The data center and the control access
Module three discussion
Q1. The best CA is public. The public is accessible with the ease of accessibility. The certificate policy enables the natural selection of certificate classes that are acceptable for most users (Conklin, 2015). Don't use plagiarised sources.Get your custom essay just from $11/page
The hybrid trust model is highly preferred. This type of model combines both the hierarchical as well as peer-peer models. This model allows two or more firms to inform their internal hierarchical structures that will enable them to run their functions adequately. To allow a good relationship between different features of the companies, the companies apply the peer-peer model (Conklin, 2015). This type of model offers an option to execute a connection between CA responsible for cross-certificate issuance meant for the connected Cas and the available company trust domains. Although the bridge connection is essential, it is only used for the generation and maintenance of entities for cross-certifications meant to the related ecosystem. The model borrows from the peer-peer model in creating a trust anchor through the end-entities, which based on the CA issuance using distinct anchors (Conklin, 2015). The combination of the two models under the hybrid model provides the user with a fully-equipped model that is simple to use and guarantees a functional operation across the board.
Q2. The data center will have to be offered a physical access control;
Physical locks
This is locks that will be used in securing the doors to the data warehouse. The bolts should have essential controls designed in a pick and drill resistance manner.
Layered access
Accessibility to the data warehouse will be restricted to only the people who must work in the datacenter. This will help in preventing attacks on the servers (Conklin, 2015).
Electronic access
This is the inclusion of automatic mechanisms in ensuring the security of the datacenter. They may include the installation of security cameras and turnstile barriers.
Reference
Conklin, W. A., White, G., Cothren, C., Davis, R., & Williams, D. (2015). Principles of computer security. McGraw-Hill Education Group.