0 Comments

Technical Project Paper:
Information Systems Security

Suppose you are the IT
professional in charge of security for a small pharmacy that has recently
opened within a shopping mall. The daily operation of a pharmacy is a unique
business that requires a combination of both physical and logical access
controls geared towards protecting medication and funds located on the
premises, as well as the personally identifiable information and protected
health information of your customers that resides on your system. Your
supervisor has tasked you with identifying inherent risks associated with your
pharmacy and establishing strong physical and logical access control methods to
mitigate the identified risks.

1) Firewall (1)

4) Desktop computers (4)

2) Windows 2012 Active
Directory Domain Controllers (DC) (1)

5) Dedicated T1 Connection
(1)

3) File Server (1)

Picture:

Technical Paper Graphic

Write an eight to ten (8-10)
page paper in which you:

1. Identify at least five (5) potential physical
threats that require attention.

2. Determine the impact of at least five (5) potential
logical threats that require attention.

3. Detail the security controls (i.e., administrative,
preventative, detective, and corrective) that the pharmacy could implement in
order to protect it from the five (5) selected physical threats.

4. Explain in detail the security controls (i.e.,
administrative, preventative, detective, and corrective) that could be
implemented to protect from the five (5) selected logical threats.

5. For each of the five (5) selected physical threats,
choose a strategy for addressing the risk (i.e., risk mitigation, risk
assignment, risk acceptance, or risk avoidance). Justify your chosen
strategies.

6. For each of the five (5) selected logical threats,
choose a strategy for handling the risk (i.e., risk mitigation, risk
assignment, risk acceptance, or risk avoidance). Justify your chosen
strategies.

7. Use at least five (5) quality resources in this assignment
(no more than 2-3 years old) from material outside the textbook. Note:
Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow
these formatting requirements:

· Be typed, double spaced, using Times New Roman font
(size 12), with one-inch margins on all sides; citations and references must
follow APA or school-specific format. Check with your professor for any
additional instructions.

· Include a cover page containing the title of the assignment,
the student’s name, the professor’s name, the course title, and the date. The
cover page and the reference page are not included in the required assignment
page length.

The specific course learning
outcomes associated with this assignment are:

· Explain the concepts of information systems
security as applied to an IT infrastructure.

· Describe how malicious attacks, threats, and
vulnerabilities impact an IT infrastructure.

· Explain the means attackers use to compromise systems
and networks, and defenses used by organizations.

· Explain the role of access controls in implementing
a security policy.

· Explain how businesses apply cryptography in
maintaining information security.

· Analyze the importance of network principles and
architecture to security operations.

· Use technology and information resources to
research issues in information systems security.

· Write clearly and concisely about network security
topics using proper writing mechanics and technical style conventions.

Rubric

Technical Project Paper: Information Systems
Security

Criteria

Unacceptable

Below 60% F

Meets Minimum Expectations

60-69% D

Fair

70-79% C

Proficient

80-89% B

Exemplary

90-100% A

1.Identify at least five (5)
potential physical threats that require attention.

Weight: 10%

Did not submit or incompletely identifiedat least five (5) potential physical threats that require attention.

Insufficiently identifiedat least five (5) potential physical threats that require attention.

Partially identifiedat least five (5) potential physical threats that require attention.

Satisfactorily identifiedat least five (5) potential physical threats that require attention.

Thoroughly identifiedat least five (5) potential physical threats that require attention.

2.Determine the impact of at least five (5) potential logical threats that
require attention.

Weight: 10%

Did not submit or incompletely determinedthe impact of at least five (5) potential logical threats that require
attention.

Insufficiently determinedthe impact of at least five (5) potential logical threats that require
attention.

Partially determinedthe impact of at least five (5) potential logical threats that require
attention.

Satisfactorily determinedthe impact of at least five (5) potential logical threats that require
attention.

Thoroughly determinedthe impact of at least five (5) potential logical threats that require
attention.

3.Detail the security controls (i.e., administrative, preventative,
detective, and corrective) that the pharmacy could implement in order to
protect it from the five (5) selected physical threats.

Weight: 10%

Did not submit or incompletely detailedthe security controls (i.e., administrative, preventative, detective, and
corrective) that the pharmacy could implement in order to protect it from the
five (5) selected physical threats.

Insufficiently detailedthe security controls (i.e., administrative, preventative, detective, and
corrective) that the pharmacy could implement in order to protect it from the
five (5) selected physical threats.

Partially detailedthe security controls (i.e.,
administrative, preventative, detective, and corrective) that the pharmacy
could implement in order to protect it from the five (5) selected physical
threats.

Satisfactorily detailedthe security controls (i.e., administrative, preventative, detective, and
corrective) that the pharmacy could implement in order to protect it from the
five (5) selected physical threats.

Thoroughly detailedthe security controls (i.e.,
administrative, preventative, detective, and corrective) that the pharmacy
could implement in order to protect it from the five (5) selected physical
threats.

4.Explain in detail the security controls (i.e., administrative,
preventative, detective, and corrective) that could be implemented to protect
from the five (5) selected logical threats.

Weight: 10%

Did not submit or incompletely explainedin detail the security controls (i.e., administrative, preventative,
detective, and corrective) that could be implemented to protect from the five
(5) selected logical threats.

Insufficiently explainedin detail the security controls (i.e., administrative, preventative,
detective, and corrective) that could be implemented to protect from the five
(5) selected logical threats.

Partially explainedin detail the security
controls (i.e., administrative, preventative, detective, and corrective) that
could be implemented to protect from the five (5) selected logical threats.

Satisfactorily explainedin detail the security controls (i.e., administrative, preventative,
detective, and corrective) that could be implemented to protect from the five
(5) selected logical threats.

Thoroughly explainedin detail the security controls (i.e., administrative, preventative,
detective, and corrective) that could be implemented to protect from the five
(5) selected logical threats.

5.For each of the five (5) selected physical threats, choose a strategy for
addressing the risk (i.e., risk mitigation, risk assignment, risk acceptance,
or risk avoidance). Justify your chosen strategies.

Weight: 10%

Did not submit or incompletely chosea strategy for addressing the risk (i.e., risk mitigation, risk
assignment, risk acceptance, or risk avoidance) for each of the five (5)
selected physical threats. Did not submit or incompletely justified your
chosen strategies.

Insufficiently chosea strategy for addressing the risk (i.e., risk mitigation, risk
assignment, risk acceptance, or risk avoidance) for each of the five (5)
selected physical threats.Insufficientlyjustified your chosen strategies.

Partially chosea strategy for addressing the risk
(i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance)
for each of the five (5) selected physical threats.Partiallyjustified your chosen strategies.

Satisfactorily chosea strategy for addressing the risk (i.e., risk mitigation, risk assignment,
risk acceptance, or risk avoidance) for each of the five (5) selected
physical threats.Satisfactorilyjustified your chosen strategies.

Thoroughly chosea strategy for addressing
the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk
avoidance) for each of the five (5) selected physical
threats.Thoroughlyjustified your chosen strategies.

6.For each of the five (5) selected logical threats, choose a strategy for
handling the risk (i.e., risk mitigation, risk assignment, risk acceptance,
or risk avoidance). Justify your chosen strategies.

Weight: 10%

Did not submit or incompletely chosea strategy for handling the risk (i.e., risk mitigation, risk assignment,
risk acceptance, or risk avoidance) for each of the five (5) selected logical
threats. Did not submit or incompletely justified your chosen strategies.

Insufficiently chosea strategy for handling the risk (i.e., risk mitigation, risk assignment,
risk acceptance, or risk avoidance) for each of the five (5) selected logical
threats. Insufficiently justified your chosen strategies.

Partially chosea strategy for handling the risk
(i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance)
for each of the five (5) selected logical threats. Partially justified your
chosen strategies.

Satisfactorily chosea strategy for handling the risk (i.e., risk mitigation, risk assignment,
risk acceptance, or risk avoidance) for each of the five (5) selected logical
threats. Satisfactorily justified your chosen strategies.

Thoroughly chosea strategy for handling the
risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk
avoidance) for each of the five (5) selected logical threats. Thoroughly
justified your chosen strategies.

7. 5 references

Weight: 5%

No references provided

Does not meet the required
number of references; all references poor quality choices.

Does not meet the required
number of references; some references poor quality choices.

Meets number of required
references; all references high quality choices.

Exceeds number of required
references; all references high quality choices.

8. Clarity, writing
mechanics, and formatting requirements

Weight: 10%

More than 8 errors present

7-8 errors present

5-6 errors present

3-4 err

Order Solution Now

Categories: