This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Certification

The data center and the control access

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

The data center and the control access

Module three discussion

Q1. The best CA is public. The public is accessible with the ease of accessibility. The certificate policy enables the natural selection of certificate classes that are acceptable for most users (Conklin, 2015).

Don't use plagiarised sources.Get your custom essay just from $11/page

The hybrid trust model is highly preferred. This type of model combines both the hierarchical as well as peer-peer models. This model allows two or more firms to inform their internal hierarchical structures that will enable them to run their functions adequately. To allow a good relationship between different features of the companies, the companies apply the peer-peer model (Conklin, 2015). This type of model offers an option to execute a connection between CA responsible for cross-certificate issuance meant for the connected Cas and the available company trust domains. Although the bridge connection is essential, it is only used for the generation and maintenance of entities for cross-certifications meant to the related ecosystem. The model borrows from the peer-peer model in creating a trust anchor through the end-entities, which based on the CA issuance using distinct anchors (Conklin, 2015).  The combination of the two models under the hybrid model provides the user with a fully-equipped model that is simple to use and guarantees a functional operation across the board.

Q2. The data center will have to be offered a physical access control;

Physical locks

This is locks that will be used in securing the doors to the data warehouse. The bolts should have essential controls designed in a pick and drill resistance manner.

Layered access

Accessibility to the data warehouse will be restricted to only the people who must work in the datacenter. This will help in preventing attacks on the servers (Conklin, 2015).

Electronic access

This is the inclusion of automatic mechanisms in ensuring the security of the datacenter. They may include the installation of security cameras and turnstile barriers.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Reference

Conklin, W. A., White, G., Cothren, C., Davis, R., & Williams, D. (2015). Principles of  computer security. McGraw-Hill Education Group.

 

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask