Explain in detail the security controls

Assignment Help Computer Network Security
Reference no: EM13778111

Information Systems Security

Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls geared towards protecting medication and funds located on the premises, as well as the personally identifiable information and protected health information of your customers that resides on your system. Your supervisor has tasked you with identifying inherent risks associated with your pharmacy and establishing strong physical and logical access control methods to mitigate the identified risks.

1) Firewall (1)

2) Windows 2012 Active Directory Domain Controllers (DC) (1)

3) File Server (1)

4) Desktop computers (4)

5) Dedicated T1 Connection (1)

Write an eight to ten (8-10) page paper in which you:

Identify at least five (5) potential physical threats that require attention.

Determine the impact of at least five (5) potential logical threats that require attention.

Detail the security controls (i.e., administrative, preventative, detective, and corrective) that the pharmacy could implement in order to protect it from the five (5) selected physical threats.

Explain in detail the security controls (i.e., administrative, preventative, detective, and corrective) that could be implemented to protect from the five (5) selected logical threats.

For each of the five (5) selected physical threats, choose a strategy for addressing the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.

For each of the five (5) selected logical threats, choose a strategy for handling the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.

Use at least five (5) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook

Reference no: EM13778111

Questions Cloud

Develop a personal definition of middleware : Diagram middleware using a variety of resources (minimum of three), depicting four different types captioned by their definitions. Develop a personal definition of middleware based on your research
Characteristics of a cult : 1) What characteristics of a cult and/or conspiracy and/or moral panic do the case studies share? 2) How do the case studies show how the powerful make some group(s) of people "the Other" or the "scapegoat" blamed for society's problems? What do t..
Theories of pesonality development : What aspects of your cultural upbringing have affected your own personality development? Think about a friend who grew up in a different culture-how did their cultural upbringing and traditions affect their personality development in a way that di..
Problems related to external financing options : How will the perceived value of the stock influence buyers' willingness to purchase the stock? Does PCI expect to fair well in the selling of stock securities?
Explain in detail the security controls : Explain in detail the security controls (i.e., administrative, preventative, detective, and corrective) that could be implemented to protect from the five (5) selected logical threats. Determine the impact of at least five (5) potential logical thr..
Installation of an automatic sprinkling system : Why is the installation of an automatic sprinkling system recommended in machine shops that use lathes to fabricate titanium parts? Be specific.
Describe egocentric thinking-successful egocentric thinking : Describe egocentric thinking, successful egocentric thinking, and unsuccessful egocentric thinking. Then describe examples form your own experience where you successfully and unsuccessfully thought egocentrically.
Legitimate way to investigate reality issues : Can one logically believe both that God knows everything and that there is free will? Explain the difficulty.
What chemical process is involved here : Why might this fire rekindle days later as someone tries to remove the residue with water? What chemical process is involved here?

Reviews

Write a Review

Computer Network Security Questions & Answers

  How are students with exceptional needs

What is the impact of Common Core on education today? How are students with exceptional needs affected by this new initiative?

  Dscribe three 3 ways in which businesses use internet

assume that you were recently hired by a manufacturing company as a systems administrator trainee. your first

  Explain about hashing and message authentication codes

Explain the different roles between hashing and message authentication codes (MAC). Can a good hash function serve as a good MAC, and vice versa?

  Discuss a minimum of five event types found in a dhcp log

Discuss a minimum of five event types found in a DHCP log and describe what they refer to and what plan will you follow to assign printers to all the users in the organization?

  Open this using a brute-force attack

What is the worst case number of combinations he must now test to try open this using a brute-force attack?

  Personal and business-related cybersecurity scenarios

Analyze personal privacy issues related to various personal and business-related cybersecurity scenarios - Describe the mission of each, and examine and compare details of each stated privacy policy.

  Explain the concepts of information systems security

Explain the concepts of information systems security as applied to an IT infrastructure and describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.

  The author of your text suggests that the ability to

the author of your text suggests that the ability to connect to the internet via wi-fi is available everywhere bowles

  Importance of presentation and content in presentation

There has been a discussion for years on which is more important, content or presentation. This is very important when thinking about creating a PowerPoint slideshow.

  For a typical network environment

For a typical network environment (that includes an Internet-facing Website, a human resources database and application, and development workstations that contain copyrighted material), describe some typical devices or assets and vulnerabilities that..

  Enterprise network design and network size

In small networks, the web of router links is not complex, and paths to individual destinations are easily deduced. However, in large networks, the resulting web is highly complex, and the number of potential paths to each destination is large.

  Developing a simple biometric authentication model

Developing an encryption/decryption demo (mainly for learning and teaching purposes)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd