Information systems security

Assignment Help Computer Network Security
Reference no: EM13928462

Information Systems Security

You are the Information Security Officer for a small pharmacy did Has recently been opened in the local shopping mall. The daily operational of a pharmacy is a unique business requires a combination of did Both physical and logical access controls to protect medication and funds maintained located on the premises and personally identifiable information and protected health information of your customers. Your Has supervisor tasked you with inherently Identifying Risks associated with this pharmacy and Establishing physical and logical access control methods thatwill mitigate the Risks Identified.

1) firewall (1)

2) Windows 2008 Active Directory Domain

Controller (DC) (1)

3) file servers (1)

4) Desktop computers (4)

5) Dedicated T1 Connection (1)

Write a twelve (12) page paper in Which you:

Write a ten to fifteen (10-15) page paper in which you:

1. Identify and analyze any potential physical vulnerabilities and threats that require consideration.

2. Identify and analyze any potential logical vulnerabilities and threats that require consideration.

3. Illustrate in writing the potential impact of all identified physical vulnerabilities and threats to the network and the pharmacy.

4. Identify all potential vulnerabilities that may exist in the documented network.

5. Illustrate in writing the potential impact of all identified logical vulnerabilities to the network and the pharmacy.

Reference no: EM13928462

How vulnerable end-users are leaving themselves

Students must NOT include any audio or video files. The PowerPoint virtual presentation will not be formally presented. As a result students must endeavour to convey their v

What actions we need to implement

IT security personnel need to not only know what actions we need to implement, we need to understand why we need to take them and well as the any related background topics.

Protecting intellectual property rights in software

Explain the reason of each of these approaches and explain how each of them can be used to protect property rights in software. Please include any experiences you have had wit

Write a one-page paper recommending the csirt concept

Write a one-page paper recommending the CSIRT concept to the President of Wilmington University. Ensure you discuss the need for a CSIRT team, CSIRT response and benefit of ha

Public- and private-key pair

Public- and private-key pair (Group Project) This is a 2-Week project that contains two main tasks. You need to manage your time well to be able to finish both tasks on time.

Provide one real-world example that demonstrates severity

Examine at least three (3) risks associated with using public wireless access points to gain access to a corporate network. Provide one  real-world example that demonstrates

Describe how the mix of state and non-state actors

Describe how the mix of state and non-state actors you identified should affect policy maker decision-making and policy development for critical infrastructure protection.

Describe what security threats in installing wireless lan

Write a two- page letter to describe what security threats she is facing and how she can decraese these threats. Remember that you are writing for friend, not for a teacher.

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd