Reference no: EM13778111
Information Systems Security
Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls geared towards protecting medication and funds located on the premises, as well as the personally identifiable information and protected health information of your customers that resides on your system. Your supervisor has tasked you with identifying inherent risks associated with your pharmacy and establishing strong physical and logical access control methods to mitigate the identified risks.
1) Firewall (1)
2) Windows 2012 Active Directory Domain Controllers (DC) (1)
3) File Server (1)
4) Desktop computers (4)
5) Dedicated T1 Connection (1)
Write an eight to ten (8-10) page paper in which you:
Identify at least five (5) potential physical threats that require attention.
Determine the impact of at least five (5) potential logical threats that require attention.
Detail the security controls (i.e., administrative, preventative, detective, and corrective) that the pharmacy could implement in order to protect it from the five (5) selected physical threats.
Explain in detail the security controls (i.e., administrative, preventative, detective, and corrective) that could be implemented to protect from the five (5) selected logical threats.
For each of the five (5) selected physical threats, choose a strategy for addressing the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.
For each of the five (5) selected logical threats, choose a strategy for handling the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.
Use at least five (5) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook
Develop a personal definition of middleware
: Diagram middleware using a variety of resources (minimum of three), depicting four different types captioned by their definitions. Develop a personal definition of middleware based on your research
|
Characteristics of a cult
: 1) What characteristics of a cult and/or conspiracy and/or moral panic do the case studies share? 2) How do the case studies show how the powerful make some group(s) of people "the Other" or the "scapegoat" blamed for society's problems? What do t..
|
Theories of pesonality development
: What aspects of your cultural upbringing have affected your own personality development? Think about a friend who grew up in a different culture-how did their cultural upbringing and traditions affect their personality development in a way that di..
|
Problems related to external financing options
: How will the perceived value of the stock influence buyers' willingness to purchase the stock? Does PCI expect to fair well in the selling of stock securities?
|
Explain in detail the security controls
: Explain in detail the security controls (i.e., administrative, preventative, detective, and corrective) that could be implemented to protect from the five (5) selected logical threats. Determine the impact of at least five (5) potential logical thr..
|
Installation of an automatic sprinkling system
: Why is the installation of an automatic sprinkling system recommended in machine shops that use lathes to fabricate titanium parts? Be specific.
|
Describe egocentric thinking-successful egocentric thinking
: Describe egocentric thinking, successful egocentric thinking, and unsuccessful egocentric thinking. Then describe examples form your own experience where you successfully and unsuccessfully thought egocentrically.
|
Legitimate way to investigate reality issues
: Can one logically believe both that God knows everything and that there is free will? Explain the difficulty.
|
What chemical process is involved here
: Why might this fire rekindle days later as someone tries to remove the residue with water? What chemical process is involved here?
|