+1(978)310-4246 credencewriters@gmail.com
  

Description

Question-1: Topic: Datacenter security

QUESTION-3: Discuss in 500 words your opinion on what lessons should be learned from the 737 Max 8 crashes.

Use at least three sources. Use the

Research Databases available from the Danforth Library

, not Google.

Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

Reference :

Prisoners released by software error

Coding errors in space

Expensive software errors

737

Max

8

https://hackablepodcast.com/episodes #13

1
Abstract
It is in the public domain that there is minimal security when the internet is concerned. There are
no specific occasions that a cyber expert is confident that there are sufficient security controls for
an information system. When it comes to the internet, there are intricate connections over the
globe. Such links make it possible for other people to steal information and data that belong to
individuals, companies, or the government. Others want to deny people services or cause havoc
to computing systems to bring them down. Network security is the most essential and vital
strategy against a data breach. Data is an element that requires protection in any given data
center. Proper data management can only occur when the information is secure and out of reach
from those seeking to delete, manipulate or steal the data. Ensuring that the data is safe requires
fundamental security protocols and checks built to secure the data center (“Data Center Security,
the Often-Overlooked Data Security Risk”, 2021). Data breach results in massive data destruction
that may impact the company or business for a long time.
Many companies have moved towards using data centers to store data, retrieve data, and data
acquisition. The move is basically because of the security resin and the confidence that data
centers have more security check controls that make it difficult for data to be accessed, deleted,
manipulated, or stolen by unauthorized persons. Datacenter security experts are aware that data
centers are the recent targets because they store massive data and information from individuals,
organizations, and governments. Any security vulnerability is a channel that attackers can
exploit. It is, therefore, the reason why the data center security experts must prove their security
expertise. It is achieved by ensuring that the data is safe and providing uninterrupted services to
the customers. The downtime should be minimal. Several security controls have to be
2
implemented to secure the data centers. This paper explores the data center security controls and
mechanisms.
Keywords: Internet, Data center, Security controls, Data, Vulnerabilities, Downtime.
3
References
Data Center Security, the Often-Overlooked Data Security Risk. PhoenixNAP Global IT Services. (2021).
Retrieved 4 February 2021, from https://phoenixnap.com/blog/data-center-security.
Virtualization, D. (2021). What Is a Data Center?. Cisco. Retrieved 4 February 2021, from
https://www.cisco.com/c/en/us/solutions/data-center-virtualization/what-is-a-datacenter.html.
Running Head: DATA SECURITY
1
Datacenter security
Datacenter security is the virtual technologies and physical practices used to shield a data
center against external attacks and threats (Giri, Shailendra, & Shakya, 2019). The center stores
internet technology infrastructure and consists of networked computers used in processing,
storing, and organizing large data. The data center provides companies with services such as data
backup, storage, and recovery, networking, and data management. The center holds sensitive
information for the company’s customers, which calls for the need for physical and digital
security. Therefore, the research on the data center will focus on the physical security and digital
security measures used in securing the information infrastructure. Security threats will also be
researched.
2
DATA SECURITY
References
Giri, S., & Shakya, S. (2019). Cloud computing and data security challenges: A Nepal
case. International Journal of Engineering Trends and Technology, 67 (3), 146, 150.
1
Topic: What Impact would the reliance on Surveillance State have on UK residents?
Thesis statement: The surveillance state has made citizens doubt if their privacy rights are still
being respected and live in fear of being caught violating laws that they never knew to extend.
Clarke, M. (1994) Blind Eye on the Street.Police Review, 5(August): 28-30
Historical policing in the UK has necessitated the adoption of modern surveillance tools
due to the rising criminal activities. The fact that the crime rates are not rampant
necessitated the study on State Surveillance and the Right to Privacy. Article 8 In the
European Convention focuses on Basic Rights. The law exists to cross check the state on
how it uses covert technology on its citizens. Human Rights Act 1998 was a tremendous
breakthrough for the right to respect of personal life under the UK law, but it has not
stopped the state from obtaining information about the citizens without their consent.
The study seeks to reflect upon Surveillance state impacts on citizens and if there is a
justification for covert surveillance. It is believed that the closed-circuit television
cameras must be regulated under the European Convention laws.
Trottier, D. (2012). Social media as surveillance. London, UK: Ashgate.
There should be an extension about the right to respect for private life on what an
individual does on social media. The author recommends further study and a more indepth look into the Surveillance state in the UK concerning the state reliance on covert
surveillance to obtain information in citizens while on social media platforms. The state
uses social media to encroach on private life.
Zureik, E., Stalker, L. H., & Smith, E. (2010). Surveillance, privacy, and globalization of
personal information.Montreal, Canada: McGill–Queen’s University Press.
2
Surveillance State’s challenge is to worry about what can be done with what the state can
do with what is known about an individual, a business, or a private agency. The
Surveillance State poses a danger since it contravenes the right to privacy and extends to
fuel citizen control by the government. The UK’s debates reached climax years back in
the media, public sectors, and ICT sectors and in the political arena. The worries
concerning Surveillance State have been formalized under British policy. The UK is
often seen as democratic and undemocratic because it is the greatest player in testing new
policies and technologies used in surveillance. The UK has always been a model for
many countries seeking to implement surveillance.
Steeves, V. (2006). It’s not child’s play: The online invasion of children’s privacy. University of
Ottawa Law and Technology Journal, 3(1), 171–187.
Surveillance has the UK government to know more about its citizens. The more the UK
government knows, the more it gains control over the citizens and more future controls.
The justification of covert surveillance resolve around security matters, which carries
weight for every nation. It is seen as the remedy to more complex social issues. It avoids
judicial authority and democracy. It undermines personal and economic security and
various social objectives of the citizens.
Brayne, Sarah. 2017. “Big Data Surveillance: The Case of Policing.” American Sociological
Review 82 (5): 977–1008. Doi: 10.1177/0003122417725865.
The main of the surveillance state is to achieve the objective without regard to privacy
violation. Nobody has the capacity to questions the surveillance state because it can
defend itself, and it exhibits powers beyond control. Pushing back surveillance state will
3
be a long and tough battle. Law-abiding citizens live in fear of being caught in violation
of a law they have never known exists. The surveillance system calls for more new rules
to be imposed, making the citizens more fearful and hence less productive in areas they
feel are being monitored by the state.
4
References
Brayne, Sarah. 2017. “Big Data Surveillance: The Case of Policing.” American Sociological
Review 82 (5): 977–1008. Doi: 10.1177/0003122417725865.
Clarke, M. (1994) Blind Eye on the Street. Police Review, 5(August): 28-30
Steeves, V. (2006). It’s not child’s play: The online invasion of children’s privacy. University of
Ottawa Law and Technology Journal, 3(1), 171–187.
Trottier, D. (2012). Social media as surveillance. London, UK: Ashgate.
Zureik, E., Stalker, L. H., & Smith, E. (2010). Surveillance, privacy, and globalization of
personal information.Montreal, Canada: McGill–Queen’s University Press.

Purchase answer to see full
attachment

error: Content is protected !!