Information systems security

Assignment Help Computer Network Security
Reference no: EM13928462

Information Systems Security

You are the Information Security Officer for a small pharmacy did Has recently been opened in the local shopping mall. The daily operational of a pharmacy is a unique business requires a combination of did Both physical and logical access controls to protect medication and funds maintained located on the premises and personally identifiable information and protected health information of your customers. Your Has supervisor tasked you with inherently Identifying Risks associated with this pharmacy and Establishing physical and logical access control methods thatwill mitigate the Risks Identified.

1) firewall (1)

2) Windows 2008 Active Directory Domain

Controller (DC) (1)

3) file servers (1)

4) Desktop computers (4)

5) Dedicated T1 Connection (1)

Write a twelve (12) page paper in Which you:

Write a ten to fifteen (10-15) page paper in which you:

1. Identify and analyze any potential physical vulnerabilities and threats that require consideration.

2. Identify and analyze any potential logical vulnerabilities and threats that require consideration.

3. Illustrate in writing the potential impact of all identified physical vulnerabilities and threats to the network and the pharmacy.

4. Identify all potential vulnerabilities that may exist in the documented network.

5. Illustrate in writing the potential impact of all identified logical vulnerabilities to the network and the pharmacy.

Reference no: EM13928462

Questions Cloud

Determine fishers working capital investment : Determine Fisher's working capital investment. Determine Fisher's current ratio. Determine Fisher's return on stockholders' equity if its 2010 earnings after tax are $10,000(000).
Does the sox adequately protect the public : Do you think current ethical guidelines and constraints under the Sarbanes - Oxley Act of 2002 sufficiently restored public confidence in our financial institutions
Develop a web portal of employer-job applicants : Develop a web portal of Employer-Job Applicants Career Tracer for Royal Areas Electricity Company (RAECO).
Second stage of the consumer buying process : What is the second stage of the consumer buying process? a) Purchase decision b) Buyer satisfaction c) Information search d) Evaluation of alternatives
Information systems security : You are the Information Security Officer for a small pharmacy did Has recently been opened in the local shopping mall. The daily operational of a pharmacy is a unique business requires a combination of did Both physical and logical access controls..
Policy monitoring and policy evaluation : Prepare a 250- to 350 word brief comparing and contrasting policy monitoring and policy evaluation. This brief is intended for a high level executive of your agency/organization, so ensure that you keep it concise and relevant
Necessary to perform a multiply using the approach : Calculate the time necessary to perform a multiply using the approach given in Figures 3.4 and 3.5 if an integer is 8 bits wide and each step of the operation takes 4 time units. Assume that in step 1a an additional is always performed - either th..
Identify risks inherent in the use of wireless : 1. Identify risks inherent in the use of wireless and mobile technologies. 2. Analyze the identified risks and develop factors to mitigate the risks. 3. Provide a sound recommendation to be employed in the doctor's office.
Why would a warehouse be described as a necessary evil : Why would a warehouse be described as a "necessary evil" and Discuss and illustrate the role of warehouses in reverse logistics.

Reviews

Write a Review

Computer Network Security Questions & Answers

  The broad definition of computer crime can be described

According to the text, the broad definition of computer crime can be described

  What is the role of data mining

What is the role of data mining

  In the past several years incidences such as school

in the past several years incidences such as school shootings have caused loss of many lives in us schools and

  Create a 7-10 slide presentation on information systems

create a 7-10 slide presentation on information systems security and it infrastructure. you may use various sources

  Discuss pci dss control objectives and requirements

Discuss PCI DSS control objectives and requirements. Discuss PCI DSS compliance requirements.

  Describe the crypto dilemma

AcmeStore is interviewing candidates for the position of Chief Information Officer (CIO). They are asking candidates to describe briefly how they would satisfy AcmeStore's requirements as stated above. How would a successful candidate respond?

  Describe how bob can recover the message

Describe how Bob can recover the message - Through how many ciphertext blocks is this error propagated? What is the effect at the receiver?

  Important benefit of asymmetrical encryption

What is the most important benefit of asymmetrical encryption? Contrast with symmetrical encryption - Which part of CAIN is realized through the use of message digest functions and hashes?

  Ip spoofing

honeypot or a firewall, error handling, Denial-Of-Service, Public Key Infrastructure, WLAN Administrator, WEP Protocol, RSA Algorithm, Network Engineer

  Staff to maintain integrity of the network

Offsite storage like Cloud technology can allow access to all critical information without invests additional resource to maintain the storage solutions and the staff to maintain integrity of the network.

  Compare and contrast viruses and worms

Compare and contrast viruses, worms

  Represent the encryption of plaintext

Let DES(x, K) represent the encryption of plaintext x with key K using the DES cryptosystem. Suppose y = DES(x, K) and y' = DES(c(x), c(K)), where c(·) denotes the bitwise complement of its argument

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd