Preview

123 Textiles: RAID Configuration

Good Essays
Open Document
Open Document
628 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
123 Textiles: RAID Configuration
Unfortunately for 123 Textiles I cannot think of a RAID configuration that would protect them from what happened to them. RAID is to be used for redundancy in case of drive error or failure. It is a good thing that the backups are on an exterior drive since now data can be recovered (at least up until the day of the last backup) and business can go about steps to getting back up and running properly. It is understandable that some organizations must resolve to open their doors in areas that are high(er) in crime than other areas. This could be a matter of cost or a matter of geography. However, there should be measures taken to safeguard not only your commodities (i.e. employees, tools, hardware) but also your computer systems. If money is a major factor then I would recommend a few basic necessities. First I would recommend tamper proof windows. The kind that you see in some store fronts. It is clear just like glass but is much harder to break. I would also recommend more secure locks on the doors and windows. During business hours it may be necessary to keep some windows and some doors open. But after hours, each window and door should be locked securely so that intruders cannot get in. Alarm systems are widely found on doors. I would also have them installed on windows and have them set to be armed with the rest of the security system. The server itself should not be in an area where it is so easily accessible. The scenario isn’t all that in depth, so assuming the server is a stand-alone PC of sorts, it should be kept in an area that is away from the work area. For this situation a closet space that can be placed under lock and key would be a viable option. If the server is a larger unit that is (or should be) in a rack then I would recommend placing it in a room designated as a server room that is still under lock and key. The budget for the IT infrastructure is a concern, but regardless, core network components (such a server) should be protected and have that

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lock the servers into their own room with keycard or fingerprint access only. Only authorized IT staff shall have access. Management, vendors and all other authorized guest shall be escorted by an authorized IT staff member. Video surveillance should be maintained and monitored at all access…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    The following document outlines Richman Investments security measures for IT infrastructure. There are many components that make up the Richman Investments network, and so there should be a multi-layered security solution to protect it. The server room has been located in the central part of the building, and will be physically protected by electronic door locks with keypad combination access. There are a limited number of personnel who will have access to this room in order to decrease the potential for tampering. Each of these personnel will have their own access code, and a digital log will be kept of all access.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    When creating a multi-layered security plan, I would look at all seven domains of the IT infrastructure and then increase the security on each of those domains because that will increase the security for the whole plan. In the user domain, this is the quickest way for the system to be compromised the users. So I would implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will also need to be changed every 90 days and the same password cannot be used again for three calendar years. In the workstation domain, I would make sure that each workstations, whether desktop or laptop has some security on it like antivirus and malware protection installed. Laptops can be very vulnerable for loss or theft, which would make me install an encrypted hard drive so if it is stolen the data can only be retrieved by the owner. For the LAN domain, just train all users about email scams. I would guess that most users know not to access suspicious emails when on our system but I would still implement to the users a quick training course. Then I we should add spam filters this will help get rid of most of the junk email. In the LAN-to-WAN domain, we need to shut down the File Transfer Protocol (FTP) server we have running and switch it over to use secure FTP so that only users allowed on our system can access our FTP server. In the WAN domain, we need to make sure that we have firewalls set up on our network that will filter all incoming traffic. This firewall will stop all traffic coming on to our system that is not meant or not wanted our network. In the Remote Access Domain, we need to establish strict user password policies, as well as lockout policies to defend against brute force attacks, require the use of authorization tokens have a real-time lockout procedure if token is lost, or stolen. The last domain is System/Application domain we need to…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    A priority to the LAN domain is proper security of physical equipment. Only authorized personnel are allowed to gain access into...…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    First and foremost all files need to be encrypted and password protected. The Playstation Network was taken down easily because routers were left unprotected and the data belonging to users was not encrypted. Everything needs to be locked down digitally. Riordan conducts business in many places and hackers are everywhere. Finance and accounting use outdated systems and manually enter information. Integration of the systems through a secure pipeline will decrease the security risks but the files still need to be encrypted to secure ensure that all security holes are no longer open.…

    • 893 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    The reason is simple the company produces fertilizers and with in fertilizers is a highly sought after component by terrorists. This component is nitrates. The second factor I used to select the mitigation/avoidance technique is that some of the locations are in tornado ally and or near rivers and previously flooding areas. A transfer method in all regards if possible outsource what can be outsourced thru web services will be done so as it is the least costly most effective method of backup, off site location, redundancy, encryption and security available by type of function or service IE accounting, HR /Intuit, Web site, Training, email,…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    In the workstation domain, we need to make sure that each of the workstations, whether desktop or laptop, has antivirus and malware protection installed on them. Laptops are very vulnerable for loss or theft, so all company laptops should have an encrypted hard drive so that if they are stolen, the data contained on them is not recovered by anyone but the owner.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. I believe that this bag is the most appealing and suitable bag both for my client and punk theme. The size of this bag is perfect for my client, also it can be held as both a side bag and a hand bag, which were both my clients’ first choices. Also the bag is very interesting, simple and appealing, as it only contains two simple colours, but also has badges to make it look punky. Also this bag contains secret pockets both inside and outside the bag to keep the very important personal belongings, such as, money, mobile phones, etc. I believe that as long as a add a bit more components to this bag, it would be the perfect bag.…

    • 617 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Log files would be the first place one would look to check for suspicious activity in the event of a crime. They can help you understand where something went wrong. Creating a timeline, of before and after the performance problem or incident. The way traffic moves through a network, especially when the computers are only used for certain things, creates baseline behavior. When something is out of place, such anomalies seem suspicious; but legitimate traffic could be used in illegitimate ways and legitimate traffic can at times seem illegitimate. By consistently monitoring the network, and observing all the possibilities, the anomalies of legitimate traffic wont seem that abnormal and one can focus on the real problems. Predictable passwords that meet minimum length requirements but remain easily guessable is a hazard that could affect a network with a weak password. If that is a problem, one should probably change the password every so often. It would be in everyone’s best interest if the password security level was increased, and that they would expire after a certain amount of time. Removable storage devices that might contain malware, filtered only when passing through the network could be a problem but by limiting the privileges of users, adapted to the duties assigned to the individual. Making it clear that no removable storage devices are to be brought into the network under no circumstance unless necessary and properly screened first. If an unencrypted laptop with sensitive information was to fall in the wrong hands, it would be likely that there would be some sort of damage. To prevent that from happening it is important to encrypt the drives and other sensitive information, have a lockout procedure where you had to put the password in again after a certain amount of time or to view critical data, and to make sure that the device could be potentially monitored.…

    • 322 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Access Control Simulation

    • 698 Words
    • 3 Pages

    Cubicle 2-1 had a pre-approved offsite equipment request posted This should be secured to prevent an unauthorized person from stealing equipment. Both cubicle 2-1 and 2-2 had fingerprint scanners. Cubicle 2-3 had a locked file drawer and the computer was password protected as it locked after four attempts. Cubicle 2-4 did have a UPS but there was a flashdrive on the desk as well as login information on a post it note. Flashdrives should be encrypted and increased controls surrounding password/login information should be enforced. Password/login…

    • 698 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Kilgren Raid Analysis

    • 1341 Words
    • 6 Pages

    With the outbreak of the Civil War, a war between free states and slave states, it is to be expected that hostility amongst one another will intensify through a series of events. The Kilpatrick-Dahlgren Raid provoked more rage when the true intentions of the Union were revealed via the Dahlgren Papers. Proposed by Brigadier General Judson Kilpatrick and approved by the President Abraham Lincoln and his Secretary of War, Edwin Stanton, the raid’s purpose was to liberate approximately 12,000 Union prisoners held captive in Richmond and in a prison camp on Belle Island on the James River. The raid was initiated on the evening of February.28,1864 and ended on March.3,1864. During the raid, complications emerged causing the operation to be a failure.…

    • 1341 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    The commonly used secure location includes fireproof vaults. Offsite storage of critical backups is often necessary. Apparently, data storage in other areas apart from company’s branch office calls for initial investigations of the approach that will handle offsite storage.…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Better Essays

    This is a multi-layered security system that consists of the user’s domain. The user is the first and the weakest link in any system. The security is only as strong as the user’s ability to understand what can go wrong. We can implement a training program session for security awareness. Another security measure is to implement a policy to stop employees from bringing in CD’S, DVD’S, and USB’S or other personal devices into the work place that can connect to the network and possibly harming the system. The work station domain is where users first access the system, applications, and the data. The system should be password coded for authentication purposes. Applications and data ought to be monitored and permissions set accordingly. Downloading should also be limited to only those people with the proper permissions. The LAN domain is a collection of computers all connected to a central switch configured to run all of the company’s data. The LAN would have all the standards, procedures, and guidelines of all the users. I would insure all information closets, demark locations and server rooms are locked and secured at all times. Only those with proper ID or authorization would be allowed to access these locations. The LAN to WAN domain contains both physical and logical designs of the security appliances. For this layer you want to apply security protocols on file transfers, scans, and unknown files. The WAN connects the system to remote locations, such as other PC’s on your system i.e. the other 7 locations on our network. URL filters implemented on the system may ensure limited access to the web sites that are undesirable for business use. “The Remote Access Domain connects users to the organization’s IT infrastructure. Remote access is critical for staff members who work in the field or from home.” It is…

    • 775 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    221 - Use office equipment

    • 2807 Words
    • 12 Pages

    The computers have lots of important features. A lot of confidential information and documents are kept safe in protected electronic files on the computer such as PAS (patient attendance system). We also have intranet, which I mostly use to access…

    • 2807 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    to have a ‘local raid durbar’ for their local affairs; however, Cantlie was of the opinion that because the rights of the clans are so deeply fixed in the minds of the people, a change to a dorbar elected by all the people is not possible in the Khasi Hills except in the War area (Cantlie, 2008-09: 187-188). This indicates that a dorbar where the representatives are elected by all the people irrespective of clan affiliations, like the dorbar shnong of today, had never existed in the Khasi Hills in the past, except in the War area. These facts also suggest that the emergence of dorbar shnong and rangbah shnong in the localities of Shillong started with the demand of the immigrants to have what Cantlie called, a ‘local raid durbar’ of their own.…

    • 995 Words
    • 4 Pages
    Good Essays