Concept explainers
a)
Explanation of Solution
Walls and Doors:
Walls and doors act as the obstacles and prevent form stealing resources or information...
b)
Explanation of Solution
Access Control:
Access control is categorized into two. They are:
Physical access control: The objective of physical access control is to guard the physical resources of a particular organization. The physical resources may be people, systems, hardware and so on.
Logical access control: The objective of physical access control is to guard the critical data that could be taken by an intruder without accessing physical devices. They are technology-based control that includes intrusion detection system, antivirus software, and firewalls.
Factors considered for the server room:
The organization will consider many security controls to protect their resources and precious data...
c)
Explanation of Solution
Fire detection:
Fire detectors are used to find out the phenomena resulting from fire like, smoke, gas, ultraviolet radiation, infrared radiation, etc. By using fire detectors, it is possible to save lots of lives and protects assets in an organization...
d)
Explanation of Solution
Fire suppression:
- Fire suppressor is used to eliminate fire from particular areas. They are of portable and manual types. Mostly portable extinguishers are more efficient for smaller fire.
- Fire suppression system quells fires by eliminating either oxygen or fuel, or it reduces the temperature.
- Fire extinguishers usually contain carbon-di-oxide that eliminates oxygen supply. It might harm living beings so they are not used in residential areas...
e)
Explanation of Solution
Heating, Ventilating, and air conditioning:
Heating, ventilation as well as air conditioning system could have impact on operations of
f)
Explanation of Solution
Power quality and distribution:
In order to avoid power quality, proper UPS should be used. They act as a backup power supply for computers. The powering capacity of UPS is usually measured in volt-ampere. A normal computer uses 200 VA and during interruptions or power fluctuations, it gets efficient power supply from UPS which provides up to 1,000 VA...
Trending nowThis is a popular solution!
Chapter 9 Solutions
Principles of Information Security (MindTap Course List)
- Assume your company is intending to install an autonomous server room that runs without human intervention. A lights-out server room is a term used to describe such a space. Describe the type(s) of fire suppression system(s) you'd put in that room.arrow_forwardGive an explanation of what a "heated zone" is, how it operates, and what restrictions could be imposed on its usage.arrow_forwardA Network Security Design is necessary to strengthen protection and security since servers on a flat network handle the majority of the company's business processes. This is the case because the network is flat. Whenever and whenever a demilitarized zone is established. In what ways would you change the structure of the network that is currently in place?arrow_forward
- Display one of the four possible types of access control. What sets it apart from other things?arrow_forwardQuestion 30 Select all that apply Which of the following may be used to remove fiber jackets, buffer tubes, and other outer layers? (Choose 3) wire strippers cutting pliers utility knives scissors mini hack saw Submit Responsearrow_forwardIs it safe to have security systems installed in every building?There must be a good reason why this infrastructure hasn't been built yet.Do you have any other options here?arrow_forward
- (c) An organisation is hosting multiple LANS in its site. The security administrators are keen to achieve an end-point security, as they realise hackers target their endpoint devices such as desktops and laptops more than the network devices. The organisation would like to implement an IPS solution as an integrated single-product suite of security functions. Propose your approach for such requirements that can be managed easily and offers protection against malicious behaviours in the network. Extend and explain any three specific malicious/abnormal behaviours of the internal employees that can be detected using your approach in an enterprise network.arrow_forwardDesign a wireless network with firewall security implementationarrow_forward(c) Illustrate in detail firewall's role in network security plan. Describe how the following three (3) elements of security planning which are security policy, security requirements and security controls play the role in firewall.arrow_forward
- Cybersecurity helps organizations to avoid attacks. It also helps to mitigate the risks if an attack occurs. For instance, network segmentation plays a vital role in reducing the risk of a cyber breach by isolating it. Explain the following: What does network segmentation mean; compare it to its flat network counterpart. Mention at least two of the best practices for network segmentation (i.e., what should be considered when segmenting an organization's network)?arrow_forwardLet's say your company wants to build a server room that can run completely independently of any human intervention. A lights-out server room is one in which the equipment is kept in complete darkness. Give details on the various locks and alarms you'd set up to keep everyone out of that room.arrow_forwardRailroads Struggle to Implement Positive Train Control Positive train control (PTC) is a complex system designed to prevent the human errors that cause roughly 40 percent of train accidents, including train-to-train collisions, derailments caused by excess speed, train movement through track switches left in the wrong position, and unauthorized incursion into work zones. PTC uses wireless communications to relay visual and audible data to train crew members regarding when the train needs to be slowed or stopped. This guidance is based on several factors, including the train’s location and speed, as determined by GPS, track geometry, the status and position of approaching switches, and speed limits at approaching curves, crossings, and other speed-restriction areas. PTC communicates with the train’s onboard computer, which audibly warns the engineer and displays the train’s safebraking distance, based on conditions at that time. Should the engineer fail to respond appropriately, the…arrow_forward
- Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning