Question

In: Computer Science

Why are physical locks alone not a sufficient security control to protect organizational assets? How is...

Why are physical locks alone not a sufficient security control to protect organizational assets? How is the concept of "defense in depth" enforced with respect to physical security in a data center? How can insufficient climate controls in a data center affect the hardware?

Solutions

Expert Solution

Physical security is one of the vital factors to prevent the exploitation of assets and resources of an organization. Physical security threats can be man-made or act of nature and it is essential to protect the organization against that. But implementing physical lock alone can't ensure security control.

In this era of technology, it is hard to ignore phishing and hacking. Every time a new connection is a new threat to how your data can be exploited. Keeping logical cybersecurity is most important to be kept in mind. A good security control needs to take proper measures to ensure the cybersecurity in the organization as data is the most vital resource they have. Also,

  • Protection against malicious software /spyware is must to implement.
  • Anti-spam software should be used to protect email inboxes from being clogged by unwanted sources.
  • Anti-phishing software saves your data to be used for fraudulent purposes.
  • Firewalls should be used to protect the system from unknown access to the organization's system.

Defense in depth

Defense-in-Depth is an IA construct in which multiple, related, organizational actions and controls are applied to minimize failures. When Defense-in-Depth is achieved, we also achieve reliability, resilience and the ability of IT systems to withstand attacks with minimal impact on services.

Defense-in-Depth is enforced with respect to physical security in data centres to ensure solid protection against cyberthreats and helps block data threats before they reach the endpoint. The three main controls needed to build the architecture of defense-in-depth strategy is:

  • Physical Controls: These are the physical security schemes implemented to avoid any physical harm to the organization.
  • Technical Controls: It is the protection methods to ensure the security of network systems. It includes software, hardware and network-level protection within a company's specific technical controls.
  • Administrative Control: Defines a set of policies and procedures to be put in place by the organization to be followed by the employees. It includes training employees to label sensitive information as "confidential".

Climate control in data centers

The climate of a particular place has a lot of effect on the performance and working of the hardware. Even quality hardware suffer poor performance if kept in bad ventilation and climate. This especially matters if the climate is humid or warm. Having a proper understanding of climate factors hence becomes a vital part of how we plan our organisational decisions.

Some of the factors to be kept in mind are:

Humidity control: Too much moisture and humidity can be the recipe of disaster in a dedicated server. The chances of the hardware to short out or be adversely affected by the moisture increases with the rise in humidity levels. The humidity levels should be kept at 50% to maintain the smooth functioning of the hardware servers and reduces the risk of hardware damage.

Temperature control: It is extremely important to keep a temperature check for the better performance of hardware. Overheating and slow working are a few consequences of excessive temperature rise. A proper working temperature needs to be maintained for the proper working environment.


Related Solutions

Security Controls to Protect Assets What are the control measures currently in use to protect against...
Security Controls to Protect Assets What are the control measures currently in use to protect against payroll fraud? What are the vulnerabilities related to payroll fraud found by the risk assessment team? Please make copy paste available Must be 250 words
Essay Questions Briefly describe internal control and how can it be used to protect assets. How...
Essay Questions Briefly describe internal control and how can it be used to protect assets. How can petty cash funds be used for internal control purposes? Why are bank accounts used? What is bank reconciliation, and why should a business use it? Why is it necessary to record journal entries after the bank reconciliation has been prepared? Calculate and compare your selected Target corporation's cash to its biggest competitor for the two years preceding the current year. What does the...
Briefly describe internal control and how can it be used to protect assets. How can petty...
Briefly describe internal control and how can it be used to protect assets. How can petty cash funds be used for internal control purposes? Why are bank accounts used? What is bank reconciliation, and why should a business use it? Why is it necessary to record journal entries after the bank reconciliation has been prepared? Calculate and compare Target Corporation's cash to its biggest competitor for the two years preceding the current year. What does the cash ratio help to...
A security policy is a document that states how the organisation plans to protect the organisations information Technology assets.
A security policy is a document that states how the organisation plans to protect the organisations information Technology assets. In your own words, state how a security policy affects the organisation's culture and the two things the policy must balance.
One category of general controls is physical and online security. Describe the control and give at...
One category of general controls is physical and online security. Describe the control and give at least three examples of implementation of the control.
What are some physical security design elements for alarm/access control systems servers?
What are some physical security design elements for alarm/access control systems servers?Why is Physical Security design elements for alarm/access control systems/servers so crucial in a data center?
Create a guideline document which should address the Physical Security requirements of the IT Infrastructure and IT Assets for the organization.
1) Create a guideline document which should address the Physical Security requirements of the IT Infrastructure and IT Assets for the organization. 2) Address the data security requirements for your branch offices in other cities.
HIPAA security , physical safeguard give examples of the following : 1) user-based access control 2)...
HIPAA security , physical safeguard give examples of the following : 1) user-based access control 2) role-based access control 3) context-based access control
Why would businesses need to have both firewalls and IDS and IPS to protect security? Give...
Why would businesses need to have both firewalls and IDS and IPS to protect security? Give specific examples of features that firewalls can do but IDS/IPS cannot and also vice versa. PLEASE EXPLAIN IN DETAIL, AND ALSO PROVIDE REFERENCES. THANK YOU.
How does organizational architecture in healthcare management impact decision making and control? What types of control...
How does organizational architecture in healthcare management impact decision making and control? What types of control systems are important in Healthcare management?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT