Information Systems Security
Question Description
How much would you charge me to write these 2 papers they are due by Sunday?
Technical Project Paper: Information Systems Security
Due Week 10 and worth 110 points
You are the Information Security Officer for a small pharmacy that has
recently been opened in the local shopping mall. The daily operation of
a pharmacy is a unique business that requires a combination of both
physical and logical access controls to protect medication and funds
maintained located on the premises and personally identifiable
information and protected health information of your customers. Your
supervisor has tasked you with identifying inherent risks associated
with this pharmacy and establishing physical and logical access control
methods that will mitigate the risks identified.
- Firewall (1)
- Windows 2008 Active Directory Domain Controllers (DC) (1)
- File Server (1)
- Desktop computers (4)
- Dedicated T1 Connection (1)
Write a ten to fifteen (10-15) page paper in which you:
- Identify and analyze any potential physical vulnerabilities and threats that require consideration.
- Identify and analyze any potential logical vulnerabilities and threats that require consideration.
- Illustrate in writing the potential impact of all identified physical vulnerabilities and threats to the network and the pharmacy.
- Identify all potential vulnerabilities that may exist in the documented network.
- Illustrate in writing the potential impact of all identified logical vulnerabilities to the network and the pharmacy.
- For each physical vulnerability and threat identified, choose a strategy for dealing with the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance).
- For each logical vulnerability and threat identified, choose a strategy for dealing with the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance).
- For each physical vulnerability and threat identified, develop controls (i.e., administrative, preventative, detective, and corrective) that will be used to mitigate each risk.
- For each logical vulnerability and threat identified, develop controls (i.e., administrative, preventative, detective, and corrective) that will be used to mitigate each risk.
Your assignment must follow these formatting requirements:
- Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
- Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Term Paper: Disaster Recovery Plan
Due Week 10 and worth 200 points
This assignment consists of two (2) parts: a written paper and a
PowerPoint presentation. You must submit both parts as separate files
for the completion of this assignment. Label each file name according to
the section of the assignment it is written for. Additionally, you may
create and / or assume all necessary assumptions needed for the
completion of this assignment.
In recent years,
organizations have witnessed the impact of having effective and
non-effective business continuity plans and disaster recovery plans. In
today’s environment, with significant potential natural disasters,
terrorist threats, and other man-made threats, it is critical that
organizations develop effective business continuity plans and disaster
recovery plans. Select an organization that you are familiar with, such
as where you currently or previously have worked, contact a local
organization, or search on the Internet for the needed detail of an
organization you are interested in. Prepare a disaster recovery plan
policy for that organization.
Part 1: Written Paper1.
1.Write a six to eight (6-8) page paper in which you:
a. Provide an overview of the organization that will be delivered to senior management, defining the business goals and objectives and the size, layout, and structure of the organization.
b. Include a diagram of the organization’s network architecture and the proposed network architecture of an alternate computing facility in the event of a disaster (or the actual network architecture of the alternate computing facility if one already exists) through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
c. Develop the DRP Policy, including:
i. Disaster declaration
ii. Assessment of security
iii. Potential disaster scenarios and methods of dealing with the disaster
iv. Disaster recovery procedures
d. Develop an Incident Response Team (IRT) charter, which includes the following sections:
i. Executive summary
ii. Mission statement
iii. Incident declaration
iv. Organizational structure
v. Roles and responsibilities
vi. Information flow and methods of communication
vii. Methods and services provided by the IRT
viii. Authority and reporting procedures
Your assignment must follow these formatting requirements:
- Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
- Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
- Include charts or diagrams created in MS Visio or Dia as an appendix of the infrastructure document. All references to these diagrams must be included in the body of the infrastructure document.
Part 2: PowerPoint PresentationUse Microsoft PowerPoint to:2. Create a twelve to fourteen (12-14) slide presentation that will be presented to the agency’s management, in which you:
a. Summarize the elements of the DRP Policy and IRT Charter, covering the main elements from Steps 3 and 4 above. b. Include an introduction and conclusion slide.
This question has not been answered.
Create a free account to get help with this and any other question!
Brown University
1271 Tutors
California Institute of Technology
2131 Tutors
Carnegie Mellon University
982 Tutors
Columbia University
1256 Tutors
Dartmouth University
2113 Tutors
Emory University
2279 Tutors
Harvard University
599 Tutors
Massachusetts Institute of Technology
2319 Tutors
New York University
1645 Tutors
Notre Dam University
1911 Tutors
Oklahoma University
2122 Tutors
Pennsylvania State University
932 Tutors
Princeton University
1211 Tutors
Stanford University
983 Tutors
University of California
1282 Tutors
Oxford University
123 Tutors
Yale University
2325 Tutors