Star Biotech uses living organisms to develop new drugs

Assignment Help Basic Computer Science
Reference no: EM133478969

BUSINESS CASE: Star Biotech Company: Star Biotech uses living organisms to develop new drugs. Star Biotech focus on developing treatments for diseases that are difficult to treat with traditional drugs. Star Biotech has an IT system with office desktop computers and a data center. There are two departments.

The Star Biotech research and development department with 50 employees assigned to involve mission-critical data processing. Each and every computer is part of an important business process, therefore, data communication traffic that is directed at each computer should be monitored.

The management office is the second department of Star Biotech. Where 100 employees are conducting regular business activities in the management office department. The data communication traffic among all these computers should be monitored network traffic for suspicious activity.

QUESTION 1. You, as an IT manager should make a decision about the network security tool that monitors network or system activity for malicious or unauthorized behavior for both departments. Read the given parameters and write your decision about the type of intrusion detection system you would use in two departments

QUESTION 2. As an IT manager, your task is to prevent possible intrusion by employing user authentication. Authentication should require more than one piece of information to verify a user's identity to access to OS. For accessing the computers in research and development; authentication must be more difficult for attackers to gain access to a user's account, even if they have stolen their password. What kind of authentication method you would use for computers OS in research and development? Write examples for each piece of information that you would ask from the user.

QUESTION 3. As an IT manager, your task is to come up with file system access control (also known as file permissions) for the computers. So, the owner of the Star Biotech IT system would be able to determine who can access files and folders on each computer in. You should come up with a solution to protect sensitive data in the research and development department computers from unauthorized access. Consider the given pavements below and write which access control models you would deploy

There should be a hierarchical approach to access control. All the documents in the computers were already classified as Confidential, Secret, and Top secret. The sensitivity levels are in order from most sensitive to least sensitive.

QUESTION 4. As an IT manager, your task is to reduce the risk of attack on Star Biotech computers, increase security: and improve performance by implementing operating system hardening for each computer. Write the steps that you will follow to secure the operating system in each computer.

QUESTION 5. Once the OS for each computer is appropriately built, secured, and deployed, the process of maintaining security is continuous. This results from the constantly changing environment, the discovery of new vulnerabilities, and hence exposure to new threats. As an IT manager, how you would provide security maintenance in the long run? Write the steps

Reference no: EM133478969

Questions Cloud

Quality of organization business continuity plan : The quality of an organization's business continuity plan (BCP) will directly influence how well it performs during a crisis.
Definition of standard operating procedure : What is the definition of a Standard Operating Procedure (SOP)? Why would you need SOP for end users for a software application?
Wireless network investigative tools : A critical skill for investigators is the mastery and use of wireless network investigative tools that are used for traffic sniffing, detection, and analysis.
What gaming console and controllers : What gaming console and controllers would you need? Assume a wide variety in the games that can be played, including Madden NFL, League of Legends,
Star Biotech uses living organisms to develop new drugs : Star Biotech uses living organisms to develop new drugs.Star Biotech focus on developing treatments for diseases that difficult to treat with traditional drugs
Business class routers and switches : Research and provide a summary on available business class routers and switches.
Developing security governance plan for your organization : Describe and differentiate between security policies, standards, and guidelines in developing a Security Governance Plan for your organization.
How did you handle setbacks or obstacles : How did you handle setbacks or obstacles? What was the situation and why was it challenging? How did you track progress?
Discuss the vulnerabilities that computer memory : Discuss the vulnerabilities that computer memory and computer process have that malware can take advantage of and exploit.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd