Overview Organizations, including businesses and government agencies of all sizes, generate enormous amounts of information, much of which needs to be kept available and safeguarded. As a server...

1 answer below »

Overview


Organizations, including businesses and government agencies of all sizes, generate enormous amounts of information, much of which needs to be kept available and safeguarded. As a server (systems) administrator for PromisedLand.com, you will need to be able to implement physical security methods and concepts.


This project will train you for challenges that you will face in the workplace. Employers will expect you to apply your knowledge in daily situations; the real-world scenarios this course offers will give you that ability. As you fulfill these duties, we expect you to problem-solve quickly and ensure that the systems are stable and streamlined.


Instructions


Review the scenario below and write anexecutive summary

Download executive summary
that describes the physical security methods and concepts you envision for PromisedLand.com. Your executive summary should answer all of the questions and show evidence of completion of all the steps in the scenario. (Be sure to include any diagrams, screenshots, descriptions, or screen recordings requested in the scenario.) Finally, before continuing with this project, create a snapshot of your virtual server using VMware Workstation Snapshot Manager. This is for your own protection in the event that something happens to your virtual machine and you need a backup. (Review:

"How to take a VMware Snapshot"(Links to an external site.)
if you need guidance on how to accomplish this.)



Scenario #1 - Physical Security Methods and Concepts



  1. How would you envision PromisedLand implementing the use of a mantrap in their data centers? Include at least a one-paragraph explanation and create a diagram of your mantrap implementation.Review
    Hint: Ascend Education’s video - Security Concept I.

  2. Evaluate the surrounding environment where your computer resides and identifythree


    security controls that protect your computer from outside threats. Describe the findings of your evaluation in your executive summary.Review
    Hint: Ascend Education’s video - Security Concepts II.

  3. Evaluate and implement one additional multi-factor authentication on one of your personal accounts. (For example, your churchofjesuschrist.org, gmail or apple account.) Create a screen recording demonstrating the multi-factor authentication that you implemented and include a link to your recording in your executive summary.Review Hint: Ascend Education - Something you have, something you know, and something you are.

  4. Submit your executive summary in the assignment box on this page.


Grading


The instructor will grade the assignment using the following criteria.


Rubric

6.3 Prove: Physical Security Methods and Concepts (1)6.3 Prove: Physical Security Methods and Concepts (1)





































CriteriaRatingsPts
This criterion is linked to a Learning OutcomeThe student writes an executive summary that describes the Physical Security Methods and Concepts implemented for PromisedLand.com. The student uses a professional format and correct punctuation and grammar.5pts

This criterion is linked to a Learning OutcomeThe student includes a quality paragraph explanation and diagram of their mantrap implementation.5pts

This criterion is linked to a Learning OutcomeThe student includes a summary that identifies three security controls that protect their computer from outside threats.5pts

This criterion is linked to a Learning OutcomeThe student includes a link to their screen recording that demonstrates the multi-factor authentication they implemented.5pts

This criterion is linked to a Learning OutcomeCO 3 — Apply physical and network data security techniquesthreshold:0.0pts0pts

Answered Same DayFeb 12, 2022

Answer To: Overview Organizations, including businesses and government agencies of all sizes, generate enormous...

Neha answered on Feb 13 2022
124 Votes
Mantrap
The mantrap is used as the key component for securing the data center. It consists of the s
mall room which has two doors out of which one is connected with the unsecured area and the second opening is connected with the secured area. To get the access to the mantrap from either of the gate whether it is secured or unsecured it needs using the pass card. If the pass card of user checks out, then the door will unlock, and it will allow the user to enter into the mantrap. Once the user is inside it then the door will shut down quickly so that it can prevent tailgating which means having more than one person in the mantrap at the time. Once the door was shut the user can pass the card near the reader and the door to the secure area will get opened.
It is used as the small room which is present outside the data center, and it has only a single-entry door for the data center and the exit door to the non-secure area. It is used to provide limited access by permitting that one...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here