Relationship Between Infrastructure and Security Term Paper

Total Length: 1413 words ( 5 double-spaced pages)

Total Sources: 3

Page 1 of 5

Infrastructure and Security

Relationship Between Infrastructure and Security

Data is the most valuable asset for a data collection and analysis company. Therefore, the security of this data should of utmost importance to the company. The context of data determines its overall value. Information Technology for any company is valued based on its ability to present, store, analyze, manage, and protect the data in order to support the operations of the company. Data might have different value based on the type of data, but all data should be kept safe at all times. The value of data is placed depending on the usability of the said data. While any data can be said to be valuable, corrupted or incomplete data would not be valuable to any company (Chou & Sengupta, 2008). Therefore, there is need to ensure and guarantee the safety of data. The infrastructure that is put in place should be aimed at capturing, storing, and securing the data in its entirety. This means that the data should be verified to determine its correctness and when stored there should be systems in place to ensure that its storage is not interfered with in any way. Storage systems should also have backups to ensure that data is always secure and available even if one of the storages fails. Data transmission should be secure to ensure that transmitted data is secure and there is no possibility of the data being accessed when in transmission. The infrastructure that is used for the transmission of the data is what will determine how secure that data is during transmission. There should be strong controls in place to guarantee the safety of data at all time. The nodes that are being used to transmit the data should also be securely set up. This means that the nodes should have adequate security measures in place to safeguard the data before transmission. Nodes should also be setup up properly to ensure that they are secure.

Rationale for The Logical and Physical Topographical Layout of The Planned Network

A logical layout shows the logical aspects of the network. This will include logical networks, the assigned IP addresses for various hosts and devices, routing tables and other items.

Stuck Writing Your "Relationship Between Infrastructure and Security" Term Paper?

In the logical diagram’s details regarding actual interfaces and physical cables are not required and they are mostly excluded. A physical layout shows the physical location of devices and the connections between the devices participating on the network. These diagrams depict workstations with small computer icons, servers with full tower cases, rectangular boxes are used to depict switches and other similar devices. The diagrams or layouts are vital for security, troubleshooting, and management reasons. when troubleshooting it is…

[…… parts of this paper are missing, click here to view the entire document ]

…on a daily basis. Redundancies should also be in place for restoring affected data to its original state.

Availability of data is guaranteed by maintaining all hardware. There should be routine hardware check and any hardware issues detected should be acted upon immediately. There should be a clean operating systems environment to eliminate software conflicts. The organization should be current with all system upgrades required in order to seal any vulnerabilities. Availability is also guaranteed by ensuring that there is adequate bandwidth. This will ensure that there are no bottlenecks when employees are trying to access files on the server. Bandwidth will also ensure that traffic is properly routed and there are no delays experienced.

Ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information

Employees and contractors should at all times be trained to do what is right with the information they have access to. There should be no sharing of passwords, and access to information should not be given to unauthorized persons or co-workers. The policy will layout the undesired things for the employees and those for the contractors. Contractors will be required to present their credentials before they can be allowed to access the organization's offices. They are also required to only undertake their work and they should not share any information that they….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Relationship Between Infrastructure And Security" (2018, November 25) Retrieved June 26, 2025, from
https://www.aceyourpaper.com/essays/relationship-infrastructure-security-2172797

Latest MLA Format (8th edition)

Copy Reference
"Relationship Between Infrastructure And Security" 25 November 2018. Web.26 June. 2025. <
https://www.aceyourpaper.com/essays/relationship-infrastructure-security-2172797>

Latest Chicago Format (16th edition)

Copy Reference
"Relationship Between Infrastructure And Security", 25 November 2018, Accessed.26 June. 2025,
https://www.aceyourpaper.com/essays/relationship-infrastructure-security-2172797