Computer Infrastructure and Security
The security of an information security company is not only related to the physical infrastructure such as premises but also of the network infrastructure set up for used by the company. Security threats in the wireless communication technology are just as real as the physical threats and at times even more dangerous because they are almost always unnoticed until damage is done. And that might just be a little too late to remedy the situation. As simple example is that of a company that uses wireless network for communication and data transfer without a simple security measure as password encryption. Intruders can easily penetrate such networks and plant malware or access sensitive company documents that are kept secret from the public. Reach out to us for more explanation of the above answers @ unemployed professors
In wireless communication networks, sometimes encryption is not enough. An aggressive intruder can still gain access. Companies that deal with highly classified documents such as departments in the government often prefer the wired connection to wireless. Hacking into such networks would often require a physical connection. This pushes security concerns to the state of the physical infrastructure such as buildings. While wireless connectivity offers mobility and flexibility in working conditions, it poses serious security concerns.
Need assignment help for this question?
If you need assistance with writing your essay, we are ready to help you!
Why Choose Us: Cost-efficiency, Plagiarism free, Money Back Guarantee, On-time Delivery, Total Сonfidentiality, 24/7 Support, 100% originality
Any information-based company would however need both set ups of networks for optimal, efficient and secure operations. Wired LAN networks are mainly used to for interconnecting workstations, databases and serves while the wireless connections are preferred less critical forms of communication.
In an information processing company, security is dependent on not only the security protocols of the networks laid out but also, the physical infrastructure. The physical infrastructure of the company has the role of preventing intruders or unauthorised personnel from physically getting in contact with the sensitive equipment. Physical infrastructural aspects that can be considered may include among others, the following, entrance to and from facility as well as the design of the premises. It is easier to break into a single-storey building than a multi-storey one. Single storey buildings mostly do not have enough security provisions. This is mostly because the cost of securing such a building is almost equal or higher than that required in the running of activities. Such premises would mostly rely on security provided by the authority such as government. Multi-faceted and multi-storey buildings on the other hand bank on their complexity as well as state-of-the-art technology for security. This section is well articulated by the unemployed professors
While the size of premises is related to security, accessibility is also to be considered. This is based on the simple fact that an infrastructure with multiple entrances and exits is easier to enter. And so is the design of the network infrastructure. Designing the structure of network to use in a company should be done painstakingly as a too complex structure would allow for loopholes for security breach and would be difficult to scale or upgrade. Accompanying the same is a good set of security guidelines or protocols.
The New Infrastructure and Network Design
Now with the addition of two more floors for the company building, would be easier to demarcate and separate concerns to not only improve security of information but also create conducive working conditions for employees. The three floors would be divided into;
- Space for housing data storage and network interfacing equipment.
This essentially would be the ground floor. It is more appealing and logical to have machinery and devices that aid in the running of the company located at the lowest level of the building. This is inspired by the fact that most full-fledged companies have their data centers offsite or otherwise located in basements or in structures underground that can’t be easily accessed. Furthermore, connections to external networks through gateways or links such as the fibre optic are better when done at the ground level. In terms of security, it is easier to guide the equipment when they are located on the lowest floor.
- Workstations space.
It’s on the first floor that all workstations would be situated. Majority of the employees working for the company would be here. The stations would be connected to an ethernet network emanating from the data center on the ground floor. Wireless network access points would also be availed on the floor. Routers would also be located here.
It is also more economical to have workstations directly above the data storage facility as less cost would be incurred in setting up the network. Shorter connecting cables would be used as opposed to when on a higher ground.
As a security measure, it is better to have floors with more workers near the ground level for easy evacuation in cases of emergency.
- Administrative offices.
The second floor of the premises would house offices of the CEO and company departmental heads as well as a conferencing room. An extension of the network existing on the first floor would also be here but would mainly serve overseeing purposes e.g database administration.
For managers, it is easier to supervise work from the higher floor. For instance, a manager coming to work slightly later is able easily check on the attendance of his juniors before heading to his office.
Company Security Policy
unemployed professors highlights that with the addition of two more floors and creation of better working environment, some ground guidelines are necessary in order to enhance the security of the company. Policies formulated would mainly aim at enhancing the three core objectives of an information systems security; confidentiality, integrity and availability (CIA).
Communication among workers within company premises shall be over the set up communication channels such as telephones. No one would be allowed to use their own communication devices for the same purpose while working. This would help guarantee secure communication among workers on issues concerning their jobs. Such communications can be easily encrypted to prevent sniffers from eavesdropping. Also, with regard to communication, workers shall be required to adhere to the non-disclosure and confidentiality agreement signed between each of them and the company; employee would be inhibited from engaging in conversions on matters of the company at all times outside the company premises.
All waste papers within the working environment shall be shredded and placed in a litter bin situated on first floor of the building where workstations are situated. Furthermore, no employee is allowed to leave with any form of written or printed work from the same floor. The company shall provide all the required materials for writing as well as printing and publication.
Access to the ground floor would be out of reach for all employees except technicians authorized by the company. And regarding accessibility, all workers would be required to use key guards issued to them by the company. No sharing of key guards would be allowed at any time.
Workers would be required to only work at their assigned workstations. Delegation of duties shall only be done by the managers and thus no employee is to assign his or her duties to another employee even if they belong to the same rank without official approval by their head of department or other superiors.
employee shall be allowed in the company building with their own data storage
devices such as flash memories, floppy disks, thumb drives, hard drives, SD
card etc. Furthermore, there will be no use of external media devices and
storage devices on company computers at the workstations. Only data transfer
techniques allowed by the company are to be used.
Appendix I :Current design
Figure 1 Current network and infrastructure design of the company
I: Logical design of new building
Appendix III: New plan for ground floor
Figure 2 Ground floor plan of new building of the company
Appendix IV: New plan for first floor
Figure 3First floor design of new company building
Appendix V: New plan for second floor
Figure 4 Second floor design of new company building