Information technology
Information technology
Respond to this post agree or disagree.Due to the importance of the System/Application level and the fact that it house most of an organization’s data. As future security professionals it is our responsibility to protect this data at the same time we must uphold the A-I-C triad. The first thing that must be addressed is the physical access to the mainframe and other components connected. First, there should be locks on the doors. Whether the locks be padlocked, keys, pin access, or biometric there need to be some deterrent for a possible attacker. Also a fire suppression system to control fires within the data center. The proper HVAC to ensure the room has the proper levels of humidity and temperature as thee computers are high-capacity and produce more heat than compared to a normal cased computer. Firewalls should also be in place as these systems connect with the LAN and possible other networks and applications. The proper user control as well should be implemented to only allow authorized user’s access. I think a very important good practice technique would be to allow escalated privilege user connections that originate from protected Web servers where users can only connect using a secure VPN.Weiss, M. and Solomon M. (2011). Auditing IT Infrastructures for Compliance. In M. a. Weiss, Auditing IT Infrastructures for Compliance. Jones & Bartlett.
Is this the question you were looking for? If so, place your order here to get started!