Potential physical vulnerabilities and threats

Assignment Help Computer Network Security
Reference no: EM13923342

You are the Information Security Officer for a small pharmacy did Has recently been opened in the local shopping mall. The daily operational of a pharmacy is a unique business requires a combination of did Both physical and logical access controls to protect medication and funds maintained located on the premises and personally identifiable information and protected health information of your customers. Your Has supervisor tasked you with inherently Identifying Risks associated with this pharmacy and Establishing physical and logical access control methods thatwill mitigate the Risks Identified.

1) firewall (1)
2) Windows 2008 Active Directory Domain
Controller (DC) (1)
3) file servers (1)
4) Desktop computers (4)
5) Dedicated T1 Connection (1)

Write a twelve (12) page paper in Which you:

Write a ten to fifteen (10-15) page paper in which you:

1. Identify and analyze any potential physical vulnerabilities and threats that require consideration.
2. Identify and analyze any potential logical vulnerabilities and threats that require consideration.
3. Illustrate in writing the potential impact of all identified physical vulnerabilities and threats to the network and the pharmacy.
4. Identify all potential vulnerabilities that may exist in the documented network.
5. Illustrate in writing the potential impact of all identified logical vulnerabilities to the network and the pharmacy.

Reference no: EM13923342

Questions Cloud

Determine the best way to get to your destination : Determine the best way to get to your destination, and set up the travel arrangements to and from. You may also need transportation while you are at your destination, so arrange that too
Describe how the jensen measure of performance is calculated : Describe how the Jensen measure of performance is calculated. Under what conditions should it give a similar set of portfolio rankings as the Sharpe and Treynor measures?
Staff to maintain integrity of the network : Offsite storage like Cloud technology can allow access to all critical information without invests additional resource to maintain the storage solutions and the staff to maintain integrity of the network.
Explain how the ir measures portfolio performance : The information ratio (IR) has been described as a benefit-cost ratio. Explain how the IR measures portfolio performance and whether this analogy is appropriate.
Potential physical vulnerabilities and threats : Identify and analyze any potential physical vulnerabilities and threats that require consideration.
Identify the key environmental experiences : Identify the key environmental experiences that influenced your life. Recall childhood memories of special places where you formed some connections with the earth through emotional experiences
Difference in the price of a particular : A consumer organization wants to know if there is a difference in the price of a particular toy at three different types of stores. The price of the toy was checked in a sample of five discount toy stores, five variety stores, and five department ..
How the allocation effects are measured : Explain how these two effects are measured and why their sum must equal the total value-added return for the manager.
Amount reported as interest payable for the note : The first interest and principal payment was made on October 1, 2012. In Comet's June 30, 2013, balance sheet, what amount should be reported as Interest Payable for this note?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Type of security problems computer services encounter

Students would enter the room, pick up their jobs, and leave. What kinds of security problems might computer services encounter with a system such as this?

  Mobile wireless networks

3G Safekeeping model, safekeeping architecture standards ITU-T X.805 and ISO/IEC 18028-2, access points (AP), network admission controller (NAC) and authentication server (AS)

  Difference between perception and reputation

Discuss the difference between perception and reputation and explain how can organizational perception affect IT reputation?

  Commutative and ecb mode

Give an example to show that the group of permutations S5 is not commutative and ECB mode with block length 3 and the permutation cipher for the given operation

  Why change the default administrator login and password

what are some of the important measures you can take to ensure that your home wireless network is safe and secure. Change the default administrator login and password. Use something only you will remember.

  Application you are a network administrator in net ambit

you are a network administrator in net ambit inc. the company has one external ip five servers static. one of them

  How many comparisons between hash values are needed

How many comparisons between hash values are needed in the worst case - compute in the worst case?

  Critique the transition process performed by the dms in

write a three to four page paper in which youanalyze the security mechanisms needed to protect the dms systems from

  Exploit vulnerabilities in your systems

Describe common tools and techniques for identifying and analyzing threats and vulnerabilities - Explain the risks of challenging individuals to exploit vulnerabilities in your systems.

  Describe a malware attack that causes the victim

Describe a malware attack that causes the victim to receive physical advertisement and describe how to modify a NAT router to prevent packets with spoofed IP addresses from exiting a private network.

  Open this using a brute-force attack

What is the worst case number of combinations he must now test to try open this using a brute-force attack?

  Fraud and risk factors and enterprise systems

Review the Fraud Risk Factors. Choose one (1) factor which you believe is the most important. Justify your response. Next, choose one (1) factor and determine two (2) policies that a company could put in place in order to counter the risk factor i..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd