Recognize and examine any potential physical

Assignment Help Database Management System
Reference no: EM13470623

You are the Information Security Officer for a small pharmacy that has recently been opened in the local shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls to protect medication and funds maintained located on the premises and personally identifiable information and protected health information of your customers. Your supervisor has tasked you with identifying inherent risks associated with this pharmacy and establishing physical and logical access control methods that will mitigate the risks identified.

  • Firewall (1)
  • Windows 2008 Active Directory Domain Controllers (DC) (1)
  • File Server (1)
  • Desktop computers (4)
  • Dedicated T1 Connection (1)

Write a ten to fifteen (10-15) page paper in which you:

1) Identify and analyze any potential physical vulnerabilities and threats that require consideration.

2) Identify and analyze any potential logical vulnerabilities and threats that require consideration.

3) Illustrate in writing the potential impact of all identified physical vulnerabilities and threats to the network and the pharmacy.

4) Identify all potential vulnerabilities that may exist in the documented network.

5) Illustrate in writing the potential impact of all identified logical vulnerabilities to the network and the pharmacy.

6) For each physical vulnerability and threat identified, choose a strategy for dealing with the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance).

7) For each logical vulnerability and threat identified, choose a strategy for dealing with the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance).

8) For each physical vulnerability and threat identified, develop controls (i.e., administrative, preventative, detective, and corrective) that will be used to mitigate each risk.

9) For each logical vulnerability and threat identified, develop controls (i.e., administrative, preventative, detective, and corrective) that will be used to mitigate each risk.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.

Reference no: EM13470623

Questions Cloud

How many complaints would there be by category at end of : customer complaint data showed that within the last year complaints by category were as follows publication subscribers
A researcher is interested in knowing if there are : a researcher is interested in knowing if there are differences between the incidence of accidents among male and female
Choose a continuous variable that is interval or ratio in : pick a continuous variable that is interval or ratio in scale of measurement that is normally distributed. explain the
After a lengthy description he further challenged you to : you are the new chief information officer for acme widgets. the president of the company recently asked you what you
Recognize and examine any potential physical : you are the information security officer for a small pharmacy that has recently been opened in the local shopping mall.
Calculate value of put option to sell shell for 22 half : suppose that a share of shell costs 21 now and that the continuously compounded risk-free rate is 1. compute the value
How to use laws of exponents in diffrent question that are : how to use laws of exponents in diffrent question that are possible to come and
The alternative is that subject has esp and can guess at : an esp experiment is done in which a participant guesses which of 8 cards the researcher has randomly picked where each
A researcher predicts that watching a film on : a researcher predicts that watching a film on institutionalization will change students attitudes about chronically

Reviews

Write a Review

Database Management System Questions & Answers

  Recognize business processes evaluated-dw-bi application

Identify the business processes which would be evaluated and tracked with a DW/BI application and state your reasoning or justification for including these in the DW/BI.

  Access values through queries to databases

However, the only way you can access values is through queries to the databases. In single query, you can specify value k to one of two databases.

  Create a database from scratch

Create a database from scratch that contains, at a minimum, the elements listed below

  Write a paper describing project management lifecycle

Write a paper describing Project management lifecycle and Systems Delivery lifecycle.Your paper must contain two well-formed paragraphs (a topic sentence supported by three to four additional sentences).

  Specify the foreign keys for schema

First, specify the foreign keys for this schema, stating any assumptions you make. Next, populate the relations with a few example tuples.

  Part ause the prime minister database primeminister2013sql

part ause the prime minister database primeminister2013.sql available from the interact site. answer the following

  The task in this project is to design a normalized database

the task in this project is to design a normalized database that could be used to collect and store information for a

  The cio asks you to describe why you believe it is

you are the information security officer at a medium-sized company 1500 employees. the cio asks you to explain why you

  Write an essay on marketing management

The customer is always right -The customer doesn't know what's best. It's the baker's (marketer's) job to educate him. The above statements succinctly point out a subtle battle which rages within the marketing discipline.

  Describe the normal forms violated in the design

Describe the normal forms violated in the following design and fix them to the third normal form.

  Draw dfd for placing order based on the e-r diagram

Draw a DFD (Context and Level 1) for placing an order based on the E-R diagram shown here.

  Consider the following database that contains information

consider the following database that contains information about people vacation locations and when those people visited

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd