Analyze any potential physical vulnerabilities and threats

Assignment Help Computer Network Security
Reference no: EM13804019

You are the Information Security Officer for a small pharmacy that has recently been opened in the local shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls to protect medication and funds maintained located on the premises and personally identifiable information and protected health information of your customers.

Your supervisor has tasked you with identifying inherent risks associated with this pharmacy and establishing physical and logical access control methods that will mitigate the risks identified.

1) Firewall 

2) Desktop computers 

3) Windows 2008 Active Directory Domain Controllers (DC) 

4) Dedicated T1 Connection (1)

5) File Server

Write a ten to fifteen (10-15) page paper in which you:

1. Identify and analyze any potential physical vulnerabilities and threats that require consideration.

2. Identify and analyze any potential logical vulnerabilities and threats that require consideration.

3. Illustrate in writing the potential impact of all identified physical vulnerabilities and threats to the network and the pharmacy.

4. Identify all potential vulnerabilities that may exist in the documented network.

5. Illustrate in writing the potential impact of all identified logical vulnerabilities to the network and the pharmacy.

6. For each physical vulnerability and threat identified, choose a strategy for dealing with the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance).

7. For each logical vulnerability and threat identified, choose a strategy for dealing with the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance).

8. For each physical vulnerability and threat identified, develop controls (i.e., administrative, preventative, detective, and corrective) that will be used to mitigate each risk.

9. For each logical vulnerability and threat identified, develop controls (i.e., administrative, preventative, detective, and corrective) that will be used to mitigate each risk.

712_server.png

Reference no: EM13804019

Explain how to hack the most common web browser

Discuss and explain how to hack the most common Web browser. Also include methods for securing Web browsers. Include at least two different Web browsers in your discussion.

Strategy for dealing with the risk

For each malicious attack and threat identified, choose a strategy for dealing with the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance)

Sarbanes oxley act and gramm leach bliley act

Provide an overview that will be delivered to senior management of regulatory requirements the agency needs to be aware of, including: FISMA, Sarbanes-Oxley Act and Gramm-Le

Analyze the necessity for different protocols

Identify common frequency bands used in current RF communications. Analyze the necessity for different protocols in wireless communications. Compare the challenges of using sa

Explain importance of explicit enterprise security policies

Identify the predominant electronic and physical threats to communications networks. Explain the importance of explicit enterprise security policies and procedures. Describe p

Write paper about stuxnet virus

Select a research topic from the list below. After selecting your topic, research the incident using news articles, magazine articles (trade press), journal articles, and/or

Ethics or values within the hacking subculture.

Write a 1-2 page essay defining and showing examples of hacking and its subculture. Do hackers have ethics or values? If so, give examples of ethics or values within the hacki

Computer security for your company

Present a brief summary of the arguments for and against outsourcing computer security for your company. Select two firms that offer computer security outsourcing services, a

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd