Discussion 3 physical vulnerability assessment of security

Assignment Help Computer Engineering
Reference no: EM133478284

Question: Discussion 3 Physical Vulnerability assessment of security perimeters of TechWorx.Assignment: Mr. Scott wants a Physical vulnerability assessment of the security perimeters of TechWorx.

Chapters 3.6 (Gupta and Goyal)
Chapter 4 (Fennelly)

Minimum Requirements:

  • Inside the Techworx building:
  • 1st-floor reception and access to stairs, elevators, loading dock, and restrooms
  • 2d floor offices and conference rooms
  • 3rd floor: Executive offices
  • 4th floor: IT Offices and data center
  • Define the three Perimeters (Outer, Inner, and Interior) for TechWorx and what are the key vulnerabilities of each of the perimeters. Note: In figure 2 below, there is no indication of an outer perimeter. You will need to create one for the organization.
  • What are the most critical areas/limited access areas that we should secure in the building?
  • Include at least one supporting figure, image, or diagram. (you may have more than one)
  • Ensure you address all three security perimeters.
  • What type of access control systems do you recommend for TechWorx and why? Note: I am not asking for a specific model and brand. At this point, we are just brainstorming what types of systems we will need.
  • Mr. Scott was very happy to hear about the NIST Cybersecurity Framework. He is anxious to get started on protecting TechWorx equipment and personnel. For this assignment only consider physical perimeters. We will cover computer/network (logical) perimeters in future assignments.

 

Reference no: EM133478284

Questions Cloud

Why don''t the states all just adopt the same type : Why don't the states all just adopt the same type of procedure for filing appeals that is used by the U.S. Supreme Court?
What type of research question is being asked : What type of research question is being asked? Did the study methods address the most important potential sources of bias?
Will a court allow the shareholder derivative suit to go for : When Clovis withdrew the drug from FDA consideration in 2016, the stock price plummeted. Will a court allow the shareholder derivative suit to go forward
Providing freshly baked bread and pastries : providing freshly baked bread and pastries to some of the city's best restaurants, cafes, and shops. Earlier, you had worked on optimising the firms cost
Discussion 3 physical vulnerability assessment of security : Discussion 3 Physical Vulnerability assessment of security perimeters of TechWorx.Assignment: Mr. Scott wants a Physical vulnerability assessment
What would be the likely decision : Should this matter go before the courts what would be the likely decision? Explain the reason for your decision, providing support with legal principles
What are the economic issues involved : What are the economic issues involved? Which economic theories or approaches best explain the issue? What are the statistical facts related to the issue?
Define what a pert diagram is relative to project planning : Define what a PERT diagram is relative to project planning and Explain the importance of a PERT diagram in a project plan
Identified threats described in scenario for this project : identified threats described in the scenario for this project, as well as any new threats that may have been discovered during the risk assessment.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Why institutions are reluctant to move their it to the cloud

Discuss in 500 words, why institutions are reluctant to move their IT to the cloud. Consider specific industries like education, medicine, military, etc.

  Prepare a method and the corresponding recursive function

Prepare a method and the corresponding recursive function to insert an Entry, Binary_tree insert passed as a parameter, into a linked binary tree.

  Determine what security methods may you recommend be used

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years.

  Calculate the amount of the mortgage payment

Write a Java program that reads the amount of a mortgage payment and the amount still owed - the outstanding balance.

  Locate information regarding cloud computing and compare

cloud computing is a recent technology being marketed and used as a means to provide off-site computing power to an

  Write a program in c that builds a contiguous list of 1

Write a program in C that: a. Builds a contiguous list of 100 cells. b. Populates the cells with random numbers between 0 and 1000.

  Write a c program fragment that deletes all files

Write a C program fragment that deletes all files in the command line with the exception of files that end with the characters .bak. The declaration for main

  The overall goal of this new system will be to organize

check point new system proposalnbspupon reviewing riordan manufacturing inc.s current and historical sales and

  Define tam and the components

Define TAM and the components. Note how TAM is impacting educational settings. Give an overview of the case study presented and the findings.

  Consider the ways in which you can optimize a file

consider the ways in which you can optimize a file in order to reduce file size and maintain quality. What factors would you consider.

  How to remove your cousin from facebook search results

Research the privacy and security settings on Facebook and create a "User's guide" for your aunt to work through with your cousin.

  What is the worst-case time for putting n entries

What is the worst-case time for putting n entries in an initially empty hash table, with collisions resolved by chaining? What is the best case?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd