Explain role of access controls in implementing a security

Assignment Help Other Subject
Reference no: EM131445055 , Length: word count : 500

Technical Project Paper: Information Systems Security

Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls geared towards protecting medication and funds located on the premises, as well as the personally identifiable information and protected health information of your customers that resides on your system.

Your supervisor has tasked you with identifying inherent risks associated with your pharmacy and establishing strong physical and logical access control methods to mitigate the identified risks.

1) Firewall (1)

2) Windows 2012 Active Directory Domain Controllers (DC) (1)

3) File Server (1)

4) Desktop computers (4)

5) Dedicated T1 Connection (1)

Write an eight to ten (8-10) page paper in which you:

Identify at least five (5) potential physical threats that require attention.

Determine the impact of at least five (5) potential logical threats that require attention.

Detail the security controls (i.e., administrative, preventative, detective, and corrective) that the pharmacy could implement in order to protect it from the five (5) selected physical threats.

Explain in detail the security controls (i.e., administrative, preventative, detective, and corrective) that could be implemented to protect from the five (5) selected logical threats.

For each of the five (5) selected physical threats, choose a strategy for addressing the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.

For each of the five (5) selected logical threats, choose a strategy for handling the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.

Use at least five (5) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Explain the concepts of information systems security as applied to an IT infrastructure.

Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.

Explain the means attackers use to compromise systems and networks, and defenses used by organizations.

Explain the role of access controls in implementing a security policy.

Explain how businesses apply cryptography in maintaining information security.

Analyze the importance of network principles and architecture to security operations.

Use technology and information resources to research issues in information systems security.

Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

Reference no: EM131445055

Questions Cloud

Water bottle to boiling : Is there enough energy in a Bic lighter (5 g of butane) to heat the water in a 500 ml water bottle to boiling? Assume the water is initially at 25 C. Is this also enough energy to boil all of the water? Assume water is 1g/ml. If not, how many ligh..
Analyse system requirement to implement active directory : Analyse the system requirement to implement active directory and install the active directory domain services (AD DS) - implement active directory
Explain what are the supply chain uncertainties and risks : Explore the concepts of Lean Supply Management based on what can be referenced in the concurrent literatures; discuss the critical importance of value adding, waste reduction and high efficiency that the lean approach can bring about.
Describe chaining procedure by listing the links in chain : Describe the chaining procedure by listing the links in the chain.  What will be the final reinforcer?  How will you transition this to a natural reinforce
Explain role of access controls in implementing a security : Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access ..
Radioactivity that is known as isotope-scanning : To that extent, the medical use of radioactivity that is known as isotope-scanning, is often considered as being extreme. What are the dangers of this procedure? Do the pros outweigh the cons?
How manymoles of naoh does that represent : If 11.25 mL of the 1.20 M NaOH solution is used to titrate a solution, then how manymoles of NaOH does that represent?
How do the different meetings affect treatment outcomes : Some of you will have the privilege of being a part of a very healthy group, while others will be a part of a group that is strictly to serve as a means to an end. How do the different meetings affect treatment outcomes and research? Apply what yo..
Original pressure of the gas in mmhg : A gas sample in a rigid container at 455 K is brought to STP (273K and 1 atm). What was the original pressure of the gas in mmHg?

Reviews

Write a Review

Other Subject Questions & Answers

  Develop action steps based on the core points of the book

What are you going to do about it? Develop action steps based on the core points of the book. This section must be a description of how the main ideas will affect your counseling. What professional changes will you implement and share with others?

  Explain why unions often place a priority on seniority

Explain why unions often place a priority on seniority in personnel decisions, whereas employers tend to emphasize ability to perform the job.

  Explain why thomas jefferson encouraged western expansion

Explain why Thomas Jefferson encouraged Western expansion. Explain the repercussion of Wester expansion after the 1800

  What the field of psychology encompasses

What is Psychology Paper develop an essay that explains what the field of psychology encompasses and why having a good understanding of psychology is essential for your career success becoming a lawyer.

  Zoroasters greatest Contribution to religious thought

What is the Persian Zoroaster’s greatest contribution to religious thought?

  Explain the healthy people components of access to care

Explain the Healthy People 2020 components of access to care pertaining to Coverage. Identify at least one consequence that a lack of access to healthcare has on women and girls.

  Are alcoholism and other drug addictions a effect of nature

question 1 are alcoholism and other drug addictions a consequence of nature or nurture? if nurture what environmental

  The growth of the christian church in america today

If you were only to select one, which of the six (6) contemporary trends found in Christianity today listed by Fisher do you believe has the greatest potential for impacting the growth of the Christian Church in America today.

  Emergency planning confused with emergency operations

Emergency Planning is often confused with Emergency Operations. Describe at least two differences between emergency planning and operations. Make sure to explain the goal of emergency planning and what emergency planners do that is different from oth..

  Divorce or perhaps discrimination based on race and religion

Consider 1 human service issue. It might be the lack of affordable housing, poor schools, date rape, divorce, or perhaps discrimination based on race, religion, and disability. You are not limited to these. Consider possible causes for the social ..

  About teacher leadership

Teacher leadership

  Illustrate out regional metamorphism shock metamorphism

define regional metamorphism shock metamorphism contact metamorphism and burial metamorphism. give substantive complete

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd