Information systems security

Assignment Help Management Information Sys
Reference no: EM13779293

Information Systems Security

Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall.

The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls geared towards protecting medication and funds located on the premises, as well as the personally identifiable information and protected health information of your customers that resides on your system.

Your supervisor has tasked you with identifying inherent risks associated with your pharmacy and establishing strong physical and logical access control methods to mitigate the identified risks.

1) Firewall

2) Windows 2012 Active Directory Domain Controllers (DC)

3) File Server

4) Desktop computers

5) Dedicated T1 Connection

Write an eight to ten (5-7) page paper in which you:

Identify at least five (5) potential physical threats that require attention.

Determine the impact of at least five (5) potential logical threats that require attention.
Detail the security controls (i.e., administrative, preventative, detective, and corrective) that the pharmacy could implement in order to protect it from the five (5) selected physical threats.


Explain in detail the security controls (i.e., administrative, preventative, detective, and corrective) that could be implemented to protect from the five (5) selected logical threats.


For each of the five (5) selected physical threats, choose a strategy for addressing the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.


For each of the five (5) selected logical threats, choose a strategy for handling the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.


Use at least five (5) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Reference no: EM13779293

Questions Cloud

How does the media depict the different types of criminals : The differences in the descriptions utilized by the media. How does the media depict the different types of criminals? Have there been any changes
Steps to critically evaluate research articles : What is the purpose of each of the sections in a typical research article? What are the steps to critically evaluate research articles and how does the scientific method help you do this?
Pros and three cons for each potential business formation : Define each chosen business formation. Explain at least three pros and three cons for each potential business formation
The imprint of technology on policing : Discuss how these advances have changed the way police do business. Support your argument with outside references.
Information systems security : The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls geared towards protecting medication and funds located on the premises.
What is theme of short story necklace by guy de maupassant : Describe what the theme of the short story is The Necklace by Guy de Maupassant. Identify at least two of the literary elements in the short story that contribute to the theme, providing an example of each element.
The white box and black box testing strategies : Define the equivalence classes and boundary values and develop a set of test cases to cover them for the following module description: The module is part of a public TV membership system.
Discuss methodological issues unique to psychological : Discuss the methodological issues and challenges that are unique to psychological research investigating effective treatments for psychological disorders.
Nordstrom''s performance goals : Explain the effort, the reinforcement schedule, and the motivation to succeed. Was the outcome positive motivation or were their negative impacts?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Long-term relationship with one of its customers

key factors to consider when establishing a relationship with a customer and What key factors should a supplier consider when establishing a long-term relationship with one of its customers?

  Contribute to the high failure rate under certain situations

What are some characteristics of software development that contribute to the high failure rate under certain situations?

  Systems solution online travel agencybusiness situation

systems solution online travel agencybusiness situation that requires a systems solution i have selected a small online

  Describe risks it might face when implementing change

Describe risks IT might face when implementing change and Describe internal and external challenges IT faces in meeting the business needs

  Describe the reasons for disneys adoption of itil

Describe the reasons for Disney's adoption of ITIL. Examine the results that were attained by Disney

  Responding to information system security treatsthe

responding to information system security treatsthe original posting question how should organizations respond to

  Contrast data requirements between industries

Compare and contrast data requirements between industries - different industries need to keep a supply chain system working smoothly

  Case for developing strategic information systemsstrategic

case for developing strategic information systemsstrategic information systems sis is critical in the progression of

  Major trends in software1 are networks of pcs and servers

major trends in software1 are networks of pcs and servers making mainframe computers obsolete? explain.2. what major

  Discussing wireless technologies

Write a 350- to 700-word proposal discussing wireless technologies. Your recommendation of at least two wireless technologies that would be beneficial to implement in the Party Plates organization

  Service request for riordan manufacturing

Service Request for Riordan Manufacturing - Explain the benefits of using defined and repeatable processes for accomplishing these activities for the implementation stage.

  Enterprise application that integrates the erp concept

Presentation Server, Application Server, Database Server, Software application Architecture, SAP approach to a traditional Information system, benefits and drawbacks of SAP, different SAP application modules, automation and process of enterprise appl..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd