How the corporate solves its physical security problems

Assignment Help Computer Network Security
Reference no: EM131724206

Activity Assignment: Integrating IT and Physical Security CISCO Case Study

1. Case Learning Objectives

• Lists security technologies used for physical access control.
• Identify physical security issues in a large corporate with many facilities all over the world.
• How the corporate solves its physical security problems.
• Discuss the advantages of a solution to physical over its alternative.

2. Case Description

Read the paper "How Cisco IT Controls Building Security over the Enterprise WAN" and answer the case discussion questions below.

3. Case Discussion Questions and Their Mappings to Bloom's Taxonomy

Table 1: Mapping of Cisco Physical Security case discussion questions to Bloom's Taxonomy.

Cisco Physical Security Discussion Questions

Cognitive Level

1. Why did Cisco Systems transition from standalone access control systems to an IP networked systems?

Level 4  - Analysis

2. What challenges did Cisco system face in order to solve the physical security problems?

Level 1 - Knowledge
Level 2 - Comprehension

3. How did the new architecture system solve the access control problem? Explain?

Level 2 - Comprehension

4. How did Cisco systems solve the physical security problems?

Level 2 - Comprehension
Level 4 - Analysis

5. What security technologies did Cisco deployed to control building security?

Level 2 - Comprehension

6. Even though the employees in the Cisco Systems have doubled STS team remains same. Why?

Level 4 - Analysis

7. How did centralized managed IP based building security system save cost?

Level 4 - Analysis

4. References

[1] Whitman, M. E. and Mattord, H. J. Principles of Information Security, 3rd edition.

Thomson Course Technology, 2005.

Reference no: EM131724206

Questions Cloud

Describe the organization and the work it does : Describe the organization and the work it does (you do not have to name the organization or any identifying characteristics);
How your family experiences throughout the generations : Write a paper that explores how your family experiences throughout the generations shaped your own cultural beliefs and learning.
Exams will interact with many professionals throughout care : Patients coming into your HCO to have tests/exams will interact with many professionals throughout their care.
Display the data in a contingency table : Students in a class were asked whether they preferred an in-class or a take-home final exam and were then categorized as to whether or not they had received.
How the corporate solves its physical security problems : How the corporate solves its physical security problems. Discuss the advantages of a solution to physical over its alternative.
What is current stock price : Summers corp, currently has an EPS of 2.40 and the benchmark PE for the company is 23. Earnings are expected to grow at 5% annually.
Describe the percentage of the incidence of heart disease : Do grumpy old men have a greater risk of having coronary heart disease than men who aren't so grumpy? Harvard Medical School researchers examined this question.
Discuss the impacts of caregivers and culture on gender : Identify a gender development-related issue of critical importance to individuals and society.
What is current share price : If the required return is 10% and the company just paid a dividend of 3.70$, what is current share price?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Identity information of customers and employees

In 300- to 400-words, explain why security professionals must be aware of the requirements for protecting personal identification information (PII) that may be stored on organizational information systems. Also, describe phishing and how it can be ..

  Write access control policy section of information security

Write the Access Control Policy section of the Information Security Policy. Include the User enrollment, Identification, Authentication, Privileged and special account access and Remote access.

  Use whois at network solutions to find contact information

Use whois at Network Solutions, netsol.com and/or whois.arin.net to find contact information and DNS servers for one organization. Also find the IP address range for their network. Print your results.

  How can hacking into a company''s system put at risk

Write a few words on how this research connects to the claims and PowerPoint thesis. Write a conclusion statement, which includes a short summary

  What if ipsec provides security at the network layer

If IPSec provides security at the network layer, why is it that security mechanisms are still needed at layers above IP?

  What exactly is cyberterrorism

What exactly is cyberterrorism and What is information warfare? How can information warfare be distinguished from cyberterrorism?

  Explain the implementation process and timeline

Explain the implementation process and timeline. Explain the learning team's recommendations to design the network. Calculate the cost of the network design.

  Dissect an email

Dissect an email you have received. First, get the original, ASCII text of the email, including the headers, and the blank line separating the headers and the body of the email.

  How many keys are there in this compound cipher

An affine cipher can be combined with a Vigenère cipher by fixing a but using k different values of b and cycling through these b values, letter by letter. How many keys are there in this compound cipher?

  Prepare a report on computer security breaches

Search the web for news on computer security breaches that occurred during April-August 2017. Topic: Deep dive into the Edmodo data breach

  Describe real-world examples that help support your position

Prepare your paper in Word format and submit it through your Assignments Folder. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines.

  C structs and enums

Protect your header using #ifndef directive. Define a struct with tag Capacitor that holds the following information about a capacitor: Model number (e.g. 11-123U), capacitance (e.g. 1000 uf), voltage (e.g. 2.5 V), cost ($6.50)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd