222k views
5 votes
You have been working as a security analyst in the information security department at Aim Higher College for two months. Your manager asks you to propose a set of controls that will allow the use of the research datacenter for its intended purpose while protecting the business systems that reside there. What controls would you suggest, and why

User Gallamine
by
5.1k points

1 Answer

7 votes

Answer: Hello some parts of your question is missing below is the missing part

Aim Higher College has two primary datacenters on campus—the research datacenter and the business datacenter. Due to budget and space limitations, the research datacenter is also used to house the backup systems for the business datacenter, resulting in business data being stored in both locations.

The research datacenter, shown in the diagram below, is typically left unlocked, as many students and faculty members use it for their work. The network infrastructure is not monitored, and the systems themselves are not required to be secured.

Recently, signs of after-hours access have been found in the research datacenter. Doors have been left open, lights have been on, and logins have been found on research systems. Logs indicate that local logins have been attempted on the business system consoles as well.

answer :

i) physical protection

ii) Continuous password review

Step-by-step explanation:

The controls that I would suggest are

i) Physical protection : There should be an increased presence of physical security in and around the premises of the Datacenter in order to reduce un-authorized access

ii) continuous review/change of passwords to limit/avoid signs during after- hours and also prevent Local logins as well.

User KarlM
by
5.4k points