Information Technology Department Security Measures

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!

Data Destruction

Data destruction is the process of managing the data throughout its lifecycle and then eliminating it from the system if it is not necessary. For the majority of modern companies, the process of data destruction is one of the essential procedures allowing the organization to run smoothly and manage their data efficiently while staying protected. The first method is called “clear.” It means that certain software is used to sanitize the data sources and protect the information that is owned by the company (Conklin et al. 46). The software utilizes basic read-write commands and can rewrite the values or reset the machine if it is necessary (or if the rewriting option is not supported by the setup). The second method is called “purge.” This particular procedure applies logical systems to recover the required data or make it available again after a check-up (Conklin et al. 655). The last method is called “destruction.” This happens when the data is removed conclusively and irrevocably and cannot be restored due to the physical removal of the information from the storage device.

Metadata Discussion

Metadata is a type of data that describes the information contained in the given file (Foulonneau and Riley 3). It is important to remove metadata because certain sensitive pieces of information ca be contained there. The decision to remove metadata can be justified by the strategic needs of the company and safety measures intended to protect the intellectual property that belongs to the company (Laykin 61).

Fire Accident Classification

There are five basic classes of fires – A, B, C, D, and K (Mannan 203). Class A fires are considered to be the most regularly met. They originate from common flammable constituents such as paper, wood, and plastic. Water is one of the most efficient reagents used to put out Class A fires. The Class B fires initiate because of gasses or liquid flammables. The most effective way to put out this type of fires is to limit the flow of oxygen to the fire as Class B fires are rather similar to chemical reactions with analogous outcomes (Dulaney and Easttom 482). Class C fires are commonly initiated by certain electrical components. A variety of appliances and electronic machines/ transformers may become the origin of this type of fire (Dulaney and Easttom 482). The Class D fires usually start from a burnable metal source. When it comes to this type of fire, water is relatively useless and unsafe. Instead, it is advised to use dry powder substances as they can absorb the heat and suffocate the fire itself (Dulaney and Easttom 482). The Class K fires may be usually experienced in kitchens as these fires are related to the process of food preparation.

The identified fire extinguishers are located on the territory of the IT department. One of the extinguishers is near the main server and two other extinguishers are next to the main and emergency exits. These are all Class C extinguishers. The travel distances are within the required limit (<75 ft.) – 58, 72, and 39 ft. respectively.

SMTP

An open mail relay is a type of mail server. It is configured in a way that tolerates incoming and outgoing emails in all directions using an SMTP server regardless of whether the receiver or sender was enclosed or protected (Graham 75). The problem with the open mail relay setup consists of the fact that such email servers are feasible to worms and spammers. Therefore, they were disproved by the majority of the organizations due to the sensitive nature of the corporate data.

Works Cited

Conklin, Arthur, et al. Principles of Computer Security. McGraw Hill Professional, 2016.

Dulaney, Emmett, and Chuck Easttom. CompTIA Security Study Guide. Sybex, 2014.

Foulonneau, Muriel, and Jenn Riley. Metadata for Digital Resources: Implementation, Systems Design and Interoperability. Chandos Publishing, 2014.

Graham, James, et al. Cyber Security Essentials. Auerbach Publications, 2016.

Laykin, Erik. Investigative Computer Forensics: The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives. John Wiley, 2013.

Mannan, Sam. Lees’ Process Safety Essentials: Hazard Identification, Assessment and Control. Butterworth-Heinemann, 2013.

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!