Information Security Management: A Data Center Focus

Verified

Added on  2025/06/30

|7
|1836
|367
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
MANAGEMENT OF INFORMATION SECURITY - ASSESSMENT 1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
Task 1 Role of people in operational security.............................................................................3
Task 1.1.......................................................................................................................................3
Task 1.2.......................................................................................................................................4
Task 2 Role of Physical security in a data center.......................................................................5
Task 2.1.......................................................................................................................................5
Task 2.2.......................................................................................................................................6
References.......................................................................................................................................7
Document Page
Task 1 Role of people in operational security
Task 1.1
There are many conditions in which the employee have compromise with security aspects and
share the data of the organization to the other stranger. The two conditions are described as:
1.Practice with poor passwords
Passwords are considered as the best security locks for any data in any organization. It is the
oldest strategies that can be sued at the time of the authentication of many protocols. It is the
secures which is only between the users who have permission to access the data. But there are
severe conditions in which the employee can trap out and shares the password to the third party
to make the extra money. How users use the passwords in the present scenario, there might be
several chances in which the password has to be broken and go in the wrong hand. The security
password can be broken in at least 10 minutes if the password is with the lowercase letters,
otherwise, if there is some of the letters is in the capital letter then the password can be broken
out in the 10 hours. If someone traps your password, then it will take the 18 days to hold in the
user's hand. The password may be broken this type if the password is not built with a strong
policy. To maintain the security of the data in the organization, the password is of the 9
characters which include the uppercase and lowercase letter and various type of notations. The
password should be known to the licensed user and not in the third-party user. This will save out
the organization security and maintain the important data of the organization in the safe hands.
2. Data is not protected
The encryption of the data or the important emails are in very lack condition and it makes the
data vulnerable to the many security breaches. The encryption can help in preventing the many
types of security.
Hashing and the salting of the password is the way which can detect and prevent the data from
the hacking and it helps in making the data secure. The data is commonly based don the email or
the fax which needs the extra layer of the security. The employee can know many types of details
based on the security which can be gone in other hands. The employee can send the encryption
key to the third party and this type the security of the organization trapped out which can harm
the progress of the organization.
These two ways are very common through which the employee compromise the security of the
organization and this will provide the extra money to them by the third party. This will reduce
down the status of the company because the third party can take this to increase their company
reputation and make the status of their company.
Document Page
Task 1.2
The integrated part of these agendas must be information security (IS) as well as awareness
(ISA). The main objective of IS for an organization is to safeguard all kinds and origins of data.
In this respect, the staffs show a key and important part in the achievement of the IS, and all staff
of the organization which wants to be responsive of their particular role related with the
management of IS. Since there are still major economic shortcomings in the organizations
themselves, people in the security string must not be linked with the ‘lowest connection’.
Awareness of sustainability increasing and their training for staffs through collaborating, reliable
and game-based knowledge approaches which must be recognized within the organization. IS
must be incorporated and feasible safeguards included within every organization for the security
and safety of their data, services, policies, etc. Various incidents of IT security have extensive
consequences that can damage business or obstruct with jobs, their performance and thus entail
high budgets. Nearly all living areas are gradually affected by digitalization, with large quantities
of data and a wide diversity of data being transmitted, electronically handled and saved by the
underlying ICT technology. The word IS much more than just an IT security as utilized with
international ethics. Its objective is to safeguard data of all kinds and origins, whether stored on
paper, on computers or in the minds of an individual.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Task 2 Role of Physical security in a data center.
Task 2.1
Data, as well as significant information and files for an organization, is available in the local
database or the cloud-based database referred as data-center for that organization, which is an
essential source for the data of a business or the organization. The complex and advanced
networking devices and assets also play a significant role in the development of IT substructure
of businesses or the organization to protect and safeguard every significant data for the business
or the organization. The significant data of an organization or the business collected from various
locations to store and safeguard all the collected data at the database or the server of an
organization for the utilization by users and other members whenever required. Utilization of
different devices, IT equipment, and systems developed for the management of data and their
protection plays a significant role in the performance, services, and functionality of an
organization.
To maintain all services, functions, and performance working without any error for the growth
and development of an organization, different security measures and steps needs to be
implemented to prevent various unwanted actions and system failure within the organization.
The major key factors or issues related to the database for an organization because of low
physical security arrangements done by the organization at their server room or the database has
been explained below:
Server-failure due to broken link or security lacking
System shutdown due to overheating or unwanted access at the data room
Server-failure due to broken link or security lacking
The main server of an organization acts as a key player for entire organizational operations,
services, storage and retrieval of data, sharing of files over the internet, communication between
multiple systems as well as users. A single unwanted action of breakdown of the link established
in-between server, the ISP and the database for the organization may results in complete
shutdown of entire server for the organization due to which every operation and service will get
stopped for the certain period of time which may produce significant loss for the organization as
well as damage to their database.
System shutdown due to overheating or unwanted access at the data room
Maintenance and monitoring of different devices and equipment installed at the data-center of an
organization must be done regularly to keep records of different actions as well as system
performance to maintain adequate balance over the usage of devices along with temperature
which must be kept normal for the working of different devices and systems. Also, the access to
a database or the data-center must be restricted too authorized personal only to avoid unwanted
access and system shutdown due to incorrect operation or action is done by the third party.
Document Page
Task 2.2
Security and safety arrangements done to improve the physical security for the IT infrastructure
and database of an organization plays a significant role in the enhancement of overall
performance of an organization so that different devices and equipment installed by the
organization at their server room and data-center must remain secured from different risks and
issues. Proper planning, as well as strategies, must be developed with the help of experts and IT
professionals as well as consultants to enhance the physical security of server room and database
at their premises. Some of the major steps which must be utilized by every organization for the
physical security of their data-center and server room has been explained below:
Security of server room: Effective security arrangements must be done to provide complete
security and access restriction at the server room along with a security alarm system to avoid
unwanted access in the server room. It needs several policies which can help in making the
security to the unoccupied users. The users having the license or having the valid card have the
permission to enter in the server room. This will make the security of the server room accurately.
Locking up of important devices and installed equipment: All the important devices and
installed equipment must be locked within a closed area to avoid damage, environmental effect
and others over the devices and their performance.
Creating backups: Development of backup for all important data, files, services, and functions
of an organization must be done in advance so that those backups can be utilized by the
organization in case of a disaster or system failure. In many of the IT-based company, there are
many facilities for the backups exist. This will maintain the criteria of security in the
organization. The backups can be set up at5 the several numbers of sites through which if the
important data is deleted out, then also the information can be saved in the different folder.
Security of wires and connections: All the wires and connections done within the system as
well as connected devices must be secured and laminated to avoid unwanted break or cut or
damage to the connections and wires attached with the system causing a system failure. There
will be proper security for the printers or the devices because any fault in them can decrease out
the security of the devices. if the printer is not working accurately or it has the access to each
user then any user can check the details and print it for the other users which can be harmful for
the organization or the security of the device needs some sorts of the passwords or the locks.
Implementation of cameras for the security: Implementation of HD cameras with high
functionality must be implemented at different areas of the data-center and server room in order
to monitor different activities and surveillance purpose. Cameras are considered as the best
option for the security purpose, it requires the proper security in the organization through which
the third part can easily detectable when they do the trapping thing.
Document Page
References
Scalet, S,D, 2015, 19 ways to build physical security into your data center, viewed 22 August
2019, <https://www.csoonline.com/article/2112402/physical-security-19-ways-to-build-physical-
security-into-a-data-center.html>.
Young, C,S, 2016, Physical Security Controls, viewed 22 August 2019,
<https://www.sciencedirect.com/topics/computer-science/physical-security-control>.
Humayed, A., Lin, J., Li, F. and Luo, B., 2017. Cyber-physical systems security—A
survey. IEEE Internet of Things Journal, 4(6), pp.1802-1831.
Xiao, G., Wang, J., Liu, P., Ming, J. and Wu, D., 2016, March. Program-object level data flow
analysis with applications to data leakage and contamination forensics. In Proceedings of the
Sixth ACM Conference on Data and Application Security and Privacy (pp. 277-284). ACM.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]