You are the IT manager of a small 20-employee technology company that recently won a contract with the Department of Defense. In order to begin work on the contract you must ensure you can protect and...

1 answer below »

You are the IT manager of a small 20-employee technology company that recently won a contract with the Department of Defense. In order to begin work on the contract you must ensure you can protect and safeguard information provided by the government. The company CEO has asked you to prepare a report on the physical security measures you would implement at the company and describe the threats the controls are mitigating against.


Your well-written paper should meet the following requirements:



  • Paper length: 2-3 pages in addition to required cover and references pages.

  • Include two external references in addition to the textbook.

  • Format the entire paper according to the CSU-Global Guide to Writing and APA.



Answered Same DayDec 25, 2021

Answer To: You are the IT manager of a small 20-employee technology company that recently won a contract with...

Robert answered on Dec 25 2021
106 Votes
Protection of sensitive information related with the department of defense of government as
stated under the contract is achieved by employing the multi layered techniques with different
measures (Shinder, 2
017). Defense in depth mechanism is required to be deployed to control
and measure the physical security for the information of department defense. The layers of the
security measures must have the following elements.
 The security measures to help in detection, tracking and monitoring the attackers,
intruders, hackers.
 Measures related to the mechanism for the access control and locking.
 Measures associated with the active barriers to prevent the progression of the adversaries
to access the information or information system components.
 Measures related with the implementation of robust and efficient methods by tools and
technologies to protect the sensitive and vital information.
 Security measures of the administrative command and control to ensure the maximum
protection of organizational information and information system.
 Measures and assessment methodology control for incidence and responsive action to
protect the damage of the information system assets.
 Security measures by personnel to cover the people security associated with the
organization and its information system devices and components.
 Physical security measures for the natural causes that damage the information system
devices and components.
These all mentioned security measures are considered for the information system of the
department of defense to optimize maximum protection of the information and information
system. To employ above mentioned measures of the physical security a security plan for
deployment with threats and its control and mitigation techniques (Vacca, 2013).
1. Threats of information hacking
The central information system such as servers and other information system associated
components are required to be locked. The servers room must be locked with good locking
system. A planned policies must be enforced to handle the servers...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here