Question

In: Computer Science

Create a guideline document which should address the Physical Security requirements of the IT Infrastructure and IT Assets for the organization.


1) Create a guideline document which should address the Physical Security requirements of the IT Infrastructure and IT Assets for the organization. 

2) Address the data security requirements for your branch offices in other cities.

Solutions

Expert Solution

1) The guidelines that must be followed for the physical security of the IT infrastructure and IT assets are:

>There must be a tight CCTV surveillence system within the premesis and there must be someone to monitor the premesis for 24 hours

>Each and every employee entering the office muct be checked thourougly by Xray scans in order to check that they are not carrying any pendrive or any other device which could be used to steal data and every employee must where their ID in order to access any gateway.

>There must be an emergency backup for the electricity inncase of any power cut so that no data is lost or damaged in case of power failure.

>An IT company must conduct a security awarness session for all their employees in order to make them aware about all the threats and hoe to protect their company from those threats.

2) The requirements for data security will be :

>Encryption is one of the most useful method to protect data so a company must develop encryption algorithms in order to protect and secure their data.

>Every employee must not get access to every premise they must only allow handful number of employees to access the premises which contains sensitive information and they can only access those premises by using their biometric and their ID

>All the employees must be instructed about the type of password they use since weak passwords often leads to data breach of a company.

>There must be strict rules regarding the handling of devices in which employees work since sometime when laptops or PC are left unattended it can be accessed by any unauthorised person who could steal data.

Note: please give a thumbs up if you like my answer and feel free tpo comment if you have any query


Related Solutions

In this project, you’ll create a security infrastructure design document for a fictional organization. The security...
In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements. About the organization: This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world's finest artisanal, hand-crafted...
In this project, you’ll create a security infrastructure design document for a fictional organization. The security...
In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements. About the organization: This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world's finest artisanal, hand-crafted...
You’ll create a security infrastructure design document for a fictional organization. The security services and tools...
You’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. You’ll create a security infrastructure design document for a fictional organization. Your plan will be evaluated according to how well you met the organization's requirements. The following elements should be incorporated into your plan: *Authentication system *External website security *Internal website security *Remote access solution *Firewall and basic rules...
Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The...
Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements. About the organization: This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world's finest artisanal,...
Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The...
Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements. About the organization: This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world's finest artisanal,...
Please create a security infrastructure design document for afictional organization. Your plan will be evaluated...
Please create a security infrastructure design document for a fictional organization. Your plan will be evaluated according to how well you met the organization's requirements. Points will be awarded based on how well you met these requirements, considering the security implications of your choices. The following elements should be incorporated into your plan:-Authentication system-External website security-Internal website security-Remote access solution-Firewall and basic rules recommendations-Wireless security-VLAN configuration recommendations-Laptop security configuration-Application policy recommendations-Security and privacy policy recommendations-Intrusion detection or prevention for systems...
You’ll create a security infrastructure design document for a fictional organization. Your plan will be evaluated according to how well you met the organization's requirements.
You’ll create a security infrastructure design document for a fictional organization. Your plan will be evaluated according to how well you met the organization's requirements. Points will be awarded based on how well you met these requirements, considering the security implications of your choices.The following elements should be incorporated into your plan:Authentication systemExternal website securityInternal website securityRemote access solutionFirewall and basic rules recommendationsWireless securityVLAN configuration recommendationsLaptop security configurationApplication policy recommendationsSecurity and privacy policy recommendationsIntrusion detection or prevention for systems containing...
Create a list of the top 10 software engineering requirements for the organization. This list should...
Create a list of the top 10 software engineering requirements for the organization. This list should address requirements that are common to most of the software development projects rather than specific project requirements. Include descriptions for each of the requirements that provide sufficient information to align the requirements with architectural strategies that were defined in the previous week. Add the subtitle: Architecture Strategy Evaluation Discuss the pros and cons of the architectural strategy.
Write a physical security policy for any organization.
Write a physical security policy for any organization.
1) What are the reporting requirements for documenting the management and preservation of infrastructure assets when...
1) What are the reporting requirements for documenting the management and preservation of infrastructure assets when the “modified approach” is used? Select one: A. Documentation must be presented in required supplementary information documenting that the infrastructure assets are being preserved. B. There is no reporting requirement regarding the “modified approach,” but the independent auditor must take appropriate audit steps regarding that issue when attesting to the financial statements. C. A statement must be included in the notes to the financial...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT