Evaluate the physical security infrastructure

Assignment Help Computer Network Security
Reference no: EM13860461

Assignment - Homework

We can't forget about physical security! After reading through the SANS Physical Security checklist attached here, evaluate the physical security infrastructure at your school or place of business. You don't have to use the entire SANS document if you find elements that don't apply. If you don't work, and don't reside in Bellevue, NE., you'll need to find a place of business to evaluate. Be sure to observe door locks, suspended ceilings, HVAC ducts, exposed door hinges on server closets, lighting, cameras, etc. Using a scale of 1-10, give the environment a grade. Why did you award this grade? What specific improvements would you recommend? Put your findings in a single document and attach it to this assignment.

Note: While the SANS checklist might not fully apply to the environment you are assessing, it's a great place to start!

Assignment - Continuation of Cipher Lab (Discuss ciphers in Cipher Discussion Forum)

You deciphered the given message on the worksheet and then posted your own to the Cipher Discussion Forum in the Discussion area. For this week, take two or more ciphers and try deciphering them based on the tools from the webpage on the worksheet.

https://rumkin.com/tools/cipher/

Don't post the answers, but just post a reply to the originator's thread and say you figured it out. Then, send them an email or IM that gives your answer to the cipher. Originators need to respond to each "I figured it out" message with a reply saying that the cipher try was correctly identified.

(For instance: Student A posts a reply saying "I figured it out" and sends me a message with the answer. I reply to their "I figured it out" post and with "Student A got it correct" and any other information that is necessary. If many students have trouble, you may have to provide more hints.)

The Cipher Discussion Forum will be graded following the academic week. You receive up to 20 points for your minimum two cipher tries and replies. Look for the grades to appear in the online grade book following your academic week.

Participation is a part of this lab grade. Since there is a little back and forth on this lab, don't wait until the last minute!

Research Paper Assignment - Milestone 3 - Outline and References (Attach the Document to this Assignment)

The Research Paper outline and reference page is due this week. Make sure you have read through the Research Paper Overview in the Research Paper folder. Both documents could change as you write your paper, but you should have some of it fleshed out now. When you submit your final paper, you should have 6-10 references that don't include the course text or Wikipedia. (They can be included, but not in your 6-10 required references.)

Submit the outline and reference pages in a single Word document by attaching it to this assignment using the link provided. Ensure you're using standard formatting for class papers for these documents. Any misspellings or grammar issues will result in deductions from the total score.

Reference no: EM13860461

Questions Cloud

Using detailed cash-flow information : 1.Using detailed cash-flow information, a financial analyst claims to be able to spot companies that are likely candidates for bankruptcy. The analyst is presented with information on the past records of 15 companies and told that, in fact, 5 of thes..
What is the organizations current business model : Write a 1,000-word narrative discussing the fiscal detail of the plan and the assumptions that were used in developing the projected budget.
The strength of the u.s. economy : What are expectations regarding the strength of the U.S. economy in the next 2 years?
Why might deflation create problems for an economy? : According to Keynes, why might deflation create problems for an economy?
Evaluate the physical security infrastructure : Evaluate the physical security infrastructure at your school or place of business - We can't forget about physical security! After reading through the SANS Physical Security checklist attached here, evaluate the physical security infrastructure at ..
What risks are created or intensified by given differences : How does the liability maturity structure of a bank"s balance sheet compare with the maturity structure of the asset portfolio? What risks are created or intensified by these differences?
Escape fire-the fight to rescue american healthcare : The questions below should be answered completely and carefully. Refer to the 'Escape Fire Bb Upload' document for statistics and other information which may help you to formulate your answers.
What is the break-even point in dollar sales volume : Advertising expenditures will be $80,000, and $55,000 will be spent on distribution. If the product sells for $12, what is the break-even point in units? What is the break-even point in dollar sales volume?
How would economic theory apply to conservation efforts : How would economic theory apply to conservation efforts towards water conservation? Can you identify how opportunity cost of use fits into water consumption?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Find a sample phishing email

Use Google to find a sample phishing email which there are many of on the Internet

  Use a balanced scorecard system

Why is it reasonable to use a balanced scorecard system to measure staff performance? How does this approach mitigate concerns about measurement dysfunction?

  Root certificate authority and an intermediate ca

Is a cryptographic hash function/digest considered encryption - explain three vulnerabilities from the latest Open Web Application Security Project (OWASP).

  Most difficult type of cyber attack to defend against

Consider how this information could be used by an organization for its security program. Was anything surprising to you - Post a message to the forum regarding your experience with any of the cyber attacks described in the text.

  Future threats to network security - research paper

Deliver a research paper and presentation based on your research - Future threats to network security and planning for those threats

  It security audit planning

Use the Web to conduct research on IT Security Audit Planning. Write a report which explains the Scope Definition

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Write a succinct policy statement specifying employee

Summarize the primary vulnerabilities and potential threats that exist for GCI related to the practice of storing sensitive data on laptops. In your opinion, which of the risks GCI faces are most significant to the company?

  Explain advantages about solution of type of key

At ABC Institute, researchers are unsure about type of key (Asymmetric or Symmetric) to be used. Formulate possible solution and explain advantages and disadvantages of any solution employed.

  Explain the difference between the client and the server

What is the difference between the client and the server. What is the difference between server-side and client-side scritping? Why are they separate

  Tools and techniques used to impact web applications

Tools and techniques used to impact web applications. What are some of the motivations behind these attacks

  Design such a password protocol and evaluate its usability

An increasingly common mechanism is to ask for several pieces of security information rather than one. A call center might ask not just for your mother's maiden name, a password, and the amount of your last purchase, but also your dog's nickname a..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd