Explain in detail the security controls

Assignment Help Computer Network Security
Reference no: EM13778111

Information Systems Security

Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls geared towards protecting medication and funds located on the premises, as well as the personally identifiable information and protected health information of your customers that resides on your system. Your supervisor has tasked you with identifying inherent risks associated with your pharmacy and establishing strong physical and logical access control methods to mitigate the identified risks.

1) Firewall (1)

2) Windows 2012 Active Directory Domain Controllers (DC) (1)

3) File Server (1)

4) Desktop computers (4)

5) Dedicated T1 Connection (1)

Write an eight to ten (8-10) page paper in which you:

Identify at least five (5) potential physical threats that require attention.

Determine the impact of at least five (5) potential logical threats that require attention.

Detail the security controls (i.e., administrative, preventative, detective, and corrective) that the pharmacy could implement in order to protect it from the five (5) selected physical threats.

Explain in detail the security controls (i.e., administrative, preventative, detective, and corrective) that could be implemented to protect from the five (5) selected logical threats.

For each of the five (5) selected physical threats, choose a strategy for addressing the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.

For each of the five (5) selected logical threats, choose a strategy for handling the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.

Use at least five (5) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook

Reference no: EM13778111

Questions Cloud

Develop a personal definition of middleware : Diagram middleware using a variety of resources (minimum of three), depicting four different types captioned by their definitions. Develop a personal definition of middleware based on your research
Characteristics of a cult : 1) What characteristics of a cult and/or conspiracy and/or moral panic do the case studies share? 2) How do the case studies show how the powerful make some group(s) of people "the Other" or the "scapegoat" blamed for society's problems? What do t..
Theories of pesonality development : What aspects of your cultural upbringing have affected your own personality development? Think about a friend who grew up in a different culture-how did their cultural upbringing and traditions affect their personality development in a way that di..
Problems related to external financing options : How will the perceived value of the stock influence buyers' willingness to purchase the stock? Does PCI expect to fair well in the selling of stock securities?
Explain in detail the security controls : Explain in detail the security controls (i.e., administrative, preventative, detective, and corrective) that could be implemented to protect from the five (5) selected logical threats. Determine the impact of at least five (5) potential logical thr..
Installation of an automatic sprinkling system : Why is the installation of an automatic sprinkling system recommended in machine shops that use lathes to fabricate titanium parts? Be specific.
Describe egocentric thinking-successful egocentric thinking : Describe egocentric thinking, successful egocentric thinking, and unsuccessful egocentric thinking. Then describe examples form your own experience where you successfully and unsuccessfully thought egocentrically.
Legitimate way to investigate reality issues : Can one logically believe both that God knows everything and that there is free will? Explain the difficulty.
What chemical process is involved here : Why might this fire rekindle days later as someone tries to remove the residue with water? What chemical process is involved here?

Reviews

Write a Review

Computer Network Security Questions & Answers

  What are some windows security infrastructure components

How do you measure security? One of the ways is to calculate risk by the formula: R = T x V x A/C.  What are some Windows security Infrastructure components

  Reliable transmission of large volume data

Modern network applications require reliable transmission of large volume of data with bounded delay, between users and data-centres and between data-centres, potentially half way around the earth. What are the limitations in using distributed data c..

  Peer entity authentication security service

Draw a matrix similar to the table presented in class that shows the relationship between security services and attacks - Peer entity authentication security service

  Describe the new method in details and theoretical basis

Analyze advantages and weaknesses of the new protection method (e. g. implementation cost, runtime, reliability, stability and etc.)

  How a risk-based audit may address these concerns

What is your understanding of how a risk-based audit may address these concerns and explain how you would describe to the management team the difference between a compliance and a substantive audit.

  Explain the importance of standards organizations

A number of organizations exist to define information security standards. Explain the importance of standards organizations with regard to both information systems and information systems security

  How system with capabilities as its access control mechanism

In general, do capabilities offer more or less protection against Trojan horses than do access control lists? Justify your answer in light of the theoretical equivalence of ACLs and C-Lists.

  What sorts of protection is provided by the bank

What sorts of protection is provided by the bank to ensure secure online banking? Justify why the bank would use these security measures.

  The performance of a wimax network appears to be lower than

the performance of a wimax network appears to be lower than expected and you suspect interference to be the cause.

  Efficient means of electronic payments

Think about security concerns and limited resources, do you think public sector entities should consider utilizing PayPal to facilitate inexpensive and efficient means of electronic payments?

  How to encrypt a message using a stream cipher

How to encrypt a message using block cipher algorithms we covered in class? What are the similarities and differences between those algorithms and How to encrypt a message using a stream cipher?

  Describe how a hacker might go about cracking

Describe how a hacker might go about cracking a message encrypted with each type of algorithm -  algorithm where the advantages clearly outweigh the disadvantages.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd