Explain in detail the security controls

Assignment Help Computer Network Security
Reference no: EM13778111

Information Systems Security

Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls geared towards protecting medication and funds located on the premises, as well as the personally identifiable information and protected health information of your customers that resides on your system. Your supervisor has tasked you with identifying inherent risks associated with your pharmacy and establishing strong physical and logical access control methods to mitigate the identified risks.

1) Firewall (1)

2) Windows 2012 Active Directory Domain Controllers (DC) (1)

3) File Server (1)

4) Desktop computers (4)

5) Dedicated T1 Connection (1)

Write an eight to ten (8-10) page paper in which you:

Identify at least five (5) potential physical threats that require attention.

Determine the impact of at least five (5) potential logical threats that require attention.

Detail the security controls (i.e., administrative, preventative, detective, and corrective) that the pharmacy could implement in order to protect it from the five (5) selected physical threats.

Explain in detail the security controls (i.e., administrative, preventative, detective, and corrective) that could be implemented to protect from the five (5) selected logical threats.

For each of the five (5) selected physical threats, choose a strategy for addressing the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.

For each of the five (5) selected logical threats, choose a strategy for handling the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.

Use at least five (5) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook

Reference no: EM13778111

Questions Cloud

Develop a personal definition of middleware : Diagram middleware using a variety of resources (minimum of three), depicting four different types captioned by their definitions. Develop a personal definition of middleware based on your research
Characteristics of a cult : 1) What characteristics of a cult and/or conspiracy and/or moral panic do the case studies share? 2) How do the case studies show how the powerful make some group(s) of people "the Other" or the "scapegoat" blamed for society's problems? What do t..
Theories of pesonality development : What aspects of your cultural upbringing have affected your own personality development? Think about a friend who grew up in a different culture-how did their cultural upbringing and traditions affect their personality development in a way that di..
Problems related to external financing options : How will the perceived value of the stock influence buyers' willingness to purchase the stock? Does PCI expect to fair well in the selling of stock securities?
Explain in detail the security controls : Explain in detail the security controls (i.e., administrative, preventative, detective, and corrective) that could be implemented to protect from the five (5) selected logical threats. Determine the impact of at least five (5) potential logical thr..
Installation of an automatic sprinkling system : Why is the installation of an automatic sprinkling system recommended in machine shops that use lathes to fabricate titanium parts? Be specific.
Describe egocentric thinking-successful egocentric thinking : Describe egocentric thinking, successful egocentric thinking, and unsuccessful egocentric thinking. Then describe examples form your own experience where you successfully and unsuccessfully thought egocentrically.
Legitimate way to investigate reality issues : Can one logically believe both that God knows everything and that there is free will? Explain the difficulty.
What chemical process is involved here : Why might this fire rekindle days later as someone tries to remove the residue with water? What chemical process is involved here?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Improving critical infrastructure cybersecurity

Analyze the way in which CIP has or has not advanced between the releases of the DHS' NIPP and the NIST's Framework for Improving Critical Infrastructure Cybersecurity. Justify your response.

  Nowadays the internet has been very broadly used as a means

nowadays the internet has been very widely used as a means of receiving and processing lots of information which are

  Security risk to acknowledge using macros

Write down 200- to 300-word response which answers the following question: Based on article by Lenning (2005), what is main security risk which users must acknowledge when using macros?

  Which type of computer crime describes actions

Which type of computer crime describes actions in which the computer is used only to further a criminal end? In other words, the computer or data contained therein is not the object of the crime.

  Which of the following acts have made it a crime to break

question 1the computer fraud and abuse act of 1986 prohibits .answer threatening to damage computer systems in order to

  Role of planning when developing a cybersecurity strategy

Describe the role of planning when developing a cybersecurity strategy and what key deliverables would ensure an effective implementation and transition.

  Explain the nature of security assessments is changing

The motivation for security reviews and assessments is changing and, consequently, the nature of security assessments is changing. The practice of risk analysis is relatively less developed in the field of homeland security than in other areas

  Why is network security particularly difficult to achieve

Why is network security particularly difficult to achieve?

  Will your file system of choice provide security

What type of OS to use along with the file system and why is this architecture is better than others? Will you use the same OS for servers and Desktops? Will your file system of choice provide security?

  Analyse potential attacks and give a method of prevention

Write a key exchange protocol for A and B to share a symmetric key. Analyse potential attacks and give a method of prevention and write a key exchange protocol for A and B to share a session key. Must consider mutual authentication, freshness, inte..

  Prepare a graph of the storage requirements

Prepare a graph of the storage requirements for the project.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd