Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Suppose you are the IT professional in charge of security for a small pharmacy t

ID: 3771016 • Letter: S

Question

Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls geared towards protecting medication and funds located on the premises, as well as the personally identifiable information and protected health information of your customers that resides on your system. Your supervisor has asked you with identifying inherent risks associated with your pharmacy and establishing strong physical and logical access control methods to mitigate the identified risks.

1) Firewall (1)

4) Desktop computers (4)

2) Windows 2012 Active Directory Domain Controllers (DC) (1)

5) Dedicated T1 Connection (1)

3) File Server (1)




Write an eight to ten (8-10) page paper in which you:

1.              Identify at least five (5) potential physical threats that require attention.

2.              Determine the impact of at least five (5) potential logical threats that require attention.

3.              Detail the security controls (i.e., administrative, preventative, detective, and corrective) that the pharmacy could implement in order to protect it from the five (5) selected physical threats.

4.              Explain in detail the security controls (i.e., administrative, preventative, detective, and corrective) that could be implemented to protect from the five (5) selected logical threats.

5.              For each of the five (5) selected physical threats, choose a strategy for addressing the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.

6.              For each of the five (5) selected logical threats, choose a strategy for handling the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.

7.              Use at least five (5) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

1) Firewall (1)

4) Desktop computers (4)

2) Windows 2012 Active Directory Domain Controllers (DC) (1)

5) Dedicated T1 Connection (1)

3) File Server (1)


Explanation / Answer

1.Identify at least five (5) potential physical threats that require attention
Ans:)
Hardware
compute storage capacity
internal and external human errors
vandalism of hardware or infrastructure
Power Supply is unstable
Theft
lightening


2.Determine the impact of at least five (5) potential logical threats that require attention.
Ans:)
affect the software application
data transfer
Trojan
spyware
denial of service attack
phishing, and worms

3.Detail the security controls (i.e., administrative, preventative, detective, and corrective) that the pharmacy could
implement in order to protect it from the five (5) selected physical threats.

Preventative it controls the exist to prevent the threat from the coming in the contact with the weakness.
Detective it controls the exist to identify that the threat has to be landed in our systems.
Corrective it controls the exist to mitigate or lessen an effects of a threat being manifested.

4.Explain in detail the security controls (i.e., administrative, preventative, detective, and corrective) that could be implemented to
protect from the five (5) selected logical threats.

Preventative : it is Security Awareness Training.It is Firewall,it is Antivirus.
Security Guard and IPS.
Detective : it is System Monitoring and IDS and it is a Anti Virus,Motion Director.
Corrective: It is OS upgrade and backup data for restoral and it is anti virus and Vulnerability Mitigation.
Compensatory :It is Backup Generator and Hot Site and Server Isolation

5.For each of the five (5) selected physical threats, choose a strategy for addressing the risk
(i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.

Risk Mitigation the balancing cost of the mitigating risk versus to the cost of potential damage into the organization.


6.For each of the five (5) selected logical threats, choose a strategy for handling the risk
(i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.

Logical Strategy also choose mitigate risk: avoidance and reduction and spreading and transfer and acceptance.

7.Use at least five (5) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook.
Note: Wikipedia and similar Websites do not qualify as quality resources.

The pharmaceutical companies with the third party of the manufacturing options.
Many the pharmaceutical companies deal with PCD pharma companies to the purchase of their products
in the bulk and run the marketing for these products.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote