Metropolitan IT infrastructure

User Generated

Wbqn

Computer Science

Description

Lab DATA in Motion/At Rest

1. Download and fill-out Chart ONE – Data at Rest (hold off on “what to do?” column response for now).
2. Download and fill-out Chart TWO – Data in Motion (hold off on “what to do?” column for now).
3. Go to Resource List for this lab (auxiliary document attached to this lab, along with charts): explore from this list several websites of your choosing, to find information on possible security vulnerabilities for your data; determine if you need to update what you put on the chart, in light of additional things you learned about the how, what, why of security breaches.
4. Next, fill out the “what to do?” column(s) in light of what you’re learning. Include links to the resources/sites that enabled you to figure out what could be done. Be specific.
5. After doing steps 1-4, write a page response or roughly 250-words but no more than 400-words explaining outcomes in narrative form (rather than chart).
6. Underline informational thesis, in which you explain/specify what you learned from this information mapping process about data vulnerabilities in this lab.
7. Include in your response some consideration of how the proposed initiative for your group project leaves you with any concerns or questions about data breaches or security threats, which might make stakeholders distrust your respective group project initiative and could turn into a hidden cost.
8. NOT PART OF WORD COUNT BUT PART OF THE LAB: a short reflection on what you learned and if anything posed difficulties or surprised you in the process of fulfilling this lab.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

[Type here]

INFORMATION MAPPING -- DATA AT REST
What is it?

Where does it reside?

Who can/does access it

How sensitive is it?

Likely threats

Workstation
Oracle Server

Server room

System Administrator
Director

Every user
requires to be
verified for its
usage

Hacking
Data alteration

Desktop
Applications
Java applet apps
Windows apps

Office
Server room
Backed up over
internet

Me
Director
IT professionals

Can easily be
stolen and can
their OS can easily
crash

Virus
Crashing

Fingerprint access controls
Biometric access controls
Firewalls

Computer
Dell

Server room

Network Admin
Secretary

Easily stolen or
hacked into when
an intruder access
the passwords

Stealing
Crashing
Attack by virus

Install antivirus
Install alarm systems

Big data
Cloud-computing

Internet
Desktop application
Laptop
Servers

Google analytics
System admin

Hacked into if care
hasn’t been taken
Crashing

Hacked into

Install fire-walls
Strong passwords
Encrypted data

BYOD
Smartphones
iPads
laptops

Workplace
Android apps
iCloud

Apple
Me...


Anonymous
Excellent! Definitely coming back for more study materials.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags