Technical project paper on information systems security

Assignment Help Financial Management
Reference no: EM13835956

Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls geared toward protecting medication and funds located on the premises, as well as the customers' personally identifiable information and protected health information that resides on your system. Your supervisor has tasked you with identifying inherent risks associated with your pharmacy and establishing strong physical and logical access control methods to mitigate the identified risks.

1) Firewall (1) 4) Desktop computers (4)

2) Windows 2012 Active Directory Domain Controllers (DC) (1) 5) Dedicated T1 Connection (1)

3) File Server (1)

Write an eight to ten (8-10) page paper in which you:

1. Identify at least five (5) potential physical threats that require attention.

2. Determine the impact of at least five (5) potential logical threats that require attention.

3. Detail the security controls (i.e., administrative, preventative, detective, and corrective) that the pharmacy could implement in order to protect it from the five (5) selected physical threats.

4. Explain in detail the security controls (i.e., administrative, preventative, detective, and corrective) that could be implemented to protect from the five (5) selected logical threats.

5. For each of the five (5) selected physical threats, choose a strategy for addressing the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.

6. For each of the five (5) selected logical threats, choose a strategy for handling the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.

7. Use at least five (5) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. 

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Explain the concepts of information systems security as applied to an IT infrastructure.

• Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.

• Explain the means attackers use to compromise systems and networks, and defenses used by organizations.

• Explain the role of access controls in implementing a security policy.

• Explain how businesses apply cryptography in maintaining information security.

• Analyze the importance of network principles and architecture to security operations.

• Use technology and information resources to research issues in information systems security.

• Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

Reference no: EM13835956

Questions Cloud

Define the types of prostitution : Create a 6- to 8-slide PowerPoint presentation (including a title and reference slide) addressing the following: Define the types of prostitution and Reasons contributing to a person becoming a prostitute
Define the types of prostitution : Create a 6- to 8-slide PowerPoint presentation (including a title and reference slide) addressing the following: Define the types of prostitution and Reasons contributing to a person becoming a prostitute
Project identification and system request : As project manager, you had to estimate the project’s effort and schedule. The users would expect at least general ranges for a product delivery date. Begin by estimating the project’s effort using use case points using the project effort estimation ..
Prepare a statement showing the incremental cash flows : Prepare a statement showing the incremental cash flows
Technical project paper on information systems security : Technical Project Paper: Information Systems Security
Identify and discuss big data use case : Identify and discuss Big Data use case - create and discuss business strategy for Big Data use case
Determine what strategists are and what they do : Determine what strategists are, and what they do in an organization. Support your answer with at least two examples and detail where applicable
Describe the five stages of sleep : Describe the five stages of sleep. What is happening to the brain and/or body in each stage? Describe at least one effect of sleep deprivation. Describe at least one sleep disorder
Prepare a report on the marketing activities of a brand : In this assignment you are required to prepare a report on the performance/marketing activities of a brand in terms of marketing mix and positioning as well as the branding of the brand.

Reviews

Write a Review

Financial Management Questions & Answers

  Foreign company acquisition

Acquisition by a foreign company and the effects of that decision and the results of foreign exchange in Euro and the exchange rate differences.

  Financial management for profit and non profit organizations

In this essay, we are going to discuss the issues of financial management in a non-profit organisation.

  Method for estimating a venture''s value

Evaluate venture's present value, cash and surplus cash and basic venture capital.

  Replacement analysis

This document show the Replacement Analysis of modling machine. Is replacement give profit to company or not?

  Business finance task - capital budgeting

Your company is considering using the payback period for capital-budgeting. Discuss the advantages and disadvantages of this technique.

  Analysis of the investment

In this project, you will focus on one of these: the additional cost resulting from the purchase of an apple press (a piece of equipment required to manufacture apple juice).

  Conduct a what-if analysis

Review the readings and media for this unit, including the Anthony's Orchard case study media. Familiarise yourself with the Anthony's Orchard company and its current situation.

  Determine operational expenditures

Organisations' behaviour is guided by financial data. In the short term, such data will help determine operational expenditures; in the long term, historical data may help generate forecasts aimed at determining strategic plans. In both instances.

  Personal financial management

How much will you have left over each half year if you adopt the latter course of action?

  Sources of finance for expansion into new foreign markets

A quoted company is considering several long-term sources of finance for expansion into new foreign markets.

  Long term financial planning

This assignment is designed for analyze Long term financial planning begins with the sales forecast and the key input in the long term fincial planning.

  Explain the role of fincial manager

This assignment explain the role of fincial manager, function of manger. And what are the motives of financial manager.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd