ComputerScienceExpert

(11)

$18/per page/

About ComputerScienceExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Applied Sciences,Calculus See all
Applied Sciences,Calculus,Chemistry,Computer Science,Environmental science,Information Systems,Science Hide all
Teaching Since: Apr 2017
Last Sign in: 103 Weeks Ago, 3 Days Ago
Questions Answered: 4870
Tutorials Posted: 4863

Education

  • MBA IT, Mater in Science and Technology
    Devry
    Jul-1996 - Jul-2000

Experience

  • Professor
    Devry University
    Mar-2010 - Oct-2016

Category > Programming Posted 28 Apr 2017 My Price 11.00

potential physical threats

PLEASE READ THIS THOROUGHLY. 2000 WORDS AND 5 REFERENCES. APA STYLE WITH A COVER PAGE 

 

Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls geared towards protecting medication and funds located on the premises, as well as the personally identifiable information and protected health information of your customers that resides on your system. Your supervisor has tasked you with identifying inherent risks associated with your pharmacy and establishing strong physical and logical access control methods to mitigate the identified risks.

1) Firewall (1)

4) Desktop computers (4)

2) Windows 2012 Active Directory Domain Controllers (DC) (1)

5) Dedicated T1 Connection (1)

3) File Server (1)

 

Write an eight to ten (8-10) page paper in which you:

  1. Identify at least five (5) potential physical threats that require attention.
  2. Determine the impact of at least five (5) potential logical threats that require attention.
  3. Detail the security controls (i.e., administrative, preventative, detective, and corrective) that the pharmacy could implement in order to protect it from the five (5) selected physical threats.
  4. Explain in detail the security controls (i.e., administrative, preventative, detective, and corrective) that could be implemented to protect from the five (5) selected logical threats.
  5. For each of the five (5) selected physical threats, choose a strategy for addressing the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.
  6. For each of the five (5) selected logical threats, choose a strategy for handling the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.
  7. Use at least five (5) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

 

 

fl Homework Help-QaAtr xv. iCamuusl _ Weekm Technical Prc : G tlmroughly-Gooulesaa x - fl Secure l http [blackboard strayer edufwebappsibLackboard/contentilistConten sp ourseJ Eco menu 08201 ‘l 8_‘l y Get goodies tor you: E Hargra}r Cornrnunii: icampus Login Login , Pal. GA COMPASS , Corr Rem ct afiernots c- RockAuto Pa no [23' E m) TET Login , Pa‘. in CARID mm , Auto = "V WEEK 10 > WEEK :0 TECHNICAL PROJECT PAPER . , 1 7
-
associated With your pharmacy and establishing strong physical ancl logical access control methods to mitigate the identified ris
G d book
la e 1) Firewall (1) 4) Desktop computers (4)
Toolwire Live Labs
-— 2) Windows 2012 Active Directory Domain Controllers 5) Dedicated Tl Connection {1)
* Class Introductions (DC) {1)
Home Week 1 3) File Server {1)
Week 2 Server 2012 Durru'n
Comm File Week3 Firewall l ml
is \ liml ‘ Tutoring Week 4 1 a 5
Ali.
2 r: w: duwl
Week 5 D “Tim Cirl'lca 6-9-6 " Area
LI I Weekfi E customer
R950"! 95 g Entrllico
Week T Pt'muaelutinl Drug \ Wow 2 from Mal ’ Week 3 Songs Ara! % career Week 9 We: Wild” 3
Week 10 Back Door
(omPlWS only)
Week L'l.
Write an eight to ten {840) page paper in which you: Help CIS Tutoring
CERTIFICATION 1, Identify at least five (5) potential physical threats that require attention, 2, Determine the impact ol at least five (5) potential logical threats that require attention, 3, Detail the security controls lie, administrative, preventative, detective, and corrective) that the pharmacy could implement in order to protect it from the five (5) selected
physical threats.

Attachments:

Answers

(11)
Status NEW Posted 28 Apr 2017 01:04 AM My Price 11.00

-----------

Attachments

file 1493343886-Solutions file 2.docx preview (51 words )
H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly -----------onl-----------ine----------- an-----------d g-----------ive----------- yo-----------u e-----------xac-----------t f-----------ile----------- an-----------d t-----------he -----------sam-----------e f-----------ile----------- is----------- al-----------so -----------sen-----------t t-----------o y-----------our----------- em-----------ail----------- th-----------at -----------is -----------reg-----------ist-----------ere-----------d o-----------n -----------THI-----------S W-----------EBS-----------ITE-----------. ----------- Th-----------ank----------- yo-----------u -----------
Not Rated(0)