Assignment on information systems security

Assignment Help Computer Network Security
Reference no: EM13928670

Information Systems Security

You are the Information Security Officer for a small pharmacy did Has recently been opened in the local shopping mall. The daily operational of a pharmacy is a unique business requires a combination of did Both physical and logical access controls to protect medication and funds maintained located on the premises and personally identifiable information and protected health information of your customers. Your Has supervisor tasked you with inherently Identifying Risks associated with this pharmacy and Establishing physical and logical access control methods thatwill mitigate the Risks Identified.

1) firewall (1)

2) Windows 2008 Active Directory Domain

Controller (DC) (1)

3) file servers (1)

4) Desktop computers (4)

5) Dedicated T1 Connection (1)

Write a twelve (12) page paper in Which you:

Write a ten to fifteen (10-15) page paper in which you:

1. Identify and analyze any potential physical vulnerabilities and threats that require consideration.

2. Identify and analyze any potential logical vulnerabilities and threats that require consideration.

3. Illustrate in writing the potential impact of all identified physical vulnerabilities and threats to the network and the pharmacy.

4. Identify all potential vulnerabilities that may exist in the documented network.

5. Illustrate in writing the potential impact of all identified logical vulnerabilities to the network and the pharmacy.

Reference no: EM13928670

Questions Cloud

Benefits of social media such as facebook : One of the important benefits of social media such as Facebook and Twitter is that they allow marketers to easily learn what consumers are saying about their brand - and about the competition
Approach to the marketplace with a good marketing audit : Which control should periodically reassess its approach to the marketplace with a good marketing audit?
Analyze the role each stakeholder has in the strategies : Analyze what programs and services are available to address the challenges.
Calculate keystones return on stockholders equity : Calculate Keystone's return on stockholders' equity. What does a comparison of Keystone to these averages indicate about the firm's strengths and weaknesses?
Assignment on information systems security : You are the Information Security Officer for a small pharmacy did Has recently been opened in the local shopping mall.
How is survey feedback used to institute strategic change : How is survey feedback used to institute strategic change within organizations? Based on your research, defend its use in today's global business economy
Identify risks inherent in the use of wireless : 1. Identify risks inherent in the use of wireless and mobile technologies. 2. Analyze the identified risks and develop factors to mitigate the risks.
Effort to create this modern world : Having expended so much effort to create this modern world, people believed that we would not possibly stoop to war, because war is so destructive. (therefore they concluded that it was not reasonable to go to war-man would agree to stop fighting)..
Process of identifying and analyzing sub-groups of buyers : The sponsor makes payment for the communication via one or more forms of media (e.g., television, radio, magazine, newspaper, online).

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describe a technique used by hackers to cover their tracks

Describe a technique used by hackers to cover their tracks after a network attack. This may take a little bit of research so please post your source in this discussion

  Discuss how this and other information security

write a 1400- to 2100-word paper that describes the security authentication process.discuss how this and other

  How to identify udp socket and how to identify a tcp socket

How to identify a UDP socket and how to identify a TCP socket - Compare two pipelining protocols shown in the textbook

  What will be the minimal length of the key

If Encrypt-It-Rite would like to increase the average cracking time to at least 100 years, what will be the minimal length of the key?

  Potential physical threats that require attention

Identify at least five (5) potential physical threats that require attention. Determine the impact of at least five (5) potential logical threats that require attention

  What will be your plan to enhance your network security

Assume that you are the network security officer of one company, what will be your plan to enhance your network security (firewall? VPN? Content level protection? Or combination of them?) More details about your security infrastructure design will..

  Dissect an email

Dissect an email you have received. First, get the original, ASCII text of the email, including the headers, and the blank line separating the headers and the body of the email.

  Analyze the security of the system compriosing the size of

alice has a picture-based password system where she has each user pick a set of their 20 favorite pictures say of cats

  Write the enterprise technical infrastructure security plan

Write one page with references in APA format.Utilizing your comprehensive security plan outline as a guide (It is the attached document), write the enterprise technical infrastructure security plan for the organization.

  Describe how hacker might go about cracking message

Describe how a hacker might go about cracking a message encrypted with each type of algorithm. Suggest a specific application for each type of algorithm where the advantages clearly outweigh the disadvantages.

  What is the difference between ethics and morality

In United States vs. Davis, the U.S. Court of Appeals for the 11th Circuit ruled that a warrant was needed to access cell tower data. Who (what court(s)) must follow this ruling and why?

  Future of internet anonymity services

Discuss what you believe to be the most important lesson you have learnt as a result of these discussions. Explain the impact of this and its application/impact in real life.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd