Answer 1
The need to have an open and distributed computing system has evoked data security managers to deal with enormous modification of data centers. Technical expertise is required in the administration of data security through the establishment of environment specific standards. Technical developments and modifications in the priorities of development and enhancement of systems models enable execution of security controls (Buckingham, 2008). Modern computing involves increasing points of access such as online reporting and shared and interactive employment of data.
Evolution of multiplatform environments enables data security managers to reassess the security objectives. Also, a fully integrated systems environment has developed where two-way authentication, availability of communication and fail-safe operations have become paramount management facilities. The facilities are focused on the entire computing network and are designed to accommodate even the non-technical of the systems managers.
Answer 2
Security controls are designed to ensure the protection of crime and disruption trough deterrence by use of fences, security guards, and warning signs. Delay mechanism controls are meant to reduce damages by the use of locks and security personnel. To detect crime and disruptions, controls such as smoke detectors, motion detectors, closed circuit television (CCTV), et al., are used. Response procedures such as fire suppression methods and emergency response procedures are also paramount controls in this environment (Castells, 2006).
Answer 3
USB Thumb Drives: these inexpensive, small devices can hold an enormous amount of data and can be used with multiple types of computers. Hackers that develop target malware can use these devices to inject to a live USB port. The malware evokes the operating system to interfere with the stored data. To mitigate this, the computer autorun policies must by manipulated. An unsecured wireless access point can be used by wardrivers to access the information of a computer system and manipulate or damage the data. The intrusion can cost organizations millions of dollars hence huge losses (Hohpe, & Woolf, 2004). To mitigate this, strong, mixed password must be used and changed on a frequent basis.
References
Buckingham, D. (2008). Youth, identity, and digital media. Cambridge, Mass, MIT Press.
Castells, M. (2006). The network society: from knowledge to policy: Johns Hopkins Center for Transatlantic Relations. Washington, DC.
Hohpe, G., & Woolf, B. (2004). Enterprise integration patterns: Designing, building, and deploying messaging solutions. Boston: Addison-Wesley.