Technical project paper-information systems security

Assignment Help Computer Networking
Reference no: EM131689629

Technical Project Paper Submission

Click the link above to submit this assignment.

Students, please view the "Submit a Clickable Rubric Assignment" video in the Student Center.

Instructors, training on how to grade is within the Instructor Center.

Technical Project Paper: Information Systems Security

Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls geared towards protecting medication and funds located on the premises, as well as the personally identifiable information and protected health information of your customers that resides on your system. Your supervisor has tasked you with identifying inherent risks associated with your pharmacy and establishing strong physical and logical access control methods to mitigate the identified risks.

1) Firewall (1)

4) Desktop computers (4)

2) Windows 2012 Active Directory Domain Controllers (DC) (1)

5) Dedicated T1 Connection (1)

3) File Server (1)


Write an eight to ten (8-10) page paper in which you:

1. Identify at least five (5) potential physical threats that require attention.

2. Determine the impact of at least five (5) potential logical threats that require attention.

3. Detail the security controls (i.e., administrative, preventative, detective, and corrective) that the pharmacy could implement in order to protect it from the five (5) selected physical threats.

4. Explain in detail the security controls (i.e., administrative, preventative, detective, and corrective) that could be implemented to protect from the five (5) selected logical threats.

5. For each of the five (5) selected physical threats, choose a strategy for addressing the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.

6. For each of the five (5) selected logical threats, choose a strategy for handling the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.

7. Use at least five (5) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Explain the concepts of information systems security as applied to an IT infrastructure.
  • Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.
  • Explain the means attackers use to compromise systems and networks, and defenses used by organizations.
  • Explain the role of access controls in implementing a security policy.
  • Explain how businesses apply cryptography in maintaining information security.
  • Analyze the importance of network principles and architecture to security operations.
  • Use technology and information resources to research issues in information systems security.
  • Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

Reference no: EM131689629

Questions Cloud

Find and post all the protocols that the site is using : Find and post all the protocols that the site is using (click on the lock on the right end side of your browser menu for IE).
What are some of the pitfalls in cost estimating : What are some of the pitfalls in cost estimating? What steps can a project manager take to address potential cost overruns?
Satisfaction concerning factors : Analyze the users' level of satisfaction concerning factors associated with information security and risks.
Compute adequate travel time between classes and study : As a result of complaints from both students and faculty about lateness, the registrar at a large university wants to adjust the scheduled class times.
Technical project paper-information systems security : Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall.
Write a persuasive paper on your perspective of case : Discuss how the decision of the case may have been different if decided in the last 5 years. Use a more recent case as a basis of comparison.
Research methodologies and the irb : Create a presentation describing 9 different research methodologies and designs that you find interesting. Also, include information describing the IRB and its
Determine the case of cloth factory : The operations manager at a clothing factory needs to determine whether a new machine is producing a particular type of cloth according to the manufacturers.
Explain how information technology assist in risk management : Explain how information technology assists in risk management, continuous monitoring, business continuity planning and disaster recovery of a business?

Reviews

Write a Review

Computer Networking Questions & Answers

  List three advantages of cloud-based storage

List three advantages of cloud-based storage and explain your rationale for choosing each one. List three disadvantages of cloud-based storage and explain your rationale for choosing each one.

  Explain how wimax works

What are some future technologies that might change how we access the Internet? -  Explain how WiMax works.

  State one reason why they need an isp

State one advantage of using a wireless connection compared to a cables connection. They now decide to connect their three compers to the internet. State one reason why they need an ISP

  Develop a security policy for a business

Using the information on open ports you found with NetInfo in Hands-On Project 9-5, research these ports to determine their function and whether leaving them.

  Consider given logic diagram of a combinational circuit

Determine the value of base x if (211)x = (6A)16. Convert the followings: i) 0xBAD into a decimal number ii) 58810 into a 3-base number.

  Maximum size of file-tcp sequence numbers are not exhausted

Consider transferring a large file of L bytes from Host A to Host B. Assume a MSS of 1460 bytes. What is the maximum value of L such that the TCP sequence numbers are not exhausted?

  Differences between classful and classless routing

Explain the differences between- a routing protocol and a routed protocol, classful and classless routing and Distance Vector Routing Protocols and Link State Routing Protocols

  Discuss ethical behaviour in accordance

MN501 - Network Management in Organisations - Identify potential ethical and social issues related to IT administration ethics and Discuss ethical and social issues

  Describe the hardware you will purchase or build

Describe the hardware you will purchase or build (inclusive of computers, memory, storage, video cards, printers, routers and cabling).

  Prepare a diagram of the dsl and cable modem connections to

research dsl and cable modem services available closest to your community. you may use neighboring communities or

  Problems in the wan found in the virtual organizations

Write the assessment for Riordan Manufacturing using the service request SR-rm-008 Legacy Problems in the WAN found in the Virtual Organizations.

  How many questions must john ask

How many questions must John ask to be sure he can determine the card? What questions should he ask to minimize the average number of questions that are required?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd