Physical Security Best-Practices for IT Data Centers

timer Asked: Oct 20th, 2018
account_balance_wallet $9.99

Question Description

Need a research paper on Physical Security Best-Practices for IT Data Centers and can include Safety, Hardware, Software, Risk Assessment and/or Policies/Procedures

Using the topic above, write a research paper which includes between 5 and 10 References/Cited-Works(a majority dated 2015 or newer) of which 2 must be Peer-Reviewed. Highlight the Peer-Reviewed works (in Yellow) on the Reference/Works-Cited last page.

This research paper should be approximately 10 double-spaced pages (but must be at least 5 pages),using
12-font Times-Roman or Calibri-Body. The Cover Page, Reference Page and any space needed for pictures/images are not included in the required pages.

Once the paper is completed, add an Overview/Executive Summary to the start of the paper. The Overview must contain at least one Hypothesis(see Rubric) and a Synopsisof what is contained in the paper. For this paper, a Hypothesis is a statement you believe to be true based on the research you conducted. As an example: “Small businesses are less likely to provide adequate physical security”.

The quality and thoroughness of the paper, as defined in the rubric, will determine the grade assigned. Papers containing the minimum number of references and/or minimum number of pages will most likely not earn a high grade.

Other sources include:

Academic Search Complete Google Scholar ERIC
ProQuest Dissertations & Theses ACM Digital Library IEEE Xplore
Computing Research Repository (CoRR) Microsoft Academic CiteSeerX
Find White Papers ScienceDirect
Web of Science (and InCites ESI & JCR) Computers & Applied Sciences Complete
Computing Database (1998-current) Homeland Security Digital Library

Tutor Answer

School: University of Maryland

please find the attached file. i look forward to working with you again. good bye
sorry send the draft


Physical Security Best-Practices for IT Data Centers




The essence of the paper will be to address the best-practices that may be employed in the
protection of physical security at data center. In doing so, the paper will address the vitality of
physical security at data centers whilst providing some of the best practices that may be
employed in the plight to safeguard databases. As such, the paper will address specific elements
of the aspects therein such as access control, operational status of the data system,general
system, system interconnections/information sharing, related laws/regulations/policies, minimum
security controls, management controls, awareness and training (operational controls category),
configuration management (operational controls category), technical controls, access controls
(technical controls category) and the audit and accountability (technical controls category).
Assessments of the critical data are supposed to be strengthened and improved. The root of the
problem can be determined by analyzing the intent of the intruders. Data centers in this regard
have to be assessed too owing to the fact that they often seek to focus on the nexus of data that is
critical to an organization are often found in data centers.
Importance of physical security at data centers
There are numerous stories that delve into the breach of systems in contemporary society,
that make news and perhaps it is imperative that assessments of the critical data are strengthened
and improved. it is imperative to address the root of the problem by analyzing the intent of the
intruders. For instance, it is more important to ask whether the intent of the intruder s is to solely
assess data stored by organizations that are in essence critical and that may be imperative to
safeguard from the public (Wise, 2018). Data centers in this regard have to be assessed too
owing to the fact that they often seek to focus on the nexus of data that is critical to an
organization are often found in data centers. The data centers are expected to accommodate



physical security even in the event that the infrastructure has shifted to the cloud. Databases have
to be safeguarded owing to the fact that they control the physical security. As such, protecting
data centers from physical theft are one incentive in this regard.
For instance, video surveillance systems are often regarded as the systems that are
supposed to be set and most often than not forgotten until it is necessary. In the event that an
incident happens, the only resolve at that juncture is to assess the data of consequence that may
have been recorded by the surveillance cameras in such a manner as to assess the truth of the
predicament as it had unveiled (Wise, 2018). As such, video surveillance is often implored by
many institutions, companies, and organizations as part and parcel of their data center physical
security tools but even amid its importance the video cameras are often ignored and neglected.
Cameras may become clouded or obstructed and the timings are not accurately set. Additionally,
the running of the systems are based on the operating systems that are old and at their end-of-life
whilst the systems mandated with thetas of storage are often short and do not retain the videos
for the desired length.
Access control to information begins with administrative access control. Administrative
access control entails the administrator or owner of information setting policies for access of
information. These policies limit access to the information as well as the alteration of the
information and hence enhance confidentiality and integrity. Administrative policies include the
access control modules applied by organizations (White, Fisch, & Pooch, 2017; Ciampa, 2012).
The Biba Integrity Module is one such access control used and contains integrity levels for the

flag Report DMCA

Tutor went the extra mile to help me with this essay. Citations were a bit shaky but I appreciated how well he handled APA styles and how ok he was to change them even though I didnt specify. Got a B+ which is believable and acceptable.

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors