StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Secure Computer System - Studies - Case Study Example

Comments (0) Cite this document
Summary
Factors considered when converting a section of general office space to server room; firstly, the walls should not be close to exterior walls which could be damp because of containing water. Exterior walls are subject to be blown by strong winds. For doors, I would pick an interior area and make doors with sizes large enough to pass the LAN equipment…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97% of users find it useful
Secure Computer System - Case Studies
Read TextPreview

Extract of sample "Secure Computer System - Studies"

Download file to see previous pages Fire detection is very crucial therefore fire detection appliances should detect the smallest indication of fire through sparks and temperature rise. Fire suppression equipment need to be installed and should suppress the fire without damaging the server equipment. Water sprinklers are the most common fire suppression equipment. It would be better to consider other options like the use of carbon dioxide fire extinguishers (Nash, 1997, pg 23). Heating, ventilating and air conditioning as well as climate control equipment should be kept separate from the rest of the room to avoid damaging the network equipment. I would not place the ventilation equipment overhead because it would risk the server. The switch for the equipment would be placed inside the room to prevent accidental switching.
Proper power at the right quality should be regulated through the use of power protection equipment. By use of reliable power supply and surge protection equipment, the power will be kept at the desired quality. Power should be safe and reliable and should not fluctuate often. The space for the equipment should be adequate enough to allow for future expansion. ...
Considerations for installing additional components and intrusion detection and prevention system should be taken into consideration (Shirley, 2008, pg 34).
Case Study Pg.432
Case exercise
Question 1 page 432
Based on the case study, what security awareness and training posters had an impact in this incident.
Pg.432 Question 1
In Amy's incident, the following security awareness posters and training documents may have contributed to it; posters requiring the immediate reporting of security problems, posters and documents requiring the practice of healthy computer security. Information and security tips on posters and documents. Company security policy documents also contributed to this incident.
The following topics may also have contributed to the incident, these are;
Password usage and management; this includes creation of passwords, frequency of changing the password and methods used in protection. Security training plays a pivotal and important role in preventing attacks on computer system by viruses, worms, Trojan horses, and other malicious code (Richardson, 2005, pg 2). More information that is needed in order to enhance information security is the creation of a policy poster indicating;
implications of noncompliance to information security
implications of receiving unknown e-mail/attachments
implications of people browsing certain prohibited websites during working hours
those allowed to use the web services and those who are prohibited and also stipulating penalties for those found breaching these rules and regulations
Data storage and backup; data storage systems maybe centralized or decentralized.
This information is placed on not only posters but also on, newsletters, ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Secure Computer System - Case Studies Study Example | Topics and Well Written Essays - 2750 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1502103-secure-computer-system-case-studies
(Secure Computer System - Case Studies Study Example | Topics and Well Written Essays - 2750 Words)
https://studentshare.org/miscellaneous/1502103-secure-computer-system-case-studies.
“Secure Computer System - Case Studies Study Example | Topics and Well Written Essays - 2750 Words”, n.d. https://studentshare.org/miscellaneous/1502103-secure-computer-system-case-studies.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Secure Computer System - Case Studies

Secure Computer Systems

...With the growing incidents of PII data theft and negligence in securing PII data. Stringent measures must be taken by the federal government and concerned government agencies. There should be frequent checks on the PII data security, in banks and hospitals apart from government agencies who store PII data in huge volumes .Partnerships with , major software companies like IBM (windows) and data security firms like RSA will help in reducing potential PII theft as security measures will be introduced during the software development stage. Quote .* "Improving data protection reduces risks associated with breaches and will enhance confidence in the government's ability to protect citizens' privacy and personal information, while simultaneously...
2 Pages(500 words)Essay

Secure Computer Systems

...Secure Computer Systems (Computer Science) - Article of the Name of the Concerned Professor September 20, 2009 Secure Computer Systems (Computer Science) - Article Data security and privacy have emerged as primary concerns in the contemporary era of digitized economies and corporate operations. This issue has grabbed the attention of governments around the world. In the last decade, even in the US, the government has imposed many security and privacy related regulations on the corporations. As per an article published in Mondaq Business Briefing on September 2, 2009, the Massachusetts Office of Consumer Affairs and Business Regulation (OCABR) came...
2 Pages(500 words)Term Paper

Secure Computer System

...Secure Component System 1. ify each of the following occurrences as an incident or disaster. If an occurrence is a disaster, determine whether or not business continuity plans would be called into play. a. A hacker gets into the network and deletes files from a server. - occurrence is an incident. b. A fire breaks out in the storeroom and sets off sprinklers on that floor. Some computers are damaged, but the fire is contained. - occurrence is a disaster. c. A tornado hits a local power company, and the company will be without power for three to five days. - occurrence is a disaster. d. Employees go on strike, and the company could be without critical workers for weeks. - occurrence is an incident...
2 Pages(500 words)Essay

CASE STUDIES

...Case Studies Panera Since Panera expects to see double digit growth figures for restaurants working with their business model, it is difficult to see the top of the pyramid (customers) dwindling to be of any danger to them. However, the middle managers and non-permanent employees who work without benefits or tips could be expected to not be as enthusiastic about their jobs as top management therefore this could be cause for concern to the company. 2. Diversity could be problem for the company in the future since the present level of diversity is not enough. The top management and the board of directors is 100% male, since Panera is offering a healthier option for food, they could be helped by having female and minority members of the board...
4 Pages(1000 words)Essay

CASE STUDIES

... s the assignment is due Case studies Case Lonely Planet In its efforts to diversify, Lonely Planet,the leader in Travel related books, launched its own website in 1994. Apart from providing valuable tourism related information, it offers services like package tours, hotel room booking, booking airline and train tickets etc. And, when we analyze this cross channel marketing, the issue that becomes an object of contention is the way or the speed with which, Lonely Planet’s website disseminate the tourism related information. That is, the speed of Internet technology has made Lonely Planet’s main ‘vehicle’ of travel guides suffer a cannibalization impact. That is, the gestation period of any travel guides including Lonely Planet...
7 Pages(1750 words)Essay

Management information system (IT) case studies assignment

...Chapter Answer Some of the challenges, like the need for high performance computer that could run specialized software and accessibility to updated information, are similar to other businesses that increase the overall productivity of the business. Chapter 1 Answer 2 The other tangible and non tangible benefits enjoyed by mobile work force may include the continuity of work through tele-conferencing, online entertainment channels and information that would also facilitate real-time work management. Chapter 1 Answer 3 Notebook computers have now become essential part pilots and to reduce the risks, Lufthansa made sure that lightweight and high performance notebook computers, with minimum 12” screen and long battery life, were made...
2 Pages(500 words)Essay

Case Studies: Altered Hematology & Cardiovascular System

...Case Studies: Altered Hematology & Cardiovascular System Altered Hematology and Cardiovascular System Case Study Ms. A. is an apparently healthy 26-year-old white woman. Since the beginning of the current golf season, Ms. A has noted increased shortness of breath and low levels of energy and enthusiasm. These symptoms seem worse during her menses. Today, while playing in a golf tournament at a high, mountainous course, she became light-headed and was taken by her golfing partner to the emergency clinic. The attending physician’s notes indicated a temp of 98 degrees F, an elevated heart rate and respiratory rate, and low blood pressure. Ms. A states, “Menorrhagia and dysmenorrheal have been a problem for 10-12 years, and I take 1,000 mg...
4 Pages(1000 words)Case Study

Case studies

...Philosophy CASE STUDY TWO Failure to Diagnose Medical Indications It’s a matter of fact that patient’s lung cancer was discovered two years back and not treated. There has been a failure to show honesty on the part of Physician assistant two years back and a failure to show an impartial behavior. If the physician was unclear at the time of the diagnosis that as to whether the patient has lung cancer, he/she could have sought a second opinion there and then rather than holding the decision for two years. It could have been that the diagnosis could be unreliable in the first place and that the current medical problem with the patient could have been much different and treatable. There could be other test which could clarify the situation...
10 Pages(2500 words)Case Study

Computer Information System Case Analysis

...Computer Information System Case Analysis This presentation is concentrated on the illustration of Information Systems, the variety of Information Systems and the way these systems affect organizations in many methods. In this paper report we look into the various essential uses of a Transaction processing system and the implementation procedures that are undertaken in installing and using this system. I strongly agree that any business entity in this current world economy needs information to be able to run efficiently. The time and accessibility of the information is dependent on the systems put in place to facilitate information passing. Information systems can be implemented by an organizations technology team or the organization can...
11 Pages(2750 words)Case Study

Case Studies

... Case Study A. The Rogue Trader is film about a broker Nick Leeson and the fall of the Baring Bank. The leaders of the bank were responsible for its demise because they had poor market analysis and ineffective decision-making skills. For instance, they heavily relied on stock market for the bank’s profits without considering its long-term effects leading t the bankruptcy of the bank. In addition, they chose wrong a person to make trades for the Bank because he turned out to be a rogue trader. Their lack of oversight made them realize the bank was running a loss when it was too late. B. Nick Leason is opportunistic because he used his position in the bank to cover up his mistakes. He was also a dishonest employee. Instead of reporting...
1 Pages(250 words)Case Study

Budgetary Control and Costing System

Job costing and Process Costing are the two basic methods of costing. Job costing is suitable to industries, which manufacture or execute the work according to the specifications of the customers. Process costing is suitable to industries where production is continuous and the units produced are identical. All other methods are combinations, extensions or improvements of these basic methods.

1. JOB COSTING: It is also called specific order costing. It is adopted by industries where there is no standard product and each job or work order is different from the others. The job is done strictly according to the specifications given by the customers and usually, the job takes only a short time for completion. The purpose of...
17 Pages(4250 words)Case Study

The Idea of Liberty in Sam Slime Case

... Sam Slime This could certainly be the case of the rich get richer and the poor go to jail, especially in a country that is trying to serve many masters. The government of the United States is certainly a political and governmental entity, but at it heart it has almost always been a voice of corporate business and expansion of wealth for the few. It operates seemingly under the principle guise of what is good for business is good for the people. One could say that the state of the economy today is the fallout of this mindset. In the “Sam Slime” case study we see the idea of liberty as applied by several masters. The first, when Sam Slime mugs you outright is a matter for governmental law and order. Cleary there is a criminal (Sam...
8 Pages(2000 words)Coursework

Microprocessor System and Application

In a computer, a processor commonly involves one or more microprocessors (also acknowledged as chips), which are silvers of silicon or other substance stamped with many little electronic circuits. To perform operations on data, the computer passes electricity all the way through circuits to execute an instruction (Norton 2001.p. 5). The innovation in technology has brought a lot of facilities for us. We have better ways of life and all the facilities regarding better production and domestic tasks. Such as in the industrial production we have automatic robots that are welding, packing, moving and carrying out several other development-related tasks. These robots are pre-programmed and microprocessors based chips are controlling all...
6 Pages(1500 words)Assignment

Computer Privacy Issue

The requirement has increased because there are unscrupulous computer attacks and private details are being stolen now more and more. These malicious data attacks have left the computers worldwide at a risk and hence the need to have privacy is of fundamental significance. If these privacy regimes are not taken care of, one could guarantee that problems would come about quickly and the computer networks would crash down instantly, thus providing fatal for the businesses and individuals alike. It goes to show without any doubt that privacy forms up as the most essential ingredient of success within a business entity and any organization would absolutely cherish the idea of having privacy within their networks to keep away the negat...
6 Pages(1500 words)Essay

Analysis of OReilly v Mackman Case

Judicial review is a concept which is constitutionally undecided as it on one side, it shores up the rule of law, democracy, and pre-eminence of parliament by facilitating the courts to check the boundaries of government authority and on another side, the courts are open to the decision on the plants based on the fact of separation of authorities that are intimating with the verdicts of democratically elected institutions. Judicial review is not apprehended with the virtues of government assessment but deals with whether the deciding authority has remained within the legal boundaries and whether broad principles of rationality and fairness adhere. The constitutional basis of judicial review is debated as one view holds that it is...
8 Pages(2000 words)Case Study

Analysis of Tourism and Hospitality Law Case

 The main issue that needs to be tackled first is whether there is a valid contract between Richard Brat, carrying on trade as Brighton Greens, (buyer) and Molly and Kelly trading in First Grade Granny Smith apples as Holy Farm.

Apparently, there was, when considering their verbal and written mail sent by Richard to Holy Farm on August 1 reading as follows –“Please deliver 20 boxes –Granny Smith ‘Brighton Greens’. Cheque mailed.“

It may be seen that the mail order does not specify the category or grade of apples to be supplied, but one of the implied conditions of sale could be that the goods ordered need to correspond with the goods inspected and tested.

In th...
8 Pages(2000 words)Case Study

International Security Studies: Examination

Globalization affects international security in the sense that problems involving terrorism, the environment, religious extremism, weapons of mass destruction, and the economic crises have become more universal and widespread in character (Ivanov “Article”). As a result, these issues pose a greater threat to national and international stability and safety. More lives are now affected by threats to international security; these threats did not seem too ominous before the entry of globalization. Consequently, some extremists justify the use of mass weapons of destruction in order to guarantee their security. And as globalization continues to expand and to grow bigger as a phenomenon, threats to international security are...
7 Pages(1750 words)Assignment

Structure of the Educational System in Morocco and Its Capacity for Addressing the Needs of the Hospitality Industry

...Independent Research Study An investigation into the Structure of the Educational System in Morocco and its Capa for Addressing the Needs and Expectations of the Hospitality Industry in the Country Submitted by : Submitted to : Course : Date : September 29, 2009 Word Count : 3,069 words STATEMENT OF AUTHORSHIP “I confirm that no part of this work, except where clearly quoted and referenced, has been copied from material belonging to any person e.g. from a book, handout, another student. I am aware that it is a breach of GIHE regulations to copy the work of another without clear acknowledgement and that attempting to do so render me liable to disciplinary procedures.” ________________ Table of Contents I. Consultant’s Brief 4...
15 Pages(3750 words)Research Proposal

The Interprofessional Practice and the Health Care System

This is also the position Stone (2007) takes in the quote under discussion.
Furthermore, Stone goes on to declare that Australia has been very slow to implement this practice as compared with other countries and government agencies. One of the primary reasons is that the public policy system in Australia is quite complex and the decision-makers have not come into agreement on where to place it in the policy matrix. This leaves Interprofessional Practice and Education in the dark (or the cold) as far as strategic planning for implementation as well as placing itself within the funding cycles of the government disbursements. (Stone, 2007)
Policies are created in order to put in place how politicians and government official...
6 Pages(1500 words)Assignment

Identification of problems in the Criminal Justice System of the US

They are on trial and will be dealt with fairly. These laws ensure that no one, even if he or she has committed a crime is abused or punished cruelly.
Following the history of civilization like in china, we see the traces of systems for Criminal justice in order to provide safety for the citizens. Evolving through the years laws have been modified and changed to form the system that we know today.
 From its start, the “U.S. criminal justice system” has advocated the idea of “checks and balances”. To avoid dictatorial rule, the people who founded this system in such a way that one person was not given control or authority completely to punish the criminals. The idea of assigning a ‘jury...
6 Pages(1500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Secure Computer System - Case Studies for FREE!

Contact Us