Secure Computer System - Studies - Case Study Example

Only on StudentShare

Extract of sample
Secure Computer System - Studies

Fire detection is very crucial therefore fire detection appliances should detect the smallest indication of fire through sparks and temperature rise. Fire suppression equipment need to be installed and should suppress the fire without damaging the server equipment. Water sprinklers are the most common fire suppression equipment. It would be better to consider other options like the use of carbon dioxide fire extinguishers (Nash, 1997, pg 23). Heating, ventilating and air conditioning as well as climate control equipment should be kept separate from the rest of the room to avoid damaging the network equipment. I would not place the ventilation equipment overhead because it would risk the server. The switch for the equipment would be placed inside the room to prevent accidental switching.
Proper power at the right quality should be regulated through the use of power protection equipment. By use of reliable power supply and surge protection equipment, the power will be kept at the desired quality. Power should be safe and reliable and should not fluctuate often. The space for the equipment should be adequate enough to allow for future expansion. ...
Download paper


Factors considered when converting a section of general office space to server room; firstly, the walls should not be close to exterior walls which could be damp because of containing water. Exterior walls are subject to be blown by strong winds. For doors, I would pick an interior area and make doors with sizes large enough to pass the LAN equipment…
Author : jimmy04

Related Essays

Secure Computer Systems Essay
The press release from OCABR made it amply clear that the new amendments are to be applicable to all the big and small businesses that possess or have licensed personal information of any resident of Massachusetts (Mondaq Business Briefing, 2009). The primary purpose of these amendments is to upgrade the existing data security standards, while taking into cognizance the emerging risks to data, to bring them in consonance with the Federal Trade Commission's Safeguard Rule (Mondaq Business Briefing, 2009). This risk-based approach to data security takes into consideration the overall size and...
6 pages (1506 words) Essay
Computer Science-Information System
in the case of industrial espionage or actions on the competitors' side) or inadvertent. Anyway, uncontrolled distribution of private information (especially about customers, e.g. card numbers, addresses, orders, business transactions, etc.) will result in withdrawal of customers and business partners, numerous lawsuits, and reducing revenues and profits. Therefore, often companies try to protect own information systems at the expense of employees privacy. This is a part of computer crime prevention measures with usage of specialized encrypting and authentication hardware and software,...
3 pages (753 words) Essay
Computer Science Information System
Solution: This system provides with user inputs to a large variety of questions to analyze their needs and future goals to get them the best they desire. Constant monitoring is a very important activity.
3 pages (753 words) Essay
Computer Information System
Organizations can't survive with working in international markets with out the help of databases and computers. In an environment where competition is tough they need to carry on communications with the help of computers and keep records on databases.
3 pages (753 words) Essay
Secure Computer System
Firewalls are the most common security measures for computer networks. Certain mechanisms are put in place in order to provide adequate security to protect resources on the trusted network against potential access by attackers. There are numerous mechanisms in network security, one of which is the DMZ or Demilitarised Zone. DMZ is a network which is semi-protected and is common to medium scale to large scale enterprise (Pickering, 2009).
3 pages (753 words) Essay
Got a tricky question? Receive an answer from students like you! Try us!