Welcome to Assignments Writing

Your Trusted Partner in Term Paper Writing

At Assignments Writing, we’re a team of passionate educators and skilled writers committed to supporting students in their academic journey.

Telecommunication Services and Storage of The Organizations Data Essay

Telecommunication Services and Storage of The Organizations Data Essay

ANSWER

Marymount University Research Data Center Security Plan

Introduction

Marymount University operates two primary data centers on its campus—the research data center and the business data center. The research data center serves as a valuable resource for students and faculty, allowing them to conduct research and academic activities. However, due to budget and space limitations, the research data center also houses the backup systems for the business data center, leading to a dual-purpose utilization of the space. Recent incidents of unauthorized access and security breaches in the research data center have raised concerns about the security of the business data stored there.

As an entry-level security analyst in the information security department, my objective is to propose a set of controls that will enable the continued use of the research data center for its intended academic purpose while enhancing the protection of the business systems and data residing within it.

Administrative Controls

Access Control Policy

  1. Access Authorization: Implement strict access control policies for the research data center. Access should be granted only to authorized personnel, including students and faculty members who require it for academic purposes.
  2. Role-Based Access: Define roles and responsibilities for individuals accessing the research data center. Differentiate between academic users and IT personnel responsible for managing business data systems.
  3. Access Review: Conduct regular reviews of access rights and privileges to ensure that they are aligned with current academic and administrative needs.
  4. Access Logging: Implement comprehensive access logging and monitoring to track who accesses the research data center and when.

Security Awareness Training

  1. Training Programs: Provide security awareness training to all personnel with access to the research data center. This training should include best practices for physical and digital security.

Incident Response Plan

  1. Incident Handling: Develop and maintain an incident response plan that outlines the steps to be taken in the event of a security incident or breach.

Security Compliance Audits

  1. Regular Audits: Conduct periodic security audits and assessments to ensure compliance with security policies and standards.

Technical Controls

Network Segmentation

  1. Network Segmentation: Segregate the network within the research data center to isolate academic and business systems. Implement VLANs or network segmentation technologies to separate the two environments.

Intrusion Detection and Prevention Systems (IDPS)

  1. IDPS: Deploy intrusion detection and prevention systems to monitor network traffic within the research data center. Configure alerts for suspicious activities.

Access Control

  1. Access Control Systems: Implement card-based or biometric access control systems for entry into the research data center. Access should be granted only to authorized individuals.
  2. Two-Factor Authentication (2FA): Enforce two-factor authentication for accessing critical systems within the research data center, especially for business data systems.

Security Monitoring and Logging

  1. Continuous Monitoring: Establish continuous monitoring of network and system activities. Log and review security events regularly.

Security Patch Management

  1. Patch Management: Implement a robust patch management process to ensure that all systems and software are up-to-date with the latest security patches.

Endpoint Security

  1. Antivirus and Anti-Malware: Deploy antivirus and anti-malware solutions on all systems within the research data center.

Data Encryption

  1. Data Encryption: Encrypt sensitive business data both in transit and at rest to protect it from unauthorized access.

Physical Controls

Access Control

  1. Physical Access Controls: Enhance physical security by installing security cameras, alarms, and card-based access control systems at the entrances of the research data center.
  2. Restricted Hours: Restrict access to the research data center to specific hours, aligning with academic needs.
  3. Secure Cabinets: Store critical business data systems in locked cabinets or racks to prevent unauthorized physical access.

Environmental Controls

  1. Environmental Monitoring: Implement environmental monitoring systems to track temperature, humidity, and other environmental factors that may impact the data center’s infrastructure.

Backup and Redundancy

  1. Backup Locations: Establish off-site backup locations for business data to ensure data availability even in the event of a disaster within the research data center.

Conclusion

By implementing these administrative, technical, and physical controls, Marymount University can strike a balance between academic freedom in the research data center and the security of business systems and data. These measures will help protect sensitive business data while allowing students and faculty to continue their academic work within the research data center. Regular assessment and updates to the security plan will be essential to adapt to evolving threats and compliance requirements.

Telecommunication Services and Storage of The Organizations Data Essay

QUESTION

Description

 

 

Marymount  University has two primary data centers on campus—the research data center and the business data center. Due to budget and space  limitations, the research data center is also used to house the backup  systems for the business data center, resulting in business data being  stored in both locations.

The research data center is typically left unlocked, as many students  and faculty members use it for their work. The network infrastructure is  not monitored, and the systems themselves are not required to be  secured.

Recently, signs of after-hours access have been found in the research data center. Doors have been left open, lights have been on, and logins  have been found on research systems. Logs indicate that local logins  have been attempted on the business system consoles as well.

You are an entry-level security analyst in the information security  department at MU. Your manager – Professor s asks you to propose  a set of controls that will allow the use of the research data center  for its intended purpose while protecting the business systems that  reside there.

For this assignment:

  1. Write a security plan using the research datacenter description and diagram as a point of reference.
  2. Describe the administrative, technical, and physical controls you would recommend and why.
Place Your Order Here

Our Service Charter


1. Professional & Expert Writers: We only hire the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of master’s and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. We are known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: We have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.

Format & Features

Our Advantages

How It Works

1. Fill Order Form
2. Make payment
3. Writing process
4. Download paper

Fill in the order form and submit all your files, including instructions, rubrics, and other information given to you by your instructor.

Once you complete filling the forms, complete your payment. We will get the order and assign it to a writer.

When your order is completed, it’s assigned to an editor for approval. The editor approves the order.

Once approved, we will upload the order to your account for you to download.  You can rate your writer or give your customer review.

What Clients Said

{

I am very satisfied! thank you for the quick turnaround. I am very satisfied! thank you for the quick turnaround.I am very satisfied! thank you for the quick turnaround.

5
Mercy M
{

I am very satisfied! thank you for the quick turnaround. I am very satisfied! thank you for the quick turnaround.I am very satisfied! thank you for the quick turnaround.

5
Jane L
{

I am very satisfied! thank you for the quick turnaround. I am very satisfied! thank you for the quick turnaround.I am very satisfied! thank you for the quick turnaround.

4.5
Rayan M

LET US DELIVER YOUR ACADEMIC PAPER ON TIME!

We are a freelance academic writing company geared towards provision of high quality academic papers to students worldwide.

Open chat
1
Scan the code
Hello
Can we help you?