Identify what is at risk from these threats

Assignment Help Management Information Sys
Reference no: EM131146557

Imagine you have recently been hired as the Information security director at a start-up health care research firm, where confidential client data is housed in its Data Center. Currently, the company has 100 employees and expects to expand its workforce to 300 in the next three (3) months and the company is moving to a new location in an urban office building across four (4) floors. The security operations and defensive mechanisms have been run in the past by the Networking Department and due to the move, you have a chance to start anew with the company's security operations to improve its overall security posture.

Write an eight to ten (8-10) page paper in which you:

Identify what you perceive to be the five (5) most concerning threats to the network, computing environment, and the database operations of the company.

Examine each threat you identified in number 1, in which you:

Explain why this is your perception.

Identify what is at risk from these threats.

Determine how you would design the security controls to mitigate the risks involved.

Determine the security defense mechanisms that you would utilize in order to secure communications from floor to floor in the office space, including equipment and physical controls.

Create an office space diagram detailing the security defense tools, equipment and controls utilized, using a diagramming application such as Visio or Dia. Note: The graphically depicted solution is not included in the required page length.

Explain in detail the defensive mechanisms that you would implement to secure the corporate wireless network, including encryption, authentication methods, and at least two (2) WLAN security tools you would utilize on a regular basis.

Create a wireless network diagram, using a diagramming application such as Visio or Dia based on your explanation in number 5. Note: The graphically depicted solution is not included in the required page length.

Determine whether or not you would utilize encryption technologies on the network and / or computing equipment. Justify your response.

Consider the use of a cloud-based solution for storing the company's data. Determine the benefits and / or risks that would result using this kind of data storage, and decide whether or not you would utilize this storage option. Justify your decision.

Select a minimum of five (5) security tools that you would implement on the network as security auditing and / or defense countermeasures.

Analyze each security tool you selected in number 8, and determine why / how you would use them as part of your security operations.

Provide an overview of the recovery and continuity plans you would develop to ensure the company could survive a temporary or prolonged disruption. Explain why each plan is needed based on the benefits it provides to the company.

Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM131146557

Questions Cloud

What is the difference between the current ratio : What is the difference between the current ratio and working capital?
Bottleneck operation by adding new equipment : Markland Manufacturing intends to increase capacity by overcoming a bottleneck operation by adding new equipment. Two vendors have presented proposals.
What are the pros and cons of using expatriates : What are the pros and cons of using expatriates, host-country nationals, and third-country nations to run overseas operations? If you were expanding your business, what approach would you use?
Thinking skills and problem solving malaysian airline mh370 : Thinking Skills and Problem Solving: Malaysian Airline MH370. Acceptability of claims from a report produced by Inmarsat and AAIB. The approach used for evaluation of acceptability of claim.
Identify what is at risk from these threats : Determine the security defense mechanisms that you would utilize in order to secure communications from floor to floor in the office space, including equipment and physical controls.
What does each type of ratio measure : What does each type of ratio measure?(a) Liquidity ratios.(b) Solvency ratios.(c) Profitability ratios.
The break-even point in units for the proposal by vendor : Markland Manufacturing intends to increase capacity by overcoming a bottleneck operation by adding new equipment. Two vendors have presented proposals. The fixed costs are $60, 000 for proposal A and $80, 000 for proposal B. The break-even point in u..
Discuss the barriers that will exist to successful implement : This week, discuss the barriers that will exist to successful implementation of this change. Along with discussing how the change itself will be perceived by the employees, talk about risks to the company, internal and external factors which will cre..
Evaluate restatement in term of management ethical violation : Evaluate the restatement in terms of management's ethical violations according to the requirements of the Sarbanes-Oxley Act, providing recommendations to management on how to avoid these problems in the future.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Where are erp systems heading in the future

Where are ERP systems heading in the future? Do you agree or disagree with the trends discussed in the chapter? Explain

  What are the driving forces behind this shift

Would you contribute to the effort to capture Joseph Kony? Locate an article or video that sheds more light on Kony 2012 and share it with the class. How does your contribution to this topic add to the discussion?

  Explain manychip''s production planning process

Describe how each measure can be applied to Manychip's production planning process - can the company use each one? How and Rank the criteria listed above in order of importance to Manychip's production planning strategy, detailing your rationale for..

  Determine steps in development of an effective erm diagram

Determine the steps in the development of an effective Entity Relationship Model (ERM) Diagram and determine the possible iterative steps / factors that one must consider in this process with consideration of the HR core functions and responsibili..

  Explain the relationship between the it balanced scorecard

Build a balanced scorecard for a typical IT department. Include at least 10 metrics for each perspective. Each metric should be quantifiable; for example, the number of supplier relationships. Explain the relationship between the IT balanced score..

  What are the benefits and risks of cloud computing

What are the benefits and risks of cloud computing? Do you use a cloud to store any of your files or photographs? Does your employer use a cloud to store files or sensitive documents? Don't be quick to say 'no' - do a little research and leg work..

  Future of medical information technology

Medical information technology - organization for the future of medical information technology (IT).

  Utilization of information technology in churches in the

utilization of information technology in churches in the u.s1. i need help with 2 pages overview of how churches in the

  How could speech recognition systems be used

How could speech recognition systems be used in innovative and useful ways? Do you think speech recognition systems eventually will replace humans in common phone interactions? Is this good or bad?

  Implementation of new information systems in organization

Prepare a 350- to 700-word proposal addressing the potential implementation of new information systems in your organization. Explain the usefulness of converting data currently held in Microsoft® Excel® spreadsheets into a relational database using..

  What methodologies have been used for data breaches

What methodologies have been used for data breaches? Different types of attacks ? comparision on attacks how did they happen and how did attackers entered into the system? what are the different companies that have been attacked by these attacks

  Technology that could prevent one''s identity

Describe why someone with a serious medical condition be concerned about researching his or her condition online, through medical search engines or pharmaceutical sites, for example.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd