StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Secure Computer System - Studies - Case Study Example

Cite this document
Summary
Factors considered when converting a section of general office space to server room; firstly, the walls should not be close to exterior walls which could be damp because of containing water. Exterior walls are subject to be blown by strong winds. For doors, I would pick an interior area and make doors with sizes large enough to pass the LAN equipment…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.7% of users find it useful
Secure Computer System - Case Studies
Read Text Preview

Extract of sample "Secure Computer System - Studies"

Download file to see previous pages

Fire detection is very crucial therefore fire detection appliances should detect the smallest indication of fire through sparks and temperature rise. Fire suppression equipment need to be installed and should suppress the fire without damaging the server equipment. Water sprinklers are the most common fire suppression equipment. It would be better to consider other options like the use of carbon dioxide fire extinguishers (Nash, 1997, pg 23). Heating, ventilating and air conditioning as well as climate control equipment should be kept separate from the rest of the room to avoid damaging the network equipment.

I would not place the ventilation equipment overhead because it would risk the server. The switch for the equipment would be placed inside the room to prevent accidental switching. Proper power at the right quality should be regulated through the use of power protection equipment. By use of reliable power supply and surge protection equipment, the power will be kept at the desired quality. Power should be safe and reliable and should not fluctuate often. The space for the equipment should be adequate enough to allow for future expansion. . Considerations for installing additional components and intrusion detection and prevention system should be taken into consideration (Shirley, 2008, pg 34).

Case Study Pg.432Case exerciseQuestion 1 page 432Based on the case study, what security awareness and training posters had an impact in this incident.Pg.432 Question 1In Amy's incident, the following security awareness posters and training documents may have contributed to it; posters requiring the immediate reporting of security problems, posters and documents requiring the practice of healthy computer security. Information and security tips on posters and documents. Company security policy documents also contributed to this incident.

The following topics may also have contributed to the incident, these are;Password usage and management; this includes creation of passwords, frequency of changing the password and methods used in protection. Security training plays a pivotal and important role in preventing attacks on computer system by viruses, worms, Trojan horses, and other malicious code (Richardson, 2005, pg 2). More information that is needed in order to enhance information security is the creation of a policy poster indicating;implications of noncompliance to information security implications of receiving unknown e-mail/attachments implications of people browsing certain prohibited websites during working hoursthose allowed to use the web services and those who are prohibited and also stipulating penalties for those found breaching these rules and regulationsData storage and backup; data storage systems maybe centralized or decentralized.

This information is placed on not only posters but also on, newsletters,

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Secure Computer System - Case Studies Study Example | Topics and Well Written Essays - 2750 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1502103-secure-computer-system-case-studies
(Secure Computer System - Case Studies Study Example | Topics and Well Written Essays - 2750 Words)
https://studentshare.org/miscellaneous/1502103-secure-computer-system-case-studies.
“Secure Computer System - Case Studies Study Example | Topics and Well Written Essays - 2750 Words”, n.d. https://studentshare.org/miscellaneous/1502103-secure-computer-system-case-studies.
  • Cited: 0 times

CHECK THESE SAMPLES OF Secure Computer System - Case Studies

Information Technology Security

The case study 'Information Technology Security' demonstrates that computers came in and finally the Internet.... The aim of this project management is to find a solution to the risks and threats in an information system of a particular organization.... Hardware includes computers and equipment while software and the operating systems are stored in the database or memory of the computer....
8 Pages (2000 words) Case Study

Digital Evidence and Digital Crime

hellip; While computer are useful in the digital economy, some users utilize information systems to conduct crime or engage in illegal activities.... The room had several other pieces of computer hardware such as servers, switches, and network cables.... First, we asked the network administrator to help us identify the suspect computer.... Being that the he had prior records, we had the Mac address of the suspect computer, 00:80:R2:45:F7:67....
5 Pages (1250 words) Case Study

Effect of Information Systems for Pharmacy Management System

hellip; Most studies have tried to explain the relationships between firm performance, competitive advantage, and investments made in information systems.... This study "Effect of Information Systems for Pharmacy Management system" examines how information systems contribute to the specific responses and competitive actions of the firm....
18 Pages (4500 words) Case Study

Web-Based Systems - NoSQL and MongoDB

The paper "Web-Based Systems - NoSQL and MongoDB" highlights that HTML5 web storage has several disadvantages such as only string values are present; hence, serialization is required.... Data is unstructured with no indexing, transactions, or searching facilities.... hellip; HTML5 web storage is different from other forms of data storage in that it is simple to use and makes it possible to store arbitrary values easily in the browser....
7 Pages (1750 words) Case Study

HP Settles Spying Case with N.Y. Times

The paper will first throw light over the business case and will then demonstrate the ethical considerations by analyzing Utilitarian and Deontological theories of business ethics.... hellip; This research will begin with the statement that Hewlett Packard (HP), which is an American multinational corporation, has been involved in the global business of computer products, accessories, instruments and information technology equipment that facilitate in communication, networking, office work and record keeping of business operations....
6 Pages (1500 words) Case Study

Strategic IT Management: Amazon.com

om's Information Management system enabled the company to survive the hurdles of the 2000 bubble burst and the many complexities of eCommerce.... simple definition of this term includes a computer-based system to provide speedy access to data and information.... An information system can provide service to personal, professional and organizational functions.... But to clearly define it, Management Information system is a philosophy in the truest sense of the word....
10 Pages (2500 words) Case Study

IT Study: Silent Cycles

This case study "IT Study: Silent Cycles" discusses several advantages over the traditional methods of computer file processing approach.... he third-party security option is advantageous because the fake data set is to be used by the design and implementation of teams, it also allows data to be scrambled if an intrusion occurs, it can be able to look for odd data and poor access commands, it also arrests data being exited from the system (Bernstein, 1976)....
7 Pages (1750 words) Case Study

Mobility Express Edition Software and Health Information Technology

Even though the public network is used in this case, a dedicated path is reserved for communication between clients who share the same network.... hellip; The hospital observed is a nonprofit system of hospitals, clinics, and other health care services.... The chosen technology for discussion in this paper is the Allina medical system Virtual private network.... Reasons why the chosen system information system is worth evaluating This technology is worth evaluating due to the merits that technology introduces in the health care sector....
10 Pages (2500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us