logo

Principles of Information Security: Role of People and Physical Security in Data Centers

   

Added on  2023-06-08

10 Pages2296 Words423 Views
Principles of information security

Information security 1
Table of Contents
Introduction................................................................................................................................2
Task1 - Role of people in the operational security....................................................................3
Security awareness and training facilitates people.................................................................3
Task 2- Physical security in a data centre..................................................................................4
Risks that is stored in a data centre........................................................................................4
Physical security controls to reduce the potential risks..........................................................5
Conclusion..................................................................................................................................7
References..................................................................................................................................8

Information security 2
Introduction
Information security is used by an organisation to assure that no unauthorised user
access the information. The main motive is to protect the confidentiality and integrity of the
data that is stored. To make sure information security is maintained various steps are used
like antivirus software, firewall, encryption software or any other standards. There are
various threats that an organisation face due to security breaches. Thus, it is important to
maintain the security of data stored over the network. In this report, the more focus is put
upon physical security. Physical security is a way through which all the sensitive information
that is stored over network, software’s or any location is protected. It assures that information
will not be misused and data will be protected from all the malicious attacks.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security Awareness Policy
|5
|1155
|196

IT Security: Types of Risks, Organizational Procedures, Impact of Firewall Configuration, Implementation of DMZ, Static IP and NAT
|18
|1181
|61

Information Security Management: Risks, Prevention, and Frameworks
|11
|2362
|381

Network Security Threats and Control Measures for Open University Malaysia
|10
|3121
|88

Assignment on Securing Enterprise Infrastructure
|6
|1354
|16

Manage Network and Data Integrity
|62
|2549
|302