Identify potential physical threats that require attention

Assignment Help Management Information Sys
Reference no: EM131155822

Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls geared towards protecting medication and funds located on the premises, as well as the personally identifiable information and protected health information of your customers that resides on your system. Your supervisor has tasked you with identifying inherent risks associated with your pharmacy and establishing strong physical and logical access control methods to mitigate the identified risks.

1) Firewall (1)

4) Desktop computers (4)

2) Windows 2012 Active Directory Domain Controllers (DC) (1)

5) Dedicated T1 Connection (1)

3) File Server (1)

Technical Project Paper Graphic

Identify at least five (5) potential physical threats that require attention.

Determine the impact of at least five (5) potential logical threats that require attention.

Detail the security controls (i.e., administrative, preventative, detective, and corrective) that the pharmacy could implement in order to protect it from the five (5) selected physical threats.

Explain in detail the security controls (i.e., administrative, preventative, detective, and corrective) that could be implemented to protect from the five (5) selected logical threats.

For each of the five (5) selected physical threats, choose a strategy for addressing the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.

For each of the five (5) selected logical threats, choose a strategy for handling the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.

Use at least five (5) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Explain the concepts of information systems security as applied to an IT infrastructure.

Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.

Explain the means attackers use to compromise systems and networks, and defenses used by organizations.

Explain the role of access controls in implementing a security policy.

Explain how businesses apply cryptography in maintaining information security.

Analyze the importance of network principles and architecture to security operations.

Use technology and information resources to research issues in information systems security.

Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

Reference no: EM131155822

Questions Cloud

What is the saturation pressure of cyclohexane at 250 k : A vapor mixture of carbon dioxide/cyclohexane is to be separated by partial condensation in a vapor- liquid separator at 250 K so that carbon dioxide is received at a purity of 80%. Determine the pressure and the mole fraction of CO2 in the liqu..
Why is proper crime scene critical in criminal investigation : Why is proper crime scene documentation critical in criminal investigations? What should the documentation include?
Explain the concept of the kano model : Explain the concept of the Kano model. Why is it important for organizations to help customers establish Kano levels that are appropriately linked to the value trait of quality?
How the credit crisis adversely affected many other people : Explain how the credit crisis adversely affected many other people beyond homeowners and mortgage companies. - Do you believe the impact of the credit crisis is still being felt today?
Identify potential physical threats that require attention : Detail the security controls (i.e., administrative, preventative, detective, and corrective) that the pharmacy could implement in order to protect it from the five (5) selected physical threats.
Performance assessment of healthcare organizations : What is a dashboard, and what types of information appear on this instrument (identify two types of information, please be specific).  Why is this report important for healthcare organizations
Epm around flexible or inflexible elements : Is it best to design an EPM around flexible or inflexible elements? When first developing a EPM system , do companies prefer to use formality or informality. what are the pros and cons of each element?
Discuss the significant attributes of a wiki : Identify the platform that IAL chose as an online portal and content management system, and describe the main reason(s) why IAL chose such a specific platform. Discuss the significant attributes of a wiki, and describe the overall manner in which..
Calculate the excess enthalpy of mixing for a solution : Calculate the excess enthalpy of mixing for a solution that contains 60% by mol hydrazine at 20 °C.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Evaluate the importance of designing a controls framework

Evaluate the importance of designing a controls framework

  Analyze the proposed system to be developed

As a systems analyst, you must use the best application tools to analyze the proposed system to be developed. Write an essay describing the advantages and disadvantages for agile, JAD, and RAD approaches to application development methods.

  Difference between system and application software

You have identified several companies that specialize in software for small businesses. Please write a "request for proposal" (RFP). To write an RFP, you need to identify the needs of the company. Begin by explaining the difference between system ..

  Specific innovation of the airmouse technology

Specific innovation of the airmouse technology, Potential risks in using this technology for an organization, How this technology can be 'integrated' in the organization

  Define the portfolio audit form to the dropbox

Next week, you will conduct a full and formal audit of your career portfolio. For now, however, you need to get started on that process. For this assignment, fill and post a copy of the Portfolio Audit Form to the Dropbox.

  Write review on accounting software-package use in australia

The literature review would be on accounting software/packages used in Australia. The research would cover history, development and adoption.

  Explain why mobile systems are important

Explain what mobile devices are and why mobile systems are important. Give examples of mobile devices, and, if applicable, name a mobile device you use and why you use it.

  How wireless information services affect use of internet

How devices and wireless information services affect the use of the internet and web into business? Please, explain your answer.

  Which is position manages firewalls

Which IS position manages firewalls and antivirus software and this managerial IS position is responsible for managing such computer hardware as firewalls, and software such as antivirus software.

  Organizational structure chain of authority for

organizational structure chain of authority for compliancemore and more companies are separating the organizational

  Advantage a database has over a spreadsheet

Research organizational benefits of using databases and DBMS's. Supplement your research with a review of your lessons. Post one advantage a database has over a spreadsheet

  Write in a brief about knowledge management systems

Write in a brief about Knowledge management systems and definition and What is the system about?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd