Potential physical vulnerabilities and threats

Assignment Help Basic Computer Science
Reference no: EM13928687

Information Systems Security

You are the Information Security Officer for a small pharmacy did Has recently been opened in the local shopping mall. The daily operational of a pharmacy is a unique business requires a combination of did Both physical and logical access controls to protect medication and funds maintained located on the premises and personally identifiable information and protected health information of your customers. Your Has supervisor tasked you with inherently Identifying Risks associated with this pharmacy and Establishing physical and logical access control methods thatwill mitigate the Risks Identified.

1) firewall (1)

2) Windows 2008 Active Directory Domain

Controller (DC) (1)

3) file servers (1)

4) Desktop computers (4)

5) Dedicated T1 Connection (1)

Write a twelve (12) page paper in Which you:

Write a ten to fifteen (10-15) page paper in which you:

1. Identify and analyze any potential physical vulnerabilities and threats that require consideration.

2. Identify and analyze any potential logical vulnerabilities and threats that require consideration.

3. Illustrate in writing the potential impact of all identified physical vulnerabilities and threats to the network and the pharmacy.

4. Identify all potential vulnerabilities that may exist in the documented network.

5. Illustrate in writing the potential impact of all identified logical vulnerabilities to the network and the pharmacy.

Reference no: EM13928687

Questions Cloud

Waste of time in our judicial system : A group of students at a school takes a history test. The distribution is normal with a mean of 25, and a standard deviation of 4. (a) Everyone who scores in the top 30% of the distribution gets a certificate.
How might your organization be affected by these changes : How do you predict the economy will perform in the next two years given the current state of two of the economic factors you identified?
Advising about a software purchase : Your local art museum recently purchased a quad-core computer with 16 GB of RAM. The curator read an article about an art collection inventory system software package that could go on the new computer. You have a long experience with end users has..
How should tiger approach segmenting its customers : How should the revised service packages to each segment be introduced to that segment? By the sales force? Should all segments be done at the same time?
Potential physical vulnerabilities and threats : Write a ten to fifteen (10-15) page paper in which you: 1. Identify and analyze any potential physical vulnerabilities and threats that require consideration. 2. Identify and analyze any potential logical vulnerabilities and threats that require cons..
Discuss job-relevant strengths and weaknesses : What would you call a meeting that is typically done once a year to identify and discuss job-relevant strengths and weaknesses of individuals or work teams?
What is their solution for stabilizing economic fluctuations : Why do they believe changes in government spending affect the economy differently than changes in income taxes?
Assignment on mobile devices : You are an Information Security consultant for a small doctor's office consisting of three doctors and two nurses. The office is physically located among several other professional office spaces.
Example of the power of government derived : Policies that affect the supply, demand, and value of a nation's currency are: The primary way of accomplishing public policy is through:

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Find levels resulting tree have if key compression is used

How many levels would resulting tree have if key compression is used and it decreases the average size of each key in the entry to 10 bytes?

  Use wireshark tool to capture packets use wireshark tool to

use wireshark tool to capture packets when you download lecture 1 from the coit20229 course webpage. before you

  Return string made of the first n characters of the string

Given a string and an int n, return a string made of the first n characters of the string, followed by the first n-1 characters of the string, and so on

  Writejava class take a seven-letter return the phone numbers

this week you are required to use concepts learned in this week: strings and the Java library method contains. Write a Java class PhoneNumber that will take in a seven-letter word and return the phone number that corresponds to it.

  Secure multipurpose internet mail extensions

Compare and contrast Secure Multipurpose Internet Mail Extensions (S/MIME) and Pretty Good Privacy (PGP) as solutions for securing email.

  Degrees in fahrenheit

They need a program that will convert Fahrenheit to Celsius. The user will enter the degrees in Fahrenheit and the program will give the results in Celsius.

  Create a farewell speech that includes good memories

You, your classmates and instructor have been working together over the session as a team. Through discussion board tasks and Individual projects, you have shared thoughts, ideas and information you have learned. It is now time to move forward wit..

  What are the pro''s and con''s of digital rights managment

What are the pro's and con's of Digital Rights Managment

  Explaining final results in cell to a percentage

Second quarter revenue total has increased from first quarter revenue total by 60.16%. Make sure to change cell format for final results in the cell to a percentage.

  Suggest a change to the closest-pair algorithm

Suggest a change to the closest-pair algorithm that avoids presorting the Y array but leaves the running time as O(n lg n). (Hint: Merge sorted arrays YL and YR to form the sorted array Y .)

  Approach to organizing and funding it organization

What would be the best approach to organizing and funding their IT organization? Describe at least one alternative approach. Provide justification for why your proposed approach is the best one.

  Assignment on the new frontier-data analytics

In this highly competitive business environment, businesses are constantly seeking ways to gain traction and understand what is on the minds of current customers and potential customers in order to increase business efficiency. Many companies have..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd