Determine impact of at least five potential logical threats

Assignment Help Computer Network Security
Reference no: EM13765867

Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls geared towards protecting medication and funds located on the premises, as well as the personally identifiable information and protected health information of your customers that resides on your system. Your supervisor has tasked you with identifying inherent risks associated with your pharmacy and establishing strong physical and logical access control methods to mitigate the identified risks.

1) Firewall (1)

4) Desktop computers (4)

2) Windows 2012 Active Directory Domain Controllers (DC) (1)

5) Dedicated T1 Connection (1)

3) File Server (1)

Write an six (6) pages paper in which you:

Identify at least five (5) potential physical threats that require attention.

Determine the impact of at least five (5) potential logical threats that require attention.

Detail the security controls (i.e., administrative, preventative, detective, and corrective) that the pharmacy could implement in order to protect it from the five (5) selected physical threats.

Explain in detail the security controls (i.e., administrative, preventative, detective, and corrective) that could be implemented to protect from the five (5) selected logical threats.

For each of the five (5) selected physical threats, choose a strategy for addressing the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.

For each of the five (5) selected logical threats, choose a strategy for handling the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.

Use at least five (5) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13765867

Questions Cloud

Discuss the type of encryption : Identify the key reasons for selecting your wireless home router. Discuss the type of encryption it uses and explain the reason(s) why you believe this method of encryption is more superior than its contemporaries.
The creation of the ocean floor issues : Does one idea seem more plausible than the other? If so, why? Base your findings on the natural event you identified earlier in the paper.
Search queries for each scenario based on the issues : Form a natural language search queries for each scenario based on the issues identified. Please list your search terms
Discussion of the business requirements : A full description of the new system, a description of its components, and the benefit it will provide to Riordan
Determine impact of at least five potential logical threats : Determine the impact of at least five (5) potential logical threats that require attention. Detail the security controls (i.e., administrative, preventative, detective, and corrective) that the pharmacy could implement in order to protect it from ..
How would you change the incident reporting : The senior management of a large Midwestern nursing home gathered data on its quality of patient care and patient safety. How would you change the incident reporting and performance appraisal systems
Calculate the firms profit or loss and : Calculate the values for the four formulas - Calculate the firms profit or loss. Should the firm shut down immediately when the total fixed cost equals $3,000,000?
Problem related to natural event : Would the effects of this event be any different if it occurred at a high or low tide? If so how
Analyze trade-off between input for productivity improvement : Analyze the trade-offs between inputs for the productivity improvements. Analyze the advantages and disadvantages of global sourcing versus producing in the U.S.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain prudent policy to protect datafrom corruption-theft

The opposing require to protect this data (from corruption and theft) which typically means controlling access to much/all of the data? What policy is prudent here?

  Write down a 350- to 700-word article review addressing the

write a 350- to 700-word article review addressing the sequential process the article discusses that highlights a

  Formulate a digital forensics process

Write a guide on how to load a VHD file and what strategies should you use? Which acquisition method should you use?

  Gamal signature schemes

Prove that the equation yaab mod p = gm mod p holds for the signature values chosen by Equation 1, 2 and 3].

  System enforcing bibas strict integrity policy

Consider the system enforcing Biba's strict integrity policy for a software vendor - defined integrity levels for an access class are released

  Standard for public-key certificate formats

Standard for public-key certificate formats. X.509 specifies an authentication protocol. The original version of X.509 contains a security flaw.

  Build on the systems development selected in week 2 and

build on the systems development selected in week 2 and design 1 to 2 user interfaces. explain how the user interface

  Discuss how standards for encryption modules

Go to the NIST FIPS 140-2 standards Website and read about the 140-2 encryption standards along with its annexes, discuss how standards for encryption modules and algorithms benefit the furtherance of Web application security

  What can employees do to protect against attacks

What can employees do to protect against intrusion and attacks? Complete the following for this assignment:Research various security tools that an employee can use to keep his or her data safe or to thwart denial of service attacks.

  Incident and crime scene procedures

Determine the purpose of creating a digital hash. Explain in detail the need for this procedure and the potential damage if this critical step is not taken.

  What security features given by running special software

What security features could be given without changing mail delivery infrastructure, i.e., by only running special software at source and destination?

  Name and explain 4 key security tips you would share with

question 1 name and describe 4 key security tips you would share with your coworkers to keep their data safe their

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd