Updated:

Information Technology Department Security Measures Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

Data Destruction

Data destruction is the process of managing data throughout its lifecycle and then eliminating it from the system if necessary. For the majority of modern companies, data destruction is one of the essential procedures allowing the organization to run smoothly and manage its data efficiently while staying protected.

The first method is called “clear.” It means that certain software is used to sanitize the data sources and protect the information that is owned by the company (Conklin et al. 46). The software utilizes basic read-write commands and can rewrite the values or reset the machine if it is necessary (or if the rewriting option is not supported by the setup). The second method is called “purge.” This particular procedure applies logical systems to recover the required data or make it available again after a check-up (Conklin et al. 655). The last method is called “destruction.” This happens when the data is removed conclusively and irrevocably and cannot be restored due to the physical removal of the information from the storage device.

Metadata Discussion

Metadata is a type of data that describes the information contained in the given file (Foulonneau and Riley 3). It is important to remove metadata because certain sensitive pieces of information ca be contained there. The decision to remove metadata can be justified by the strategic needs of the company and safety measures intended to protect the intellectual property that belongs to the company (Laykin 61).

Fire Accident Classification

There are five basic classes of fires – A, B, C, D, and K (Mannan 203). Class A fires are considered to be the most regularly met. They originate from common flammable constituents such as paper, wood, and plastic. Water is one of the most efficient reagents used to put out Class A fires. The Class B fires initiate because of gasses or liquid flammables. The most effective way to put out this type of fires is to limit the flow of oxygen to the fire as Class B fires are rather similar to chemical reactions with analogous outcomes (Dulaney and Easttom 482). Class C fires are commonly initiated by certain electrical components. A variety of appliances and electronic machines/ transformers may become the origin of this type of fire (Dulaney and Easttom 482). The Class D fires usually start from a burnable metal source. When it comes to this type of fire, water is relatively useless and unsafe. Instead, it is advised to use dry powder substances as they can absorb the heat and suffocate the fire itself (Dulaney and Easttom 482). The Class K fires may be usually experienced in kitchens as these fires are related to the process of food preparation.

The identified fire extinguishers are located on the territory of the IT department. One of the extinguishers is near the main server and two other extinguishers are next to the main and emergency exits. These are all Class C extinguishers. The travel distances are within the required limit (<75 ft.) – 58, 72, and 39 ft. respectively.

SMTP

An open mail relay is a type of mail server. It is configured in a way that tolerates incoming and outgoing emails in all directions using an SMTP server regardless of whether the receiver or sender was enclosed or protected (Graham 75). The problem with the open mail relay setup consists of the fact that such email servers are feasible to worms and spammers. Therefore, they were disproved by the majority of the organizations due to the sensitive nature of the corporate data.

Works Cited

Conklin, Arthur, et al. Principles of Computer Security. McGraw Hill Professional, 2016.

Dulaney, Emmett, and Chuck Easttom. CompTIA Security Study Guide. Sybex, 2014.

Foulonneau, Muriel, and Jenn Riley. Metadata for Digital Resources: Implementation, Systems Design and Interoperability. Chandos Publishing, 2014.

Graham, James, et al. Cyber Security Essentials. Auerbach Publications, 2016.

Laykin, Erik. Investigative Computer Forensics: The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives. John Wiley, 2013.

Mannan, Sam. Lees’ Process Safety Essentials: Hazard Identification, Assessment and Control. Butterworth-Heinemann, 2013.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, September 24). Information Technology Department Security Measures. https://ivypanda.com/essays/information-technology-department-security-measures/

Work Cited

"Information Technology Department Security Measures." IvyPanda, 24 Sept. 2020, ivypanda.com/essays/information-technology-department-security-measures/.

References

IvyPanda. (2020) 'Information Technology Department Security Measures'. 24 September.

References

IvyPanda. 2020. "Information Technology Department Security Measures." September 24, 2020. https://ivypanda.com/essays/information-technology-department-security-measures/.

1. IvyPanda. "Information Technology Department Security Measures." September 24, 2020. https://ivypanda.com/essays/information-technology-department-security-measures/.


Bibliography


IvyPanda. "Information Technology Department Security Measures." September 24, 2020. https://ivypanda.com/essays/information-technology-department-security-measures/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1