Star Biotech uses living organisms to develop new drugs

Assignment Help Basic Computer Science
Reference no: EM133478969

BUSINESS CASE: Star Biotech Company: Star Biotech uses living organisms to develop new drugs. Star Biotech focus on developing treatments for diseases that are difficult to treat with traditional drugs. Star Biotech has an IT system with office desktop computers and a data center. There are two departments.

The Star Biotech research and development department with 50 employees assigned to involve mission-critical data processing. Each and every computer is part of an important business process, therefore, data communication traffic that is directed at each computer should be monitored.

The management office is the second department of Star Biotech. Where 100 employees are conducting regular business activities in the management office department. The data communication traffic among all these computers should be monitored network traffic for suspicious activity.

QUESTION 1. You, as an IT manager should make a decision about the network security tool that monitors network or system activity for malicious or unauthorized behavior for both departments. Read the given parameters and write your decision about the type of intrusion detection system you would use in two departments

QUESTION 2. As an IT manager, your task is to prevent possible intrusion by employing user authentication. Authentication should require more than one piece of information to verify a user's identity to access to OS. For accessing the computers in research and development; authentication must be more difficult for attackers to gain access to a user's account, even if they have stolen their password. What kind of authentication method you would use for computers OS in research and development? Write examples for each piece of information that you would ask from the user.

QUESTION 3. As an IT manager, your task is to come up with file system access control (also known as file permissions) for the computers. So, the owner of the Star Biotech IT system would be able to determine who can access files and folders on each computer in. You should come up with a solution to protect sensitive data in the research and development department computers from unauthorized access. Consider the given pavements below and write which access control models you would deploy

There should be a hierarchical approach to access control. All the documents in the computers were already classified as Confidential, Secret, and Top secret. The sensitivity levels are in order from most sensitive to least sensitive.

QUESTION 4. As an IT manager, your task is to reduce the risk of attack on Star Biotech computers, increase security: and improve performance by implementing operating system hardening for each computer. Write the steps that you will follow to secure the operating system in each computer.

QUESTION 5. Once the OS for each computer is appropriately built, secured, and deployed, the process of maintaining security is continuous. This results from the constantly changing environment, the discovery of new vulnerabilities, and hence exposure to new threats. As an IT manager, how you would provide security maintenance in the long run? Write the steps

Reference no: EM133478969

Questions Cloud

Quality of organization business continuity plan : The quality of an organization's business continuity plan (BCP) will directly influence how well it performs during a crisis.
Definition of standard operating procedure : What is the definition of a Standard Operating Procedure (SOP)? Why would you need SOP for end users for a software application?
Wireless network investigative tools : A critical skill for investigators is the mastery and use of wireless network investigative tools that are used for traffic sniffing, detection, and analysis.
What gaming console and controllers : What gaming console and controllers would you need? Assume a wide variety in the games that can be played, including Madden NFL, League of Legends,
Star Biotech uses living organisms to develop new drugs : Star Biotech uses living organisms to develop new drugs.Star Biotech focus on developing treatments for diseases that difficult to treat with traditional drugs
Business class routers and switches : Research and provide a summary on available business class routers and switches.
Developing security governance plan for your organization : Describe and differentiate between security policies, standards, and guidelines in developing a Security Governance Plan for your organization.
How did you handle setbacks or obstacles : How did you handle setbacks or obstacles? What was the situation and why was it challenging? How did you track progress?
Discuss the vulnerabilities that computer memory : Discuss the vulnerabilities that computer memory and computer process have that malware can take advantage of and exploit.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Determine the discount percentage

You are to develop pseudocode or C# code that will obtain the total dollars purchased from the user, determine the discount percentage, and display the total amount due. When the purchases are more than $2,000, the discount is 12%. When the purcha..

  Learn about creating good password security

An IT Security consultant has made three primary recommendations regarding passwords. Make authenticators unforgeable, do not allow email or user ID as password

  Improve the performance of the organization

Discuss the most appropriate strategies to improve the performance of the organization.

  Digital divide: is technology deepening the economic gap

Digital divide: is technology deepening the economic gap between rich and poor?

  Referred to keylogging or keyboard capturing

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly

  How security and risk management standards

Essay on how security and risk management standards affect the job you are currently doing professionally.

  Area of the organizational operating environment

How would you implement a biometric access control to secure a highly sensitive area of the organizational operating environment?

  Member of management team reports

A member of your management team reports to you that she is working to get your customers to pay on shorter terms

  Implementing proper security controls and technologies

privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies.

  Securing the sensitive content of disaster recovery plans

Describe the need for providing wide access to the planning documents while securing the sensitive content of the disaster recovery plans

  Text box to input the movie title and radio buttons

On the form include a text box to input the movie title and radio buttons to indicate whether the movie is in DVD or VHS Format.

  Integration testing plan and test cases

Testing is a critical phase of implementation. For this project, you will create a test plan for your proposed system based on your system design

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd