subject

Aim Higher College has two primary datacenters on campus--the research datacenter and the business datacenter. Due to budget and space limitations, the research datacenter is also used to house the backup systems for the business datacenter, resulting in business data being stored in both locations. The research datacenter is typically left unlocked, as many students and faculty members use it for their work. The network infrastructure is not monitored, and the systems themselves are not required to be secured. Recently, signs of afterhours access have been found in the research datacenter. Doors have been left open, lights have been on, and logins have been found on research systems. Logs indicate that local logins have been attempted on the business system consoles as well. You have been working as a security analyst in the information security department at Aim Higher College for two months. Your manager asks you to propose a set of controls that will allow the use of the research datacenter for its intended purpose while protecting the business systems that reside there. What controls would you suggest, and why

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 01:00
What is added to the < meta > tag to describe the encoding type?
Answers: 2
question
Computers and Technology, 22.06.2019 02:00
6. the is particularly susceptible to the effects of alcohol because it receives a large portion of total blood flow and has a high concentration of neurons. a. heart b. pancreas c. brain d. liver
Answers: 2
question
Computers and Technology, 22.06.2019 15:30
When creating a budget, log fixed expenses before income. after income. after savings. at the top.
Answers: 1
question
Computers and Technology, 23.06.2019 15:00
1. which of the following statements are true about routers and routing on the internet. choose two answers. a. protocols ensure that a single path between two computers is established before sending packets over it. b. routers are hierarchical and the "root" router is responsible for communicating to sub-routers the best paths for them to route internet traffic. c. a packet traveling between two computers on the internet may be rerouted many times along the way or even lost or "dropped". d. routers act independently and route packets as they see fit.
Answers: 2
You know the right answer?
Aim Higher College has two primary datacenters on campus--the research datacenter and the business d...
Questions
question
Mathematics, 07.10.2019 16:30
question
Mathematics, 07.10.2019 16:30
question
Mathematics, 07.10.2019 16:30
question
Computers and Technology, 07.10.2019 16:30
question
Mathematics, 07.10.2019 16:30
Questions on the website: 13722361