Assignment on information systems security

Assignment Help Computer Network Security
Reference no: EM13928670

Information Systems Security

You are the Information Security Officer for a small pharmacy did Has recently been opened in the local shopping mall. The daily operational of a pharmacy is a unique business requires a combination of did Both physical and logical access controls to protect medication and funds maintained located on the premises and personally identifiable information and protected health information of your customers. Your Has supervisor tasked you with inherently Identifying Risks associated with this pharmacy and Establishing physical and logical access control methods thatwill mitigate the Risks Identified.

1) firewall (1)

2) Windows 2008 Active Directory Domain

Controller (DC) (1)

3) file servers (1)

4) Desktop computers (4)

5) Dedicated T1 Connection (1)

Write a twelve (12) page paper in Which you:

Write a ten to fifteen (10-15) page paper in which you:

1. Identify and analyze any potential physical vulnerabilities and threats that require consideration.

2. Identify and analyze any potential logical vulnerabilities and threats that require consideration.

3. Illustrate in writing the potential impact of all identified physical vulnerabilities and threats to the network and the pharmacy.

4. Identify all potential vulnerabilities that may exist in the documented network.

5. Illustrate in writing the potential impact of all identified logical vulnerabilities to the network and the pharmacy.

Reference no: EM13928670

Questions Cloud

Benefits of social media such as facebook : One of the important benefits of social media such as Facebook and Twitter is that they allow marketers to easily learn what consumers are saying about their brand - and about the competition
Approach to the marketplace with a good marketing audit : Which control should periodically reassess its approach to the marketplace with a good marketing audit?
Analyze the role each stakeholder has in the strategies : Analyze what programs and services are available to address the challenges.
Calculate keystones return on stockholders equity : Calculate Keystone's return on stockholders' equity. What does a comparison of Keystone to these averages indicate about the firm's strengths and weaknesses?
Assignment on information systems security : You are the Information Security Officer for a small pharmacy did Has recently been opened in the local shopping mall.
How is survey feedback used to institute strategic change : How is survey feedback used to institute strategic change within organizations? Based on your research, defend its use in today's global business economy
Identify risks inherent in the use of wireless : 1. Identify risks inherent in the use of wireless and mobile technologies. 2. Analyze the identified risks and develop factors to mitigate the risks.
Effort to create this modern world : Having expended so much effort to create this modern world, people believed that we would not possibly stoop to war, because war is so destructive. (therefore they concluded that it was not reasonable to go to war-man would agree to stop fighting)..
Process of identifying and analyzing sub-groups of buyers : The sponsor makes payment for the communication via one or more forms of media (e.g., television, radio, magazine, newspaper, online).

Reviews

Write a Review

Computer Network Security Questions & Answers

  Security threats to mobile devices and counter measures

Provide your published (to the forum/blog) research report on the chosen topic with brief supportive descriptions about the challenges, problems, relevant technologies, applications of the technologies, clarify vague areas and research questions.

  Find out about the cryptosystems and protocols

Go to a popular online electronic commerce site like Amazon.com. What can you find out about the cryptosystems and protocols in use to protect this transaction

  Computer forensics investigation

After a computer forensics investigation, you require to meet with your section or group of fellow investigators and critique the case in an effort to improve your work.

  Differences between viruses and other malicious codes

differences between viruses and other malicious codes

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  Explain a technique used by hackers to cover their tracks

describe a technique used by hackers to cover their tracks after a network attack. this may take a little bit of

  Decision on it security investments

Discuss whether true unity is technically possible and why or why not If true unity is not technically possible, how should budgeters and policy-makers be guided to make the correct decision on IT Security investments?

  Explain the purpose of using cvss scores

Select a recent vulnerability from that Database and analyse it from the what problems they can cause (malicious activities an attacker may use them for, including attack types)

  Describing the some of the issues you might face

Assignment: Write a 3-to 4-page paper describing the some of the issues you might face when maintaining security in a company that has offices in multiple countries

  Define ways to protect sensitive information in transit

Since the Internet is a public network, what are some ways that a company can protect sensitive information in transit

  Compute value of shared secret key

You have secretly picked value SA = 17. You begin session by sending Bob your computed value of TA. Bob responds by sending you value TB = 291. What is the value of your shared secret key?

  Availability of the organizations information assets

Your plan must be in nontechnical terms to the user population that incorporates the confidentiality, integrity, and availability of the organization's information assets.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd