>> Computer Network Security
Your company is bought out by another company and there were massive layoffs. Your manager was one of the casualties. In the reorganization, your department was moved to the new parent company which means new coworkers and more importantly, a new boss as part of a new publishing company with 300 employees over 4 sites. Your new manager visited your new desk as you were unpacking your stapler and announced that you were the person with the most experience so they needed you to give a presentation to the other department managers on the need for physical security and adequately configuring your company's network to be secure. Since you don't have a list of equipment, you have a little leeway on what your presentation will include in that respect, however, for details on physical security, you have to make sure you include the basics. Make sure you detail what will deter hackers from breaking in. Be sure to include your references.
Submit a PowerPoint presentation with 8-10 (or more) slides that outlines your company's needs for these types of security, how it should be used, and how it is to be structured.
Attach the PowerPoint presentation to this assignment link. This assignment should adhere to the minimums for slide countand is due at the end of the academic week. It is worth 50 points, and a good presentation of the topic will get full credit. Ensure you're using standard formatting for presentations and that you cite and reference any sources used. Any misspellings or grammar issues will result in deductions from the total score. This assignment's score will appear in theonline grade book following the end academic week.
Research Paper Assignment - Milestone 2 - Abstract (Attach the Abstract to this Assignment)
The Research Paper abstract is due this week. Make sure you have read through the Research Paper Overview in the Research Paper folder. Submit the abstract in a single Word document by attaching it to this assignment using the link provided.
Preview Container content
Physical security is the basis of information security implementation for an organization. However, most of the times, this requirement is overlooked. Physical security is aimed at protecting employees and information technology infrastructure of an organization along with helping better implementation of software based security measurements. Lack of physical security measurements open up risks and threats of insider attacks like physical theft of data, damage of equipment, unauthorized access and so on. Identifications of physical security loopholes must be uncovered and resolved before an attacker exploits those loopholes. Some key measurements for implementation of physical security include locking up important resources, monitoring, data backup, video surveillance and creating awareness among employees.
A computer network works as a backbone for the information technology infrastructure of an organization. To make a network secure, it needs to work from the bottom level of the networking model. Hence, it needs to start from physical security and work up to application level security.
Physical security is very much important as it makes the foundation of all other information security strategies and policies. Software based information security implementations will work efficiently only when the physical infrastructure is also well protected.
There are a number of information security risks and threats, both for physical security and software based security controls. Also, there are various tools and techniques to deal with those risks and threats. It needs proper configurations for information security controls to achieve higher level of information security for the organization.
While developing and configuring a network, an organization overlook the importance of physical security of the network most of the time. Physical security of a network is all about protecting the components of the network including equipment and the people who use the network. Physical security is more focused on securing the most important part of an organization, the employees of the organization. Apart from that, it helps in dealing with security risks like insider attack, physical theft of data and strengthening the upper level security measurements.