Overview
Organizations, including businesses and government agencies of all sizes, generate enormous amounts of information, much of which needs to be kept available and safeguarded. As a server (systems) administrator for PromisedLand.com, you will need to be able to implement physical security methods and concepts.
This project will train you for challenges that you will face in the workplace. Employers will expect you to apply your knowledge in daily situations; the real-world scenarios this course offers will give you that ability. As you fulfill these duties, we expect you to problem-solve quickly and ensure that the systems are stable and streamlined.
Instructions
Review the scenario below and write anexecutive summary
Download executive summarythat describes the physical security methods and concepts you envision for PromisedLand.com. Your executive summary should answer all of the questions and show evidence of completion of all the steps in the scenario. (Be sure to include any diagrams, screenshots, descriptions, or screen recordings requested in the scenario.) Finally, before continuing with this project, create a snapshot of your virtual server using VMware Workstation Snapshot Manager. This is for your own protection in the event that something happens to your virtual machine and you need a backup. (Review:
"How to take a VMware Snapshot"(Links to an external site.)if you need guidance on how to accomplish this.)
Scenario #1 - Physical Security Methods and Concepts
- How would you envision PromisedLand implementing the use of a mantrap in their data centers? Include at least a one-paragraph explanation and create a diagram of your mantrap implementation.Review
Hint: Ascend Education’s video - Security Concept I.
- Evaluate the surrounding environment where your computer resides and identifythree
security controls that protect your computer from outside threats. Describe the findings of your evaluation in your executive summary.Review
Hint: Ascend Education’s video - Security Concepts II.
- Evaluate and implement one additional multi-factor authentication on one of your personal accounts. (For example, your churchofjesuschrist.org, gmail or apple account.) Create a screen recording demonstrating the multi-factor authentication that you implemented and include a link to your recording in your executive summary.Review Hint: Ascend Education - Something you have, something you know, and something you are.
- Submit your executive summary in the assignment box on this page.
Grading
The instructor will grade the assignment using the following criteria.
Rubric
6.3 Prove: Physical Security Methods and Concepts (1)6.3 Prove: Physical Security Methods and Concepts (1)
Criteria |
Ratings |
Pts |
---|
This criterion is linked to a Learning OutcomeThe student writes an executive summary that describes the Physical Security Methods and Concepts implemented for PromisedLand.com. The student uses a professional format and correct punctuation and grammar. |
|
5pts
|
This criterion is linked to a Learning OutcomeThe student includes a quality paragraph explanation and diagram of their mantrap implementation. |
|
5pts
|
This criterion is linked to a Learning OutcomeThe student includes a summary that identifies three security controls that protect their computer from outside threats. |
|
5pts
|
This criterion is linked to a Learning OutcomeThe student includes a link to their screen recording that demonstrates the multi-factor authentication they implemented. |
|
5pts
|
This criterion is linked to a Learning OutcomeCO 3 — Apply physical and network data security techniquesthreshold:0.0pts |
|
0pts
|
|