Physical Sevurity tech support assignment help

Physical Sevurity tech support assignment help

  • Additional Background

    You have recently been hired as the CISO for Mega-Corp. You soon discover that the information assets of the various components of the organization have been allowed to develop as independent units, which has become increasingly expensive and inefficient. The board of directors has asked you to create a presentation for them to help them understand the concepts of physical security in general. They have also asked you to create a white paper that lays out a framework for your assignment, which is to design and construct an integrated data center which will be used to house all of Mega-Corp’s information assets.

    Part 1 – Physical Security Overview

    Create an 8–10 slide PowerPoint presentation in which you complete the following:

    • Describe the components of a physical and environmental security policy.
    • Describe the physical security controls, both technical and human, that are available for use in securing information assets.
    • Evaluate the impact of overlap between traditional guns, gates, and guards with the physical security domain of information security.
    • Explain the physical security related advantages and disadvantages of operating a centralized enterprise level data center.

    Part 2 – Data Center Design

    Write 3–5 pages in which you complete the following:

    • Define the necessary components and principles involved in the process of a secure data center design and construction specific to the case study organization.
    • Explain the concept of simplicity as a desirable characteristic in secure data center design and construction as a means of enhancing the existing environment within the case study organization.

    Additional Requirements

    • Written communication: Written communication is free of errors that detract from the overall message.
    • APA formatting: Resources and citations are formatted according to current APA style and formatting.
    • Length: 8–10 PowerPoint slides with detailed speaker’s notes where required; 3–5 page data center design.
    • Font: Times New Roman, 12 point.
Criteria Non-performance Basic Proficient Distinguished
Describe the components of a physical and environmental security policy.
Does not describe the components of a physical and environmental security policy. Describes incompletely or inaccurately the components of a physical and environmental security policy. Describes the components of a physical and environmental security policy. Describes the components of a physical and environmental security policy including the use of supporting examples.
Describe the physical security controls, both technical and human, that are available for use in securing information assets.
Does not describe the physical security controls, both technical and human, that are available for use in securing information assets. Describes incompletely or inaccurately the physical security controls, both technical and human, that are available for use in securing information assets. Describes the physical security controls, both technical and human, that are available for use in securing information assets. Describes the physical security controls, both technical and human, that are available for use in securing information assets including the use of supporting examples.
Evaluate the impact of overlap between traditional guns, gates, and guards with the physical security domain of information security.
Does not evaluate the impact of overlap between traditional guns, gates, and guards with the physical security domain of information security. Evaluates incompletely or inaccurately the impact of overlap between traditional guns, gates, and guards with the physical security domain of information security. Evaluates the impact of overlap between traditional guns, gates, and guards with the physical security domain of information security. Evaluates the impact of overlap between traditional guns, gates, and guards with the physical security domain of information security including the use of supporting examples.
Explain the physical security related advantages and disadvantages of operating a centralized enterprise level data center.
Does not explain the physical security related advantages and disadvantages of operating a centralized enterprise level data center. Explains incompletely or inaccurately the physical security related advantages and disadvantages of operating a centralized enterprise level data center. Explains the physical security related advantages and disadvantages of operating a centralized enterprise level data center. Explains the physical security related advantages and disadvantages of operating a centralized enterprise level data center including the use of supporting examples.
Define the necessary components and principles involved in the process of a secure data center design and construction.
Does not define the necessary components and principles involved in the process of a secure data center design and construction. Defines incompletely or inaccurately the necessary components and principles involved in the process of a secure data center design and construction. Defines the necessary components and principles involved in the process of a secure data center design and construction. Defines the necessary components and principles involved in the process of a secure data center design and construction including the use of supporting examples.
Explain the concept of simplicity as a desirable characteristic in secure data center design and construction.
Does not explain the concept of simplicity as a desirable characteristic in secure data center design and construction. Explains incompletely or inaccurately the concept of simplicity as a desirable characteristic in secure data center design and construction. Explains the concept of simplicity as a desirable characteristic in secure data center design and construction. Explains the concept of simplicity as a desirable characteristic in secure data center design and construction including the use of supporting examples.
Exhibit proficiency in writing and use of current APA style and formatting.
Does not exhibit proficiency in writing and use of current APA style and formatting. Exhibits a low level of proficiency in writing and use of current APA style and formatting. Exhibits proficiency in writing and use of current APA style and formatting. Exhibits a high level of proficiency in writing and use of current APA style and formatting.