Cash-back offer from May 7th to 12th, 2024: Get a flat 10% cash-back credited to your account for a minimum transaction of $50.Post Your Questions Today!

Question DetailsNormal
$ 25.00

Technical Project Paper: Information Systems Security | Complete Solution

Question posted by
Online Tutor Profile
request

Technical Project Paper: Information Systems Security

Due Week 10 and worth 150 points

 

Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls geared toward protecting medication and funds located on the premises, as well as the customers’ personally identifiable information and protected health information that resides on your system. Your supervisor has tasked you with identifying inherent risks associated with your pharmacy and establishing strong physical and logical access control methods to mitigate the identified risks.

1) Firewall (1)     4) Desktop computers (4)

2) Windows 2012 Active Directory Domain Controllers (DC) (1)    5) Dedicated T1 Connection (1)

3) File Server (1)              

 

 

 

 

 

 

Write an eight to ten (8-10) page paper in which you:

1.            Identify at least five (5) potential physical threats that require attention.

2.            Determine the impact of at least five (5) potential logical threats that require attention.

3.            Detail the security controls (i.e., administrative, preventative, detective, and corrective) that the pharmacy could implement in order to protect it from the five (5) selected physical threats.

4.            Explain in detail the security controls (i.e., administrative, preventative, detective, and corrective) that could be implemented to protect from the five (5) selected logical threats.

5.            For each of the five (5) selected physical threats, choose a strategy for addressing the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.

6.            For each of the five (5) selected logical threats, choose a strategy for handling the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.

7.            Use at least five (5) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

•             Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

•             Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

•             Explain the concepts of information systems security as applied to an IT infrastructure.

•             Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.

•             Explain the means attackers use to compromise systems and networks, and defenses used by organizations.

•             Explain the role of access controls in implementing a security policy.

•             Explain how businesses apply cryptography in maintaining information security.

•             Analyze the importance of network principles and architecture to security operations.

•             Use technology and information resources to research issues in information systems security.

•             Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

Available Answer
$ 25.00

[Solved] Technical Project Paper: Information Systems Security | Complete Solution

  • This solution is not purchased yet.
  • Submitted On 17 Jun, 2015 10:21:59
Answer posted by
Online Tutor Profile
solution
The potential physical threat often reasons the PC and hardware to crash. And it may be affected by internal, human, external errors. The most important threats comprise da...
Buy now to view the complete solution
Other Similar Questions
User Profile
QuizM...

An Instructor’s Solutions Manual to Accompany PRINCIPLES OF GEOTECHNICAL ENGINEERING, 8TH EDITION

An Instructor’s Solutions Manual to Accompany PRINCIPLES OF GEOTECHNICAL ENGINEERING, 8TH EDITION BRAJA M. DAS & KHALED SOBHAN An Instructor’s Solutions Manual to Accompany PRINCIPLES OF GEOTECHNICAL ENGINEERING, 8TH ...
User Profile
QuizM...

An Instructor’s Solutions Manual to Accompany Principles of Geotechnical Engineering, 7th Edition

An Instructor’s Solutions Manual to Accompany Principles of Geotechnical Engineering, 7th Edition Braja M. Das ...
User Profile
hesig...

ENGL 216 Week 7 Course Project: Final Report and Technical Briefing

ENGL 216 Week 7 Course Project: Final Report and Technical Briefing...
User Profile
newnu...

LAW 128 001 Chapter 16 and 17 Quizzes with Questions and Answers-Greenville Technical College

LAW 128 001 Chapter 16 and 17 Quizzes with Questions and Answers-Greenville Technical College...
User Profile
joe96

LAW 128 001 Chapter 16 and 17 Quizzes with Questions and Answers-Greenville Technical College

LAW 128 001 Chapter 16 and 17 Quizzes with Questions and Answers-Greenville Technical College...

The benefits of buying study notes from CourseMerits

homeworkhelptime
Assurance Of Timely Delivery
We value your patience, and to ensure you always receive your homework help within the promised time, our dedicated team of tutors begins their work as soon as the request arrives.
tutoring
Best Price In The Market
All the services that are available on our page cost only a nominal amount of money. In fact, the prices are lower than the industry standards. You can always expect value for money from us.
tutorsupport
Uninterrupted 24/7 Support
Our customer support wing remains online 24x7 to provide you seamless assistance. Also, when you post a query or a request here, you can expect an immediate response from our side.
closebutton

$ 629.35