Welcome to Assignments Writing

Your Trusted Partner in Term Paper Writing

At Assignments Writing, we’re a team of passionate educators and skilled writers committed to supporting students in their academic journey.

Telecommunication Services and Storage of The Organizations Data Essay


Security Plan for Marymount University’s Research Data Center

1. Introduction: The purpose of this security plan is to outline a comprehensive set of controls to ensure the secure use of Marymount University’s research data center while safeguarding the business systems stored therein. The plan covers administrative, technical, and physical controls to mitigate potential risks and ensure the confidentiality, integrity, and availability of data.

2. Administrative Controls: Administrative controls focus on policies, procedures, and guidelines to govern the use and access of the research data center.

2.1 Access Control Policy: Implement a strict access control policy that restricts after-hours access to authorized personnel only. Access requests must be submitted through a formal process and approved by appropriate authorities.

2.2 User Training and Awareness: Conduct regular training sessions for users, emphasizing the importance of data security, proper access procedures, and the potential risks associated with unauthorized access.

2.3 Role-Based Access Control (RBAC): Implement RBAC to ensure that users have access only to the data and systems necessary for their roles. This limits the potential for unauthorized data exposure.

2.4 Incident Response Plan: Develop and regularly update an incident response plan to address security breaches or unauthorized access promptly. This plan should outline the steps to take in case of a security incident.

3. Technical Controls: Technical controls involve technological solutions to protect the research data center.

3.1 Access Control Mechanisms: Implement strong authentication methods, such as two-factor authentication (2FA), for accessing the research data center. Require complex passwords and regular password changes.

3.2 Intrusion Detection and Prevention System (IDPS): Install an IDPS to monitor network traffic and identify suspicious activities or unauthorized access attempts. Set up alerts for immediate response.

3.3 Data Encryption: Utilize encryption techniques to protect data at rest and in transit. Implement full disk encryption on servers and use secure protocols for data transmission.

3.4 Firewall and Network Segmentation: Deploy firewalls to separate the research data center from the business data center. Use network segmentation to restrict communication between different systems and segments.

3.5 Regular Security Audits: Conduct regular security audits and vulnerability assessments to identify potential weaknesses in the systems. Promptly address any vulnerabilities discovered.

4. Physical Controls: Physical controls are measures taken to secure the physical access to the research data center.

4.1 Access Control Systems: Implement access control systems, such as biometric scanners or keycard entry systems, to restrict access to authorized personnel only.

4.2 Video Surveillance: Install video surveillance cameras to monitor entry points and critical areas within the research data center. Maintain a record of video footage for a specified period.

4.3 Environmental Controls: Ensure the research data center is maintained within optimal temperature and humidity ranges to prevent hardware damage.

4.4 Locking Mechanisms: Use robust locking mechanisms on doors, cabinets, and server racks to prevent unauthorized physical access to equipment.

5. Regular Review and Updates: Continuously review and update the security controls to align with emerging threats and changes in the technology landscape. This ensures the ongoing effectiveness of the security measures.

Conclusion: By implementing a combination of administrative, technical, and physical controls, Marymount University can secure the research data center while protecting the business systems stored within it. This comprehensive security plan aims to mitigate risks, ensure compliance, and safeguard the university’s valuable data assets.

Telecommunication Services and Storage of The Organizations Data Essay



Marymount  University has two primary data centers on campus—the research data center and the business data center. Due to budget and space  limitations, the research data center is also used to house the backup  systems for the business data center, resulting in business data being  stored in both locations.

The research data center is typically left unlocked, as many students  and faculty members use it for their work. The network infrastructure is  not monitored, and the systems themselves are not required to be  secured.

Recently, signs of after-hours access have been found in the research data center. Doors have been left open, lights have been on, and logins  have been found on research systems. Logs indicate that local logins  have been attempted on the business system consoles as well.

You are an entry-level security analyst in the information security  department at MU. Your manager – Professor s asks you to propose  a set of controls that will allow the use of the research data center  for its intended purpose while protecting the business systems that  reside there.

For this assignment:

  1. Write a security plan using the research datacenter description and diagram as a point of reference.
  2. Describe the administrative, technical, and physical controls you would recommend and why.
Place Your Order Here

Our Service Charter

1. Professional & Expert Writers: We only hire the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of master’s and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. We are known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: We have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.

Format & Features

Our Advantages

How It Works

1. Fill Order Form
2. Make payment
3. Writing process
4. Download paper

Fill in the order form and submit all your files, including instructions, rubrics, and other information given to you by your instructor.

Once you complete filling the forms, complete your payment. We will get the order and assign it to a writer.

When your order is completed, it’s assigned to an editor for approval. The editor approves the order.

Once approved, we will upload the order to your account for you to download.  You can rate your writer or give your customer review.

What Clients Said


I am very satisfied! thank you for the quick turnaround. I am very satisfied! thank you for the quick turnaround.I am very satisfied! thank you for the quick turnaround.

Mercy M

I am very satisfied! thank you for the quick turnaround. I am very satisfied! thank you for the quick turnaround.I am very satisfied! thank you for the quick turnaround.

Jane L

I am very satisfied! thank you for the quick turnaround. I am very satisfied! thank you for the quick turnaround.I am very satisfied! thank you for the quick turnaround.

Rayan M


We are a freelance academic writing company geared towards provision of high quality academic papers to students worldwide.

Open chat
Scan the code
Can we help you?