Secure Computer System - Case Studies

Masters
Case Study
Miscellaneous
Pages 11 (2761 words)
Download 0
Factors considered when converting a section of general office space to server room; firstly, the walls should not be close to exterior walls which could be damp because of containing water. Exterior walls are subject to be blown by strong winds. For doors, I would pick an interior area and make doors with sizes large enough to pass the LAN equipment…

Introduction


Fire detection is very crucial therefore fire detection appliances should detect the smallest indication of fire through sparks and temperature rise. Fire suppression equipment need to be installed and should suppress the fire without damaging the server equipment. Water sprinklers are the most common fire suppression equipment. It would be better to consider other options like the use of carbon dioxide fire extinguishers (Nash, 1997, pg 23). Heating, ventilating and air conditioning as well as climate control equipment should be kept separate from the rest of the room to avoid damaging the network equipment. I would not place the ventilation equipment overhead because it would risk the server. The switch for the equipment would be placed inside the room to prevent accidental switching.
Proper power at the right quality should be regulated through the use of power protection equipment. By use of reliable power supply and surge protection equipment, the power will be kept at the desired quality. Power should be safe and reliable and should not fluctuate often. The space for the equipment should be adequate enough to allow for future expansion. ...
Download paper
Not exactly what you need?

Related papers

Secure Computer System - Case Studies
Fire detection is very crucial therefore fire detection appliances should detect the smallest indication of fire through sparks and temperature rise. Fire suppression equipment need to be installed and should suppress the fire without damaging the server equipment. Water sprinklers are the most common fire suppression equipment. It would be better to consider other options like the use of carbon…
Computer Security
One study was done by a group of academicians. The second study was done by computer security professionals. One is a seminal work carried out by Farzeneh Asghapour, Debin Lin and Jean Camp (2007) in assessing the indirect and implicit use of mental models applied to computer security. Asghapour et. al., (2007) did three experiments which revealed corresponding results. First, the experiments…
Secure Computer Systems Essay
The press release from OCABR made it amply clear that the new amendments are to be applicable to all the big and small businesses that possess or have licensed personal information of any resident of Massachusetts (Mondaq Business Briefing, 2009). The primary purpose of these amendments is to upgrade the existing data security standards, while taking into cognizance the emerging risks to data, to…
Computer Science-Information System
in the case of industrial espionage or actions on the competitors' side) or inadvertent. Anyway, uncontrolled distribution of private information (especially about customers, e.g. card numbers, addresses, orders, business transactions, etc.) will result in withdrawal of customers and business partners, numerous lawsuits, and reducing revenues and profits. Therefore, often companies try to protect…
Computer Science Information System
Solution: This system provides with user inputs to a large variety of questions to analyze their needs and future goals to get them the best they desire. Constant monitoring is a very important activity.…
Computer Information System
Organizations can't survive with working in international markets with out the help of databases and computers. In an environment where competition is tough they need to carry on communications with the help of computers and keep records on databases.…
Secure Computer System
Firewalls are the most common security measures for computer networks. Certain mechanisms are put in place in order to provide adequate security to protect resources on the trusted network against potential access by attackers. There are numerous mechanisms in network security, one of which is the DMZ or Demilitarised Zone. DMZ is a network which is semi-protected and is common to medium scale to…