Explore BrainMass
Share

Secure Computer Room

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

Provide a list of recommendations for establishing a secure computer room

Justify the recommendations by explaining how they conform to the requirements put forward in the Sarbanes-Oxley Act

Include the principles of separation of duties to determine who should be granted access into the computer room and the type of access they should have.

Include at least one reference

© BrainMass Inc. brainmass.com October 25, 2018, 1:52 am ad1c9bdddf
https://brainmass.com/computer-science/error-detection-correction/secure-computer-room-277875

Solution Preview

To establish a secure computer room, especially servers containing most of the important corporate data, here are 10 recommendations which can be implemented:
1. Implement a combination of electronic and mechanical lock system to the room. The combination of that type of lock provides better security against unauthorized access.
2. Use authentication methods that are harder to breach. Biometric authentication, such as fingerprint scanning and voice recognition provide better authentication than normal ID cards.
3. Have a security personnel positioned just outside the computer room. He/she will act as the first line of identification and authentication of the person who tries to access the room.
4. Provide logs during entry to be able to have a record of who entered the room and the time he/she entered in case there was an occurrence of information leak, data manipulation, or any issues that endanger the information's confidentiality and integrity.
5. Place ...

Solution Summary

This posting contains answers to the given questions.

$2.19
See Also This Related BrainMass Solution

Create a disaster plan

Create a disaster plan for "123 Textiles Corporation" that includes how you would recommend the company back up and protect network data. Your plan should be 1,250 to 1,500 words in length, and your recommendations must be based on the RAID system of data protection. Your plan must also address how the company should protect against natural disasters that might occur in the company's geographic location.

Include any charts, graphs, or visual components that are helpful in illustrating your plan.

View Full Posting Details