Telecommunication Services and Storage of The Organizations Data

Question # 00650931
Subject: Computer Science
Due on: 12/04/2023
Posted On: 12/04/2023 12:39 AM
Tutorials: 1
Rating:
4.9/5
Question Dot Image

Telecommunication Services and Storage of The Organizations Data Essay

Marymount  University has two primary data centers on campus—the research data center and the business data center. Due to budget and space  limitations, the research data center is also used to house the backup  systems for the business data center, resulting in business data being  stored in both locations.

The research data center is typically left unlocked, as many students  and faculty members use it for their work. The network infrastructure is  not monitored, and the systems themselves are not required to be  secured.

Recently, signs of after-hours access have been found in the research data center. Doors have been left open, lights have been on, and logins  have been found on research systems. Logs indicate that local logins  have been attempted on the business system consoles as well.

You are an entry-level security analyst in the information security  department at MU. Your manager - Professor s asks you to propose  a set of controls that will allow the use of the research data center  for its intended purpose while protecting the business systems that  reside there.

For this assignment:

  1. Write a security plan using the research datacenter description and diagram as a point of reference.
  2. Describe the administrative, technical, and physical controls you would recommend and why.
Dot Image
Getsolution Posted By :
Questions: 14076 Tutorials: 14076
Tutorials for this Question

Telecommunication Services and Storage of The Organizations Data

Tutorial # 00649816
Posted On: 12/04/2023 12:40 AM
Feedback Score: Not rated yet!
Purchased By: 2
Getsolution
Posted By:
Questions:
14076
Tutorials:
14076
Report this Tutorial as Inappropriate
Tutorial Preview
The solution of Telecommunication Services and Storage of The Organizations Data...
Attachments
Telecommunication_Services_and_Storage_of_The_Organizations_Data.ZIP (18.96 KB)

Great! We have found the solution of this question!

Related Questions
IT513-15 - Explain how PDF ensures consistency in document
IT-513-15 Enterprise IT Application and Business Analytics Question A Question 1: Explain how PDF ensures consistency in document output across different types of devices, including printers and …
IT513-15 Part A,B - Storage Hierarchy and Secondary
IT-513-15 Enterprise IT Application and Business Analytics Part A : 1. Question: Storage Hierarchy and Secondary Storage Devices Explain the concept of storage hierarchy in computer systems, an …
IT513-15 Part A,B - Describe the main components of a computer
IT-513-15 Enterprise IT Application and Business Analytics PART-A QUESTION-1 Describe the main components of a computer and their respective functions. Explain the roles of the central proc …
IT513-15 Enterprise IT Application and Business Analytics
IT-513-15 Enterprise IT Application and Business Analytics PART-A The National Prosperity Bank ( NPB) has decided to connect all of its stores in the US. This will allow the bank to improve its …
CSE 545 Software Security Assignment plus final exam
I need help with CSE 545 Software Security Assignment plus final exam …
Data usage and systems - The organization of data into usable
Data usage and systems The organization of data into usable information within a health care setting is a core focus of health care information technology. Information, however, is not enough to ma …
INFS3440 Data Type Summary - You have recently expressed
INFS3440 Data Type Summary You have recently expressed interest in working in health IT in a health system. To improve your familiarity with the data you may encounter, the IT manager has asked …
Falcon Security Case Presentation - For decades, relational databases
Colorado State University Falcon Security Case Presentation For decades, relational databases remained essentially unchanged; data was segmented into specific chunks for columns, slots, and reposit …
CY520 Cyber Security Social Engineering Discussion
CY 520 College of Wilmington Cyber Security Social Engineering Discussion Original responses should not be a word for word rehashing of what is stated in the readings, but rather an integration of …
Security and Incident Response - You are the newly hired Chief Technology
Security and Incident Response You are the newly hired Chief Technology Officer at a small marketing firm that employs 25 people. The firm’s CEO has asked you to prepare a report that include …
Recent Questions
Project management assignment
  Over the past few weeks, we have learned how to develop the project scope, schedule, and cost baselines. While these are useful exercises, it is important for a pro …
JSM Staffing Services Marketing Plan Paper
Strayer University JSM Staffing Services Marketing Plan Paper Assignment 1: Part A: Your Marketing Plan For this assignment, you will document your hypothetical company’s backgro …
The marketing of services is ever increasing and has
Auburn University Marketing of Tangible Products and Services PAper The marketing of services is ever increasing and has specific differences when compared to the marketing of tangible products. Co …
What are the similarities and differences between the product,
Tarleton State Differences Between Amazon.Com and Big Mac Product Life Cycles Discussion 1. What are the similarities and differences between the product, Big Mac, and retail, Amazon.Com, …
Carmex has been making lip balm since 1937. Nevertheless
Tarleton State University Carmex Marketing Study Case Paper Carmex has been making lip balm since 1937. Nevertheless, in the last five years, it has stressed growth and become more competitive. Dur …
Customers Satisfaction Discussion - Customer satisfaction surveys
UOPX Customers Satisfaction Discussion Customer satisfaction surveys are everywhere, but do they measure loyalty? Review the "Building, Measuring, and Profiting from Customer Loyalty" art …
Wang Tao on Reform Discussion - What arguments did
Read the selection “Wang Tao on Reform.” What arguments did Wang Tao use in his efforts to persuade readers to accept his point of view? Would China’s leaders today find Wang Tao&rsq …
Origins and Aims of Labor Movement & Socialist Politics
San Diego State University Origins and Aims of Labor Movement & Socialist Politics Select any four questions of your choice listed below. Make sure you answer all parts of the question. Minimum …
Part 1,2,3,4,5 -Two political ideologies took center
Part 1 (chapters 1-2): Choose one of the following 3 questions and write a detailed response to it in canvas. Your answer is worth a possible 20 points. (1) Two political ideologies took center sta …
Ethical Decision of Bombing the cities of Hiroshima and Nagasaki Paper
Ethical Decision of Bombing the cities of Hiroshima and Nagasaki Paper On August 6 and 9, 1945, American aircraft dropped atomic bombs on Japan. In 600-1000 words, explain why the decision was made …