E. perspectives, as well as Blended Categories, f.docx
The four C.O.R.E. perspectives, as well as Blended Categories, f.docx
rtodd194
 

More from rtodd194 (20)

The Future of Health Care Delivery and Health PolicyThis discuss.docx
The Future of Health Care Delivery and Health PolicyThis discuss.docxThe Future of Health Care Delivery and Health PolicyThis discuss.docx
The Future of Health Care Delivery and Health PolicyThis discuss.docx
 
The Futile Pursuit of HappinessBy Jon Gertner· Sept. 7, 2003.docx
The Futile Pursuit of HappinessBy Jon Gertner· Sept. 7, 2003.docxThe Futile Pursuit of HappinessBy Jon Gertner· Sept. 7, 2003.docx
The Futile Pursuit of HappinessBy Jon Gertner· Sept. 7, 2003.docx
 
The function of a short story’s exposition is to __________. (.docx
The function of a short story’s exposition is to __________. (.docxThe function of a short story’s exposition is to __________. (.docx
The function of a short story’s exposition is to __________. (.docx
 
The Future Leader Scholarship is for students who have demonstrated .docx
The Future Leader Scholarship is for students who have demonstrated .docxThe Future Leader Scholarship is for students who have demonstrated .docx
The Future Leader Scholarship is for students who have demonstrated .docx
 
The Future of Cyber Crimes and Cyber TerrorismIn the United Stat.docx
The Future of Cyber Crimes and Cyber TerrorismIn the United Stat.docxThe Future of Cyber Crimes and Cyber TerrorismIn the United Stat.docx
The Future of Cyber Crimes and Cyber TerrorismIn the United Stat.docx
 
THE FRANKENSTEIN PAPER!!!!!!!!!!!! For this paper, you.docx
THE FRANKENSTEIN PAPER!!!!!!!!!!!!   For this paper, you.docxTHE FRANKENSTEIN PAPER!!!!!!!!!!!!   For this paper, you.docx
THE FRANKENSTEIN PAPER!!!!!!!!!!!! For this paper, you.docx
 
The Freedmens Bureau.....A. Had as its main purpose to prevent a.docx
The Freedmens Bureau.....A. Had as its main purpose to prevent a.docxThe Freedmens Bureau.....A. Had as its main purpose to prevent a.docx
The Freedmens Bureau.....A. Had as its main purpose to prevent a.docx
 
The form attached is to be filled out on each one of these condi.docx
The form attached is to be filled out on each one of these condi.docxThe form attached is to be filled out on each one of these condi.docx
The form attached is to be filled out on each one of these condi.docx
 
The Fraud Triangle and HackingThe fraud triangle exists when t.docx
The Fraud Triangle and HackingThe fraud triangle exists when t.docxThe Fraud Triangle and HackingThe fraud triangle exists when t.docx
The Fraud Triangle and HackingThe fraud triangle exists when t.docx
 
The freedom of the press was included in the First Amendment to gu.docx
The freedom of the press was included in the First Amendment to gu.docxThe freedom of the press was included in the First Amendment to gu.docx
The freedom of the press was included in the First Amendment to gu.docx
 
The fourth mission of the Department of Homeland Security is to sa.docx
The fourth mission of the Department of Homeland Security is to sa.docxThe fourth mission of the Department of Homeland Security is to sa.docx
The fourth mission of the Department of Homeland Security is to sa.docx
 
The fourth step in planning a unit plan is to research and decid.docx
The fourth step in planning a unit plan is to research and decid.docxThe fourth step in planning a unit plan is to research and decid.docx
The fourth step in planning a unit plan is to research and decid.docx
 
The Fracturing of the New Deal CoalitionThe credibility” issu.docx
The Fracturing of the New Deal CoalitionThe credibility” issu.docxThe Fracturing of the New Deal CoalitionThe credibility” issu.docx
The Fracturing of the New Deal CoalitionThe credibility” issu.docx
 
The Fourth Amendment protects individuals against unreasonable searc.docx
The Fourth Amendment protects individuals against unreasonable searc.docxThe Fourth Amendment protects individuals against unreasonable searc.docx
The Fourth Amendment protects individuals against unreasonable searc.docx
 
The Fourth Amendment Case StudyFor this weeks discussion, assum.docx
The Fourth Amendment Case StudyFor this weeks discussion, assum.docxThe Fourth Amendment Case StudyFor this weeks discussion, assum.docx
The Fourth Amendment Case StudyFor this weeks discussion, assum.docx
 
The Fourth Amendment of the United States protects U.S. citizens fro.docx
The Fourth Amendment of the United States protects U.S. citizens fro.docxThe Fourth Amendment of the United States protects U.S. citizens fro.docx
The Fourth Amendment of the United States protects U.S. citizens fro.docx
 
The four steps for MLA citation ENC1102You must follow these sp.docx
The four steps for MLA citation ENC1102You must follow these sp.docxThe four steps for MLA citation ENC1102You must follow these sp.docx
The four steps for MLA citation ENC1102You must follow these sp.docx
 
The Founding Fathers were seeking to create a system of government w.docx
The Founding Fathers were seeking to create a system of government w.docxThe Founding Fathers were seeking to create a system of government w.docx
The Founding Fathers were seeking to create a system of government w.docx
 
The four C.O.R.E. perspectives, as well as Blended Categories, f.docx
The four C.O.R.E. perspectives, as well as Blended Categories, f.docxThe four C.O.R.E. perspectives, as well as Blended Categories, f.docx
The four C.O.R.E. perspectives, as well as Blended Categories, f.docx
 
The following will examine the rise and fall of ancient societies wi.docx
The following will examine the rise and fall of ancient societies wi.docxThe following will examine the rise and fall of ancient societies wi.docx
The following will examine the rise and fall of ancient societies wi.docx
 

Recently uploaded

MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MysoreMuleSoftMeetup
 

Recently uploaded (20)

80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Ernest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell TollsErnest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell Tolls
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 

The goal is to design a Physical Security infrastructure for sec.docx

  • 1. The goal is to design a Physical Security infrastructure for securing a data center. Below are some hints as to different ways to build physical security into a data center by using your textbook at a guide. Such as “Mantraps, access control systems, bollards, and surveillance.” Your group project is to secure the data center against physical threats and intrusions. Research Question : What are the criteria security decision-makers use to evaluate the trustworthiness of a data center for critical data?