Potential physical vulnerabilities and threats

Assignment Help Computer Network Security
Reference no: EM13923342

You are the Information Security Officer for a small pharmacy did Has recently been opened in the local shopping mall. The daily operational of a pharmacy is a unique business requires a combination of did Both physical and logical access controls to protect medication and funds maintained located on the premises and personally identifiable information and protected health information of your customers. Your Has supervisor tasked you with inherently Identifying Risks associated with this pharmacy and Establishing physical and logical access control methods thatwill mitigate the Risks Identified.

1) firewall (1)
2) Windows 2008 Active Directory Domain
Controller (DC) (1)
3) file servers (1)
4) Desktop computers (4)
5) Dedicated T1 Connection (1)

Write a twelve (12) page paper in Which you:

Write a ten to fifteen (10-15) page paper in which you:

1. Identify and analyze any potential physical vulnerabilities and threats that require consideration.
2. Identify and analyze any potential logical vulnerabilities and threats that require consideration.
3. Illustrate in writing the potential impact of all identified physical vulnerabilities and threats to the network and the pharmacy.
4. Identify all potential vulnerabilities that may exist in the documented network.
5. Illustrate in writing the potential impact of all identified logical vulnerabilities to the network and the pharmacy.

Reference no: EM13923342

Questions Cloud

Determine the best way to get to your destination : Determine the best way to get to your destination, and set up the travel arrangements to and from. You may also need transportation while you are at your destination, so arrange that too
Describe how the jensen measure of performance is calculated : Describe how the Jensen measure of performance is calculated. Under what conditions should it give a similar set of portfolio rankings as the Sharpe and Treynor measures?
Staff to maintain integrity of the network : Offsite storage like Cloud technology can allow access to all critical information without invests additional resource to maintain the storage solutions and the staff to maintain integrity of the network.
Explain how the ir measures portfolio performance : The information ratio (IR) has been described as a benefit-cost ratio. Explain how the IR measures portfolio performance and whether this analogy is appropriate.
Potential physical vulnerabilities and threats : Identify and analyze any potential physical vulnerabilities and threats that require consideration.
Identify the key environmental experiences : Identify the key environmental experiences that influenced your life. Recall childhood memories of special places where you formed some connections with the earth through emotional experiences
Difference in the price of a particular : A consumer organization wants to know if there is a difference in the price of a particular toy at three different types of stores. The price of the toy was checked in a sample of five discount toy stores, five variety stores, and five department ..
How the allocation effects are measured : Explain how these two effects are measured and why their sum must equal the total value-added return for the manager.
Amount reported as interest payable for the note : The first interest and principal payment was made on October 1, 2012. In Comet's June 30, 2013, balance sheet, what amount should be reported as Interest Payable for this note?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Boot process for a windows machine

What is the boot process for a Windows machine switches through several different modes. What are they, and how do they impact security?

  Identify hardware and software needed to secure network

Identify hardware and software needed to secure your choice of networks against all electronic threats. Distinguish between local area networks (LANs), wide area networks (WANs), and wireless technologies

  Critique the transition process performed by the dms in

write a three to four page paper in which youanalyze the security mechanisms needed to protect the dms systems from

  Developing a simple biometric authentication model

Developing an encryption/decryption demo (mainly for learning and teaching purposes)

  Strategies for developing secure software

You want to convince your software development manager that the team needs to include strategies for developing secure software. Your first step is to help your manager understand the common sources of risks in software. 1. Write a ½ to 1 page memo t..

  Malicious attacks and / or threats that you identified

For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your ..

  Discuss the current it cybersecurity policy

Current policy: Discuss the current (as per the case study) IT cybersecurity policy. New technology: Describe the functionality of the new technology selected for implementation and the challenges associated with the current cybersecurity policy

  Theft of logins and passwords

Theft of logins and passwords

  Develop a security policy document

Write a ten to sixteen (10-16) page paper in which you develop a security policy document for your mid-sized organization that will include measures to protect against breaches and act as a proactive defense

  Implement the s-box functionality as a class

Implement the cipher as a class which implements the provided interface.

  What classess java provide to make network programming

IPv6 uses addresses that are 16 bytes long (128 bits ).  How many addresses is that per person in the world? and What classes does Java provide to make network programming easier

  Present a short summary of the arguments for and against

you have been asked to help decide whether to outsource security or keep the security function within the firm. search

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd