Network Operation Center: Setup Factors and Security Overview

Verified

Added on  2022/10/11

|5
|765
|10
Report
AI Summary
This report provides an overview of the essential factors to consider when setting up a Network Operation Center (NOC). It emphasizes the importance of geographic location, highlighting how it influences globalization, communication efficiency, and internet connectivity. The report also addresses security considerations, including the need for security fencing and measures to protect computing devices and data. Furthermore, it details five major security measures: the use of rack mount services, surveillance setup, printer protection, disabling drives, and data backups. These measures are crucial for ensuring data integrity and preventing unauthorized access, ultimately contributing to the efficient and secure operation of the NOC. The report references several sources that support the findings and recommendations.
Document Page
Running head: NETWORK OPERATION CENTER
NETWORK OPERATION CENTER
Name of the Student
Name of the University
Author note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
NETWORK OPERATION CENTER
Table of Contents
Factors that are important in setting up of the Network Operation Center................................2
5 major security measures..........................................................................................................3
References..................................................................................................................................4
Document Page
2
NETWORK OPERATION CENTER
Factors that are important in setting up of the Network Operation Center.
Geographic location: It has been seen that geographic standard plays an important role
in the process. In case the entire process is to be performed in an efficient manner the
major benefit that will be achieved includes the likes of establishing proper
globalization and hence wise perform proper communication can be performed.
Occurring of optimal communication is one of the major concerns of the project
(Wang & Liu 2019).
Location of the city is also an important factor that is to be considered for performing
the location selection. This ensures that the location that has been selected provides
the highest uptime value to the existing infrastructure of the organization. Meeting the
internet needs is also another aspect that is considered for completion of the project.
In case a location is chosen which will be providing high connectivity facilities but
improper internet availability the entire location will be unstable (Daskin & Maass
2019). As the networking organization will be requiring backing up of data the main
issue that can be identified is that the data assessment will be performed as per the
sectioning of the loading area security. Presence of security fencing is also an
important aspect that is to be considered.
Presence of security in the location is also another aspect that is to be considered in
this case. As the entire processing will be dealing with the networking process, wiring
and computing systems will be present in the company set up. In case proper security
is not provided, stealing of computing devices and hence data might be affecting the
entire process. Another major aspect that is to be considered is that proper instances
of security system is to be checked before selecting the same. In case the security
aspect is maintained it can be said that the assessment of the data can be performed
with the higher efficiency and the business will be continued with higher efficiency.
Document Page
3
NETWORK OPERATION CENTER
5 major security measures
The 5 major security measures that are to be taken includes the likes of using of rack
mount services, setting up of surveillance, protecting the printers, Disabling the drives and
packing up of backups.
1. Rack mount services: Real mount servers are considerably light weight and hence
wise they use up a lesser area and hence wise this technology is much more secure
and easily placed in the closed racks.
2. Setting up of surveillance ensures that the entire process of data management will be
performed via security checks (Daskin & Maass 2019). Usage of cctv camera will be
made. With the help of these cameras, the data that are recorded will be having a
better monitoring process.
3. Protecting the printers: As most of the printer’s store documents the main aspect that
is to be included is that the printers require a specified support system.
4. Disabling the drives before leaving the office campus also acts important as with this
process unauthorized access to data can be prevented (Cavelty & Mauer 2016).
5. Keeping backups will ensure that even if there are any attacks the data will remain
protected and hence wise better assessment of the business can be made.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
NETWORK OPERATION CENTER
References
Cavelty, M. D., & Mauer, V. (2016). Power and security in the information age:
Investigating the role of the state in cyberspace. Routledge.
Daskin, M. S., & Maass, K. L. (2019). Location Analysis and Network Design.
In Operations, Logistics and Supply Chain Management (pp. 379-398). Springer,
Cham.
Pathan, A. S. K. (Ed.). (2016). Security of self-organizing networks: MANET, WSN, WMN,
VANET. CRC press.
Wang, J., & Liu, H. (2019). Snow removal resource location and allocation optimization for
urban road network recovery: a resilience perspective. Journal of Ambient
Intelligence and Humanized Computing, 10(1), 395-408.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]