Discussion 3 physical vulnerability assessment of security

Assignment Help Computer Engineering
Reference no: EM133478284

Question: Discussion 3 Physical Vulnerability assessment of security perimeters of TechWorx.Assignment: Mr. Scott wants a Physical vulnerability assessment of the security perimeters of TechWorx.

Chapters 3.6 (Gupta and Goyal)
Chapter 4 (Fennelly)

Minimum Requirements:

  • Inside the Techworx building:
  • 1st-floor reception and access to stairs, elevators, loading dock, and restrooms
  • 2d floor offices and conference rooms
  • 3rd floor: Executive offices
  • 4th floor: IT Offices and data center
  • Define the three Perimeters (Outer, Inner, and Interior) for TechWorx and what are the key vulnerabilities of each of the perimeters. Note: In figure 2 below, there is no indication of an outer perimeter. You will need to create one for the organization.
  • What are the most critical areas/limited access areas that we should secure in the building?
  • Include at least one supporting figure, image, or diagram. (you may have more than one)
  • Ensure you address all three security perimeters.
  • What type of access control systems do you recommend for TechWorx and why? Note: I am not asking for a specific model and brand. At this point, we are just brainstorming what types of systems we will need.
  • Mr. Scott was very happy to hear about the NIST Cybersecurity Framework. He is anxious to get started on protecting TechWorx equipment and personnel. For this assignment only consider physical perimeters. We will cover computer/network (logical) perimeters in future assignments.

 

Reference no: EM133478284

Questions Cloud

Why don''t the states all just adopt the same type : Why don't the states all just adopt the same type of procedure for filing appeals that is used by the U.S. Supreme Court?
What type of research question is being asked : What type of research question is being asked? Did the study methods address the most important potential sources of bias?
Will a court allow the shareholder derivative suit to go for : When Clovis withdrew the drug from FDA consideration in 2016, the stock price plummeted. Will a court allow the shareholder derivative suit to go forward
Providing freshly baked bread and pastries : providing freshly baked bread and pastries to some of the city's best restaurants, cafes, and shops. Earlier, you had worked on optimising the firms cost
Discussion 3 physical vulnerability assessment of security : Discussion 3 Physical Vulnerability assessment of security perimeters of TechWorx.Assignment: Mr. Scott wants a Physical vulnerability assessment
What would be the likely decision : Should this matter go before the courts what would be the likely decision? Explain the reason for your decision, providing support with legal principles
What are the economic issues involved : What are the economic issues involved? Which economic theories or approaches best explain the issue? What are the statistical facts related to the issue?
Define what a pert diagram is relative to project planning : Define what a PERT diagram is relative to project planning and Explain the importance of a PERT diagram in a project plan
Identified threats described in scenario for this project : identified threats described in the scenario for this project, as well as any new threats that may have been discovered during the risk assessment.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd