Identify potential physical threats that require attention

Assignment Help Computer Network Security
Reference no: EM131650511

Assignment

NB: - I do not want to get a copied paper. some has given me and it was retuned by my professor. No plagiarism. recent reference no more than three years. Bear in mind I do not want a copy paper and get another Zero. Someone has played on my grades and time I do not know what he benefited from putting me in water my grade.

Technical Project Paper: Information Systems Security

Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls geared towards protecting medication and funds located on the premises, as well as the personally identifiable information and protected health information of your customers that resides on your system. Your supervisor has tasked you with identifying inherent risks associated with your pharmacy and establishing strong physical and logical access control methods to mitigate the identified risks.

1) Firewall (1)
2) Windows 2012 Active Directory Domain Controllers (DC) (1)
3) File Server (1)
4) Desktop computers (4)
5) Dedicated T1 Connection (1)

957_Server.jpg

Write an eight to ten page paper in which you:

1. Identify at least five potential physical threats that require attention.

2. Determine the impact of at least five potential logical threats that require attention.

3. Detail the security controls (i.e., administrative, preventative, detective, and corrective) that the pharmacy could implement in order to protect it from the five selected physical threats.

4. Explain in detail the security controls (i.e., administrative, preventative, detective, and corrective) that could be implemented to protect from the five selected logical threats.

5. For each of the five selected physical threats, choose a strategy for addressing the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.

6. For each of the five selected logical threats, choose a strategy for handling the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.

7. Use at least five quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Reference no: EM131650511

Questions Cloud

What are the motives and common attack methods : What are the motives and common attack methods? How do you secure these protocols to prevent an attack? How do you deal with an infection?
Define the proposed management change : Miller and Wiseman then sought to restructure the business form of the partnership to eliminate the need for Lach's consent to the proposed management change
Define effective management : How can effective management provide a better business environment that benefits all parties, including employees, employers, and customers
Recruit marketing professionals : As you recruit marketing professionals, identify some recruitment websites that you recommend be used for your Internet postings and the reasons.
Identify potential physical threats that require attention : Identify at least five potential physical threats that require attention. Determine the impact of five potential logical threats that require attention.
Discuss the several ways to manage devices : There are several ways to manage devices. The traditional way recognizes system devices in the order in which they are detected by the operating system.
Discuss justifying unethical conduct : Unethical conduct is not necessarily illegal conduct; however, the difference between ethical and unethical conduct can be difficult to spot. Using the Internet
Combination of the paging file and system physical memory : In some Windows operating systems, the paging file is a hidden file on the computer's hard disk and its virtual memory is the combination of the paging file.
Describe long-term control and quick relief treatment option : Describe long-term control and quick relief treatment options for asthma patients, as well as the impact these drugs might have on patients.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Assignment on network security policy plan

Research and discuss the items that you would place in such a plan, and justify your reasoning for the items that you have decided to include.

  Explain the importance of standards organizations

A number of organizations exist to define information security standards. Explain the importance of standards organizations with regard to both information systems and information systems security

  Create a network diagram of a network and in a data flow

Create a network diagram of a network and / or in a data flow where your real-world example would exist using a diagramming application such as Visio or Dia.

  Understanding and perspective of current hot topics

Build an understanding and perspective of current hot topics in Information Security - Biometrics for authentication: security and privacy implications.

  Research commercial data repositories be sure to understand

in this writing assignment you will create a brochure advertising your services as a data repository.research

  What are the various types of malware

What is buffer overflow, and how is it used against a Web server?Why does polymorphism cause greater concern than traditional malware? How does is affect detection?

  Computer security breaches that occurred during april-august

ITC595- Research the May 2017 ransomware cyber-attack on the web and prepare a report How was the attack carried out-What could have been done to prevent attack

  Combine the two disks into one logical volume

Illustrate your explanation by using the Linux Log- ical Volume Manager to combine the two spare disks available on the Virtual Debian distribution. Combine the two disks into one logical volume. Format the new logical disk and modify the /etc/fst..

  Analyze current state of insider threats to computer systems

Analyze the current state of insider threats to computer systems and infrastructure in terms of numbers, costs and potential problems. What are the various profiles of insiders who may compromise your systems?

  Find sequence of courses to satisfy all prerequisites

Bob loves foreign languages and wants to plan his course schedule for the following years. He is interested in the following nine language courses: LA15, LA16, LA22, LA31, LA32, LA126, LA127, LA141.

  Benefits of having a computer security

In your report, discuss the benefits of having a computer security incident response team within your enterprise. Also discuss the major steps involved in responding to a system security incident. Support your report with real-life examples.

  Explain the fundamentals of public key infrastructure

Identify the fundamentals of public key infrastructure (PKI). Describe the manner in which your solution will protect the privacy of data transmitted across the WAN.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd