Answer: Hello some parts of your question is missing below is the missing part
Aim Higher College has two primary datacenters on campus—the research datacenter and the business datacenter. Due to budget and space limitations, the research datacenter is also used to house the backup systems for the business datacenter, resulting in business data being stored in both locations.
The research datacenter, shown in the diagram below, is typically left unlocked, as many students and faculty members use it for their work. The network infrastructure is not monitored, and the systems themselves are not required to be secured.
Recently, signs of after-hours access have been found in the research datacenter. Doors have been left open, lights have been on, and logins have been found on research systems. Logs indicate that local logins have been attempted on the business system consoles as well.
answer :
i) physical protection
ii) Continuous password review
Step-by-step explanation:
The controls that I would suggest are
i) Physical protection : There should be an increased presence of physical security in and around the premises of the Datacenter in order to reduce un-authorized access
ii) continuous review/change of passwords to limit/avoid signs during after- hours and also prevent Local logins as well.