Principles of Information Security
5th Edition
ISBN: 9781285448367
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Course Technology
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 9, Problem 1E
Program Plan Intro
Server room:
According to the given scenario, the server room is automated that is, if functions without humans. Such type of automated server rooms is also called as lights-out server rooms.
Control systems that are suggested to install in server room:
Some of the control-systems that are suggested for lights-out server room are as follows:
- Fire detection system and Fire suppression system
- Lock
- Burglar alarm
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
A factory manager has hired your company to develop and install a surveillance system in a factory. The system includes cameras small enough not to be noticed. Supervisors and security personnel can view images and record audio in real-time on monitors in a control room. The system will also store video. The factory manager has not disclosed the placement locations for the new system. The factory manager says the purposes are to watch for safety problems and for theft of materials by workers. What issues, specifications, and policies will you discuss with the factory manager or your company? What would you do?
1) Who are the skateholders?
2) What are the risk, issues, problems, and consequences?
Think about everything while planning for a calamity. How does a mobile backup system vary from a standard computer backup system?
Let's imagine your organisation is interested in designing a self-sufficient server room. A server room is said to be "lights-out" when all of the lights have been turned out. Just describe the locks and alarms you would install on the doors and windows.
Chapter 9 Solutions
Principles of Information Security
Ch. 9 - Prob. 1RQCh. 9 - Prob. 2RQCh. 9 - Prob. 3RQCh. 9 - Prob. 4RQCh. 9 - Prob. 5RQCh. 9 - Prob. 6RQCh. 9 - Prob. 7RQCh. 9 - Prob. 8RQCh. 9 - Prob. 9RQCh. 9 - Prob. 10RQ
Ch. 9 - Prob. 11RQCh. 9 - Prob. 12RQCh. 9 - Prob. 13RQCh. 9 - Prob. 14RQCh. 9 - Prob. 15RQCh. 9 - Prob. 16RQCh. 9 - Prob. 17RQCh. 9 - Prob. 18RQCh. 9 - Prob. 19RQCh. 9 - Prob. 20RQCh. 9 - Prob. 1ECh. 9 - Prob. 2ECh. 9 - Prob. 3ECh. 9 - Prob. 4ECh. 9 - Prob. 5ECh. 9 - Prob. 6ECh. 9 - Prob. 1CEDQCh. 9 - Prob. 2CEDQCh. 9 - Prob. 1EDM
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- How do you characterize the danger from the vantage point of the network/operating system? What are some actual life examples of hazards, too?arrow_forwardLet's imagine your organization is interested in designing a self-sufficient server room. A server room is said to be "lights-out" when all of the lights have been turned out. Just describe the locks and alarms you would install on the doors and windows.arrow_forwardYou can be building a server room that is completely self-contained and does not need any human involvement. The term "lights-out server room" refers to a server room with no lighting. Consider the physical security measures you would put in place.arrow_forward
- Let's imagine that your organisation has decided to construct a server room that is capable of operating totally on its own. When there is no lighting present in a server room, we refer to it as being "lights-out." Just specify what type of locks and alarms you would place on the doors and windows to protect yourself and your belongings from potential intruders.arrow_forwardLet's pretend your company wants to build a server room that can run itself with no help from other employees. A lights-out server room is one in which the equipment is kept in complete darkness. Specify what kind of locks, alarms, and other physical precautions you'd put in place to keep the space secure.arrow_forwardDesign a wireless network with firewall security implementationarrow_forward
- An incident response plan is a set of procedures and responsibilities for an organisation in the event of a cyber-related disruption, such as a phishing attack or a data breach. A XYZ company employee unintentionally downloaded malware onto their system after clicking on a phishing email. The malware was able to spread to other network systems, allowing the attackers to steal sensitive data from the company's servers. As the team lead of a Computer Incident Response Team (CIRT) of the XYZ company, create an incident response plan to assist the company in effectively responding to and managing the incident as indicated above, minimising damage and downtime, and restoring normal operations as soon as possible. Your proposed plan must incorporate SANS Structured Six Steps with appropriate technology services and user management strategies, to address the following three conditions: Before attack for preparation (5%) During attack for identification (5%) After attack for response (5%)arrow_forwardSubject: Software Engineering You are designing an intrusion detection system (IDS) to prevent theft at a bank occupying a 60-floor downtown Chicago building. IDS interfaces with motion sensors located both inside and outside of the building as its only means of sensing intrusion. IDS must satisfy the following: Ensurethat a police officer arrives at the location of any intrusion quickly; Makeany intruder run away quickly; Ensure that a maintenance worker arrives at the location of any failed sensor quickly. Question Re-write each of these as an effective requirementarrow_forwardLet's say your company wants to build a server room that can run completely independently of any human intervention. A lights-out server room is one in which the equipment is kept in complete darkness. Give details on the various locks and alarms you'd set up to keep everyone out of that room.arrow_forward
- Network/OS-only environments define "risk" differently. Are there any specific dangers?arrow_forwardSubject: Software Engineering You are designing an intrusion detection system (IDS) to prevent theft at a bank occupying a 60-floor downtown Chicago building. IDS interfaces with motion sensors located both inside and outside of the building as its only means of sensing intrusion. IDS must satisfy the following: Ensurethat a police officer arrives at the location of any intrusion quickly; Makeany intruder run away quickly; Ensure that a maintenance worker arrives at the location of any failed sensor quickly. Questions: Specify a minimal set of signals to support the C-C-I and H-C-I of IDS and its partners. Use pseudo-code to show the operation of the system.arrow_forwardSubject: Software Engineering You are designing an intrusion detection system (IDS) to prevent theft at a bank occupying a 60-floor downtown Chicago building. IDS interfaces with motion sensors located both inside and outside of the building as its only means of sensing intrusion. IDS must satisfy the following: Ensurethat a police officer arrives at the location of any intrusion quickly; Makeany intruder run away quickly; Ensure that a maintenance worker arrives at the location of any failed sensor quickly. Questions: Specify a minimal set of signals to support the C-C-I and H-C-I of IDS and its partners. Use pseudo-code to show the operation of the system. Note: If you are writing a question by hand, the font should be cleararrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Systems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning