We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Secure Computer System - Studies - Case Study Example

Comments (0) Cite this document
Factors considered when converting a section of general office space to server room; firstly, the walls should not be close to exterior walls which could be damp because of containing water. Exterior walls are subject to be blown by strong winds. For doors, I would pick an interior area and make doors with sizes large enough to pass the LAN equipment…
Download paper
Secure Computer System - Case Studies
Read TextPreview

Extract of sample
Secure Computer System - Studies

Fire detection is very crucial therefore fire detection appliances should detect the smallest indication of fire through sparks and temperature rise. Fire suppression equipment need to be installed and should suppress the fire without damaging the server equipment. Water sprinklers are the most common fire suppression equipment. It would be better to consider other options like the use of carbon dioxide fire extinguishers (Nash, 1997, pg 23). Heating, ventilating and air conditioning as well as climate control equipment should be kept separate from the rest of the room to avoid damaging the network equipment. I would not place the ventilation equipment overhead because it would risk the server. The switch for the equipment would be placed inside the room to prevent accidental switching.
Proper power at the right quality should be regulated through the use of power protection equipment. By use of reliable power supply and surge protection equipment, the power will be kept at the desired quality. Power should be safe and reliable and should not fluctuate often. The space for the equipment should be adequate enough to allow for future expansion. ...
Considerations for installing additional components and intrusion detection and prevention system should be taken into consideration (Shirley, 2008, pg 34).

Case Study Pg.432
Case exercise
Question 1 page 432
Based on the case study, what security awareness and training posters had an impact in this incident.

Pg.432 Question 1
In Amy's incident, the following security awareness posters and training documents may have contributed to it; posters requiring the immediate reporting of security problems, posters and documents requiring the practice of healthy computer security. Information and security tips on posters and documents. Company security policy documents also contributed to this incident.
The following topics may also have contributed to the incident, these are;
Password usage and management; this includes creation of passwords, frequency of changing the password and methods used in protection. Security training plays a pivotal and important role in preventing attacks on computer system by viruses, worms, Trojan horses, and other malicious code (Richardson, 2005, pg 2). More information that is needed in order to enhance information security is the creation of a policy poster indicating;
implications of noncompliance to information security
implications of receiving unknown e-mail/attachments
implications of people browsing certain prohibited websites during working hours
those allowed to use the web services and those who are prohibited and also stipulating penalties for those found breaching these rules and regulations
Data storage and backup; data storage systems maybe centralized or decentralized.
This information is placed on not only posters but also on, newsletters, ... Read More
Cite this document
  • APA
  • MLA
(“Secure Computer System - Case Studies Study Example | Topics and Well Written Essays - 2750 words”, n.d.)
Retrieved from https://studentshare.net/miscellaneous/274848-secure-computer-system-case-studies
(Secure Computer System - Case Studies Study Example | Topics and Well Written Essays - 2750 Words)
“Secure Computer System - Case Studies Study Example | Topics and Well Written Essays - 2750 Words”, n.d. https://studentshare.net/miscellaneous/274848-secure-computer-system-case-studies.
  • Cited: 0 times
Comments (0)
Click to create a comment
Human Resource Case Studies
The act protects individuals performing their jobs satisfactorily against discrimination by employers hiring 20 or more workers and labor organizations with 25 or more members. Zimpfer was 52 years old and, therefore, was under the protection of ADEA and should have been employed instead of the 33 years old Brad.
5 Pages(1250 words)Case Study
Disability Case Studies
These technologies aid learning process for several students with physical and mental impairments. They help students interact with their classmates in learning environments and place them at a level ground with children without disabilities. Assistive technology has caused an intense dissimilarity for countless students with serious physical injuries.
9 Pages(2250 words)Case Study
Case Studies Assignment
However, these two clinics differ in terms of health care provision and the costs of delivering services to the patients that frequent these establishments. The management style of both of these hospitals also differ in principles as one is keen on minimizing operational cost while the other has invested widely in order to ensure that they deliver quality.
4 Pages(1000 words)Case Study
Solve case studies
The company employs over seventeen thousand diverse workers across the world from different cultures, all of whom are expected to continuously innovate. Although they have a flat structure of management, their processes are structured with a tolerance for chaos and a consensus culture.
6 Pages(1500 words)Case Study
Case Studies: Altered Hematology & Cardiovascular System
The attending physician’s notes indicated a temp of 98 degrees F, an elevated heart rate and respiratory rate, and low blood pressure. Ms. A states,
4 Pages(1000 words)Case Study
Case studies
the diagnosis that as to whether the patient has lung cancer, he/she could have sought a second opinion there and then rather than holding the decision for two years. It could have been that the diagnosis could be unreliable in the first place and that the current medical
10 Pages(2500 words)Case Study
Study Case (computer Crime)
§ 2251(a); the sexual exploitation of children’s act (Jordan 120). The law protects children against sexual exploitation. In the case, the defendant is accused of possessing a computer hard drive, which
2 Pages(500 words)Case Study
Computer Forensics - Case Portfolio
Throughout the investigation process the legality and fairness has been maintained by engaging in best practices for evidence treatment. Various evidences have been gathered from the crime scene in order to judge that the
10 Pages(2500 words)Case Study
Computer Information System Case Analysis
I strongly agree that any business entity in this current world economy needs information to be able to run efficiently. The time and accessibility of the information is dependent on the systems
11 Pages(2750 words)Case Study
Case Studies
In addition, they chose wrong a person to make trades for the Bank because he turned out to be a rogue trader. Their lack of oversight made them realize the bank was running a loss
1 Pages(250 words)Case Study
Let us find you another Case Study on topic Secure Computer System - Case Studies for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us