Concept explainers
a)
Explanation of Solution
Walls and Doors:
Walls and doors act as the obstacles and prevent form stealing resources or information...
b)
Explanation of Solution
Access Control:
Access control is categorized into two. They are:
Physical access control: The objective of physical access control is to guard the physical resources of a particular organization. The physical resources may be people, systems, hardware and so on.
Logical access control: The objective of physical access control is to guard the critical data that could be taken by an intruder without accessing physical devices. They are technology-based control that includes intrusion detection system, antivirus software, and firewalls.
Factors considered for the server room:
The organization will consider many security controls to protect their resources and precious data...
c)
Explanation of Solution
Fire detection:
Fire detectors are used to find out the phenomena resulting from fire like, smoke, gas, ultraviolet radiation, infrared radiation, etc. By using fire detectors, it is possible to save lots of lives and protects assets in an organization...
d)
Explanation of Solution
Fire suppression:
- Fire suppressor is used to eliminate fire from particular areas. They are of portable and manual types. Mostly portable extinguishers are more efficient for smaller fire.
- Fire suppression system quells fires by eliminating either oxygen or fuel, or it reduces the temperature.
- Fire extinguishers usually contain carbon-di-oxide that eliminates oxygen supply. It might harm living beings so they are not used in residential areas...
e)
Explanation of Solution
Heating, Ventilating, and air conditioning:
Heating, ventilation as well as air conditioning system could have impact on operations of
f)
Explanation of Solution
Power quality and distribution:
In order to avoid power quality, proper UPS should be used. They act as a backup power supply for computers. The powering capacity of UPS is usually measured in volt-ampere. A normal computer uses 200 VA and during interruptions or power fluctuations, it gets efficient power supply from UPS which provides up to 1,000 VA...
Trending nowThis is a popular solution!
Chapter 9 Solutions
Principles of Information Security (MindTap Course List)
- Assume your company wants to build a server room that doesn't need any human involvement to operate. A lights-out server room is one that is devoid of lighting. What physical security measures would you put in place in that room?arrow_forwardAssume that your company intends to build a self-contained server room that can operate independently of human intervention in order to accomplish its goals. The term "lights-out server room" refers to a server room that does not have any lights. Describe the many kinds of physical safeguards that you would put in place in that room.arrow_forwardAssume your company is intending to install an autonomous server room that runs without human intervention. A lights-out server room is a term used to describe such a space. Describe the type(s) of fire suppression system(s) you'd put in that room.arrow_forward
- Assume your business plans to set up a server room that operates on its own and without assistance from humans. Such a room is referred to as a lights-out server room. What kind(s) of physical security measures would you install in that room?arrow_forwardLet's imagine your organisation is interested in designing a self-sufficient server room. A server room is said to be "lights-out" when all of the lights have been turned out. Just describe the locks and alarms you would install on the doors and windows.arrow_forwardLet's pretend your company wants to build a server room that can run itself with no help from other employees. A lights-out server room is one in which the equipment is kept in complete darkness. Specify what kind of locks, alarms, and other physical precautions you'd put in place to keep the space secure.arrow_forward
- Think about the approach for recovering from a crisis from every angle. What are the key differences between a backup plan for a mobile device and a backup plan for a desktop computer?arrow_forwardHow do you characterize the threat from the point of view of the underlying network/operating system architecture? I was wondering if you could provide any examples of hazards that people face in the actual world.arrow_forwardConsider the steps you might take in the event of a catastrophic event. What are the primary distinctions between a backup system that is permanently installed and a backup solution that can be moved around with a computer?arrow_forward
- What exactly does it mean when someone claims they have "system security," and how can you know whether they are telling the truth?arrow_forwardConsider all aspects of a contingency plan. What distinguishes a mobile backup plan from a backup plan for a personal computer?arrow_forwardThink about the idea of a computer system that can't be broken. Do we need a rescue manager for this infrastructure? If so, why?arrow_forward
- Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning