Technical project paper-information systems security

Assignment Help Computer Network Security
Reference no: EM13924170

Technical Project Paper: Information Systems Security

Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls geared toward protecting medication and funds located on the premises, as well as the customers' personally identifiable information and protected health information that resides on your system. Your supervisor has tasked you with identifying inherent risks associated with your pharmacy and establishing strong physical and logical access control methods to mitigate the identified risks.

1) Firewall (1)     4) Desktop computers (4)

2) Windows 2012 Active Directory Domain Controllers (DC) (1)    5) Dedicated T1 Connection (1)

3) File Server (1)

Write an eight to ten (8-10) page paper in which you:

1. Identify at least five (5) potential physical threats that require attention.

2. Determine the impact of at least five (5) potential logical threats that require attention.

3. Detail the security controls (i.e., administrative, preventative, detective, and corrective) that the pharmacy could implement in order to protect it from the five (5) selected physical threats.

4. Explain in detail the security controls (i.e., administrative, preventative, detective, and corrective) that could be implemented to protect from the five (5) selected logical threats.

5. For each of the five (5) selected physical threats, choose a strategy for addressing the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.

6. For each of the five (5) selected logical threats, choose a strategy for handling the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.

7. Use at least five (5) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Explain the concepts of information systems security as applied to an IT infrastructure.
  • Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.
  • Explain the means attackers use to compromise systems and networks, and defenses used by organizations.
  • Explain the role of access controls in implementing a security policy.
  • Explain how businesses apply cryptography in maintaining information security.
  • Analyze the importance of network principles and architecture to security operations.
  • Use technology and information resources to research issues in information systems security.
  • Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

Reference no: EM13924170

Questions Cloud

Software architecture from software architect point of view : Prepare a PowerPoint presentation or a 500 word document that explains how this relates to software architecture from a software architect's point of view, and to promote or dispel the need for such a test.
Key concepts from jackson and trochim-donnelly : Part I checks your understanding of key concepts from Jackson and Trochim & Donnelly. Answer the following questions: 1. Jackson even-numbered Chapter exercises (pp. 220-221; 273-275) 2. What are degrees of freedom? How are the calculated?
Describe a bearish price and volume pattern : Describe a bearish price and volume pattern, and discuss why it is considered bearish. Discuss the logic behind the breadth of market index. How is it used to identify a peak in stock prices?
Interpret the computer cross-tab output : Interpret the following computer cross-tab output including a X2  test. Interpret the computer cross-tab output, including a Chi-square test.
Technical project paper-information systems security : Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access ..
What is the basic format of the income statement : Discuss the importance of financial statements and how they are used by businesses. What is the basic format of the income statement and what is the relevance of the basic categories
Description of the data characteristics : ____ provide(s) a description of the data characteristics and the set of relationships that link the data found within the database. A) Queries B) Metadata C) End-user data D) Information
Models are produced : The common costs will be incurred regardless of how many models are produced. The other fixed expenses would be eliminated if a model is phased out.
Discuss why most technicians follow several technical rules : Discuss why most technicians follow several technical rules and attempt to derive a consensus. Select a stock on NYSE and construct a daily high, low, and close bar chart for it that includes its volume of trading for 10 trading days.

Reviews

Write a Review

Computer Network Security Questions & Answers

  What is the importance of statistical data analysis?

What is the importance of statistical data analysis?

  Management issues of computer security

What are the major defensive mechanisms that can be used to stop such attacks-Pick up one mechanism and comment on it - Management issues of computer security

  Increment value in one cell in excel

Discuss how to increment value in one cell in Excel if another cell is populated. or example, I have cell A that has values such as 1, 2, 3, 4 etc...

  Explain security strategy for a corporate wan

Prescribe a security strategy for a corporate WAN. Be sure to include methods to combat both technical and nontechnical attacks. C

  How adequate destruction of materials ensuring privacy

How will your company ensure adequate destruction of the materials thus ensuring an individual's privacy? Will any state-wide, national, or industry standards be met? If so, which ones and how?

  Explain how you would go about decrypting a message that

explain how you would go about decrypting a message that was encrypted in blocks of length two using an affine

  Plan a high-level backup and disaster recovery plan

Plan a high-level backup and disaster recovery plan for a business. Discuss the security of the network and suggest best practices for securing the business network.

  Examine network security of kundler networks

The next person will have to examine network security of Kundler networks to include routers and firewalls

  Problem regarding the risk assessment

Below is the Global Finance, Inc. (GFI) network diagram. A hypothetical company, GFI has grown rapidly this past year and implemented a number of network devices as displayed in the diagram.

  Identity information of customers and employees

In 300- to 400-words, explain why security professionals must be aware of the requirements for protecting personal identification information (PII) that may be stored on organizational information systems. Also, describe phishing and how it can be ..

  Explain how significant is wireless networking to your

question 1 how important is wireless networking to your company? would your company improve the salesservice process

  It infrastructure management what to do for task 2a

what to do for task 2a 15 ltbrgt ltbrgtsubmit your enterprise architect blog as a single page with the web address of

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd