Explain in detail the security controls

Assignment Help Computer Network Security
Reference no: EM13778111

Information Systems Security

Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls geared towards protecting medication and funds located on the premises, as well as the personally identifiable information and protected health information of your customers that resides on your system. Your supervisor has tasked you with identifying inherent risks associated with your pharmacy and establishing strong physical and logical access control methods to mitigate the identified risks.

1) Firewall (1)

2) Windows 2012 Active Directory Domain Controllers (DC) (1)

3) File Server (1)

4) Desktop computers (4)

5) Dedicated T1 Connection (1)

Write an eight to ten (8-10) page paper in which you:

Identify at least five (5) potential physical threats that require attention.

Determine the impact of at least five (5) potential logical threats that require attention.

Detail the security controls (i.e., administrative, preventative, detective, and corrective) that the pharmacy could implement in order to protect it from the five (5) selected physical threats.

Explain in detail the security controls (i.e., administrative, preventative, detective, and corrective) that could be implemented to protect from the five (5) selected logical threats.

For each of the five (5) selected physical threats, choose a strategy for addressing the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.

For each of the five (5) selected logical threats, choose a strategy for handling the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.

Use at least five (5) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook

Reference no: EM13778111

Identify the key elements in certificate

Identify the key elements in this certificate, including the owners name and public key, its validity dates, the name of the CA that signed it, and the type and value of sig

Network threats

confidentiality, integrity and availability, trojan horse, Compress the data, Caesar cipher, rail fence cipher, PGP operation, network perimeter, MSFT, RSA cryptosystem

Explain security model of class using cnss model

suppose that the security model is required for protection of your class. Using CNSS model, examine each of the cells and write a short statement.

What are stateful inspection firewalls

Why are many of the reliable, effective biometric systems perceived as intrusive by users? What are stateful inspection firewalls and how do the tables track the state and c

Use private key to decrypt the cipher text

Using blocks of 4 encrypt the message I AM AN MSC STUDENT MAJORING IN SECURITY using the public key above. Similarly use the private key above to decrypt the cipher text.

Do any coders need to be placed on probation

Do any coders need to be placed on probation? Do any coders need to be considered for termination? Are any coders in their probationary period in jeopardy of not meeting the p

Develop the identity management and security awareness plan

Utilizing your comprehensive security plan outline as a guide, develop the identity management and security awareness training plan strategy for the organization. Upload th

Explain two-bit system noninterference-secure

The initial state is not output (in contrast to the example). Is this version of two-bit system noninterference-secure with respect to Lucy? Why or why not?

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd