Information systems security

Assignment Help Computer Network Security
Reference no: EM13928462

Information Systems Security

You are the Information Security Officer for a small pharmacy did Has recently been opened in the local shopping mall. The daily operational of a pharmacy is a unique business requires a combination of did Both physical and logical access controls to protect medication and funds maintained located on the premises and personally identifiable information and protected health information of your customers. Your Has supervisor tasked you with inherently Identifying Risks associated with this pharmacy and Establishing physical and logical access control methods thatwill mitigate the Risks Identified.

1) firewall (1)

2) Windows 2008 Active Directory Domain

Controller (DC) (1)

3) file servers (1)

4) Desktop computers (4)

5) Dedicated T1 Connection (1)

Write a twelve (12) page paper in Which you:

Write a ten to fifteen (10-15) page paper in which you:

1. Identify and analyze any potential physical vulnerabilities and threats that require consideration.

2. Identify and analyze any potential logical vulnerabilities and threats that require consideration.

3. Illustrate in writing the potential impact of all identified physical vulnerabilities and threats to the network and the pharmacy.

4. Identify all potential vulnerabilities that may exist in the documented network.

5. Illustrate in writing the potential impact of all identified logical vulnerabilities to the network and the pharmacy.

Reference no: EM13928462

Questions Cloud

Determine fishers working capital investment : Determine Fisher's working capital investment. Determine Fisher's current ratio. Determine Fisher's return on stockholders' equity if its 2010 earnings after tax are $10,000(000).
Does the sox adequately protect the public : Do you think current ethical guidelines and constraints under the Sarbanes - Oxley Act of 2002 sufficiently restored public confidence in our financial institutions
Develop a web portal of employer-job applicants : Develop a web portal of Employer-Job Applicants Career Tracer for Royal Areas Electricity Company (RAECO).
Second stage of the consumer buying process : What is the second stage of the consumer buying process? a) Purchase decision b) Buyer satisfaction c) Information search d) Evaluation of alternatives
Information systems security : You are the Information Security Officer for a small pharmacy did Has recently been opened in the local shopping mall. The daily operational of a pharmacy is a unique business requires a combination of did Both physical and logical access controls..
Policy monitoring and policy evaluation : Prepare a 250- to 350 word brief comparing and contrasting policy monitoring and policy evaluation. This brief is intended for a high level executive of your agency/organization, so ensure that you keep it concise and relevant
Necessary to perform a multiply using the approach : Calculate the time necessary to perform a multiply using the approach given in Figures 3.4 and 3.5 if an integer is 8 bits wide and each step of the operation takes 4 time units. Assume that in step 1a an additional is always performed - either th..
Identify risks inherent in the use of wireless : 1. Identify risks inherent in the use of wireless and mobile technologies. 2. Analyze the identified risks and develop factors to mitigate the risks. 3. Provide a sound recommendation to be employed in the doctor's office.
Why would a warehouse be described as a necessary evil : Why would a warehouse be described as a "necessary evil" and Discuss and illustrate the role of warehouses in reverse logistics.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Network risk assessment

The key to this assignment is to demonstrate your understanding of the topics for the course, not to re-word the text or reference material. Please see Appendix A for the grading rubric on all written assignments.

  Encryption in investigations

Encryption in Investigations-Discuss in your own words the effects that encryption can have on incident response activities, and explain how the use of encryption technologies could prove to be detrimental to an investigation

  Uniform law for computer information transactions

After more than ten years of proposals, revisions and re-revisions, the National Conference of Commissioners on Uniform State Laws at long last voted to adopt the Uniform Computer Information Transactions Act on July 29.

  Combine the two disks into one logical volume

Illustrate your explanation by using the Linux Log- ical Volume Manager to combine the two spare disks available on the Virtual Debian distribution. Combine the two disks into one logical volume. Format the new logical disk and modify the /etc/fst..

  Explain what scalability means in kerberos

One of the strengths of Kerberos is its scalability. Explain what scalability means in Kerberos and how the Kerberos system facilitates scalability.

  What hacking of memory or hacking of ram means

what hacking of memory or hacking of RAM means

  Explain your method of attack

Explain your method of attack and operation within reasonable parameters of the law. Discuss specific malware, social engineer, or any other type of attacks you would deploy to achieve your desired goals

  Analyze the significance of hacking

Analyze the significance of hacking in organizations and modern society. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources

  Analysis of the network security

You have just been hired as the security administrator of a major organization that was recently breached by a social engineer. After a thorough analysis of the network security

  What are some benefit of a feistel structure

How would you protect the passwords on your system using some of the mechanisms we have studied? Discuss implementation strategies and explain your decisions.

  Determine what the risk to an organisation

Security professionals need to ensure that they keep up to date with the latest threats and security issues. This allows them to update their risk profiles.

  What might be your three most important concerns

Many hackers claim to believe that "access to computers should be unlimited and total" and that "all information should be free." Do you agree with these statements? Why or why not?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd