Cis333 Technical Paper

In: Computers and Technology

Submitted By dship1982
Words 2526
Pages 11
Running head: Information System Security

CIS 333 Technical Paper: Information System Security
Donald Shipman
CIS 333
Prof. Clapp
March 11, 2012

In consideration of the security of the network of the pharmacy, the following physical vulnerabilities and threats are to be considered. The threat of disaster is considerable in almost any case. Such an occurrence would have a substantial impact on the network. Such threats include flooding, lightning, earthquake, wind, tornadoes, hurricanes, fire, environmental failure, and electrical interruption as these can destroy whole infrastructures and can cause valuable and important data to be lost. For example, in case of flood or fire it is certain that infrastructure will be destroyed that contains many hardware and storage system that contains valuable data such as detail of customers, product etc. so we would need to provide security to this data because loss of this information would have extreme consequences to the business, as well as being virtually impossible to recover at a total loss. We can use the method “backup and recovery” for to substantially reduce the impact of this disaster threat. Cloud technology can be deployed which would create a remote cold site that would allow access to critical system information with limited physical resources if necessary. When considering logical vulnerabilities and threats, the following is to be considered. Unauthorized modification of the database is a major threat issue or concern when designing the IT infrastructure for the organization. In this threat, an unauthorized user accesses the database and makes unwarranted changes. Unauthorized users can make changes in the database making too difficult to recover from. For example, they can modify the details of employee of organization, manufacturing or our product details or it services details also.…...

Similar Documents

Cis 341 Technical Paper

...* Technical Project Paper: Information Systems Security Due Week 10 and worth 110 points You are the Information Security Officer for a small pharmacy that has recently been opened in the local shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls to protect medication and funds maintained located on the premises and personally identifiable information and protected health information of your customers. Your supervisor has tasked you with identifying inherent risks associated with this pharmacy and establishing physical and logical access control methods that will mitigate the risks identified. 1. Firewall (1)   2. Windows 2008 Active Directory Domain  Controllers (DC) (1)  3. File Server (1)  4. Desktop computers (4) 5. Dedicated T1 Connection (1)     Write a ten to fifteen (10-15) page paper in which you: 6. Identify and analyze any potential physical vulnerabilities and threats that require consideration. 7. Identify and analyze any potential logical vulnerabilities and threats that require consideration. 8. Illustrate in writing the potential impact of all identified physical vulnerabilities and threats to the network and the pharmacy. 9. Identify all potential vulnerabilities that may exist in the documented network. 10. Illustrate in writing the potential impact of all identified logical vulnerabilities to...

Words: 520 - Pages: 3

Adobe Creative Suite Technical Paper

...Adobe Creative Suite Technical Paper I will choose to write my paper of Adobe Creative Suite. I don’t have time to talk about them all so I will talk about the following: Dreamweaver Photoshop Acrobat Illustrator Fireworks Application Name: Adobe Creative Suite Category: Series of software suites by Adobe Systems Purpose: “Adobe Creative Suite (CS) was a series of software suites of graphic design, video editing, and web development applications made or acquired by Adobe Systems. The collections consisted of various groupings of Adobe's applications (e.g., Photoshop, Acrobat, InDesign, Premiere Pro, After Effects) based on various technologies (e.g., PostScript, PDF, Flash) and organized by industry. The last version, Adobe Creative Suite 6 (CS6), was launched at a release event April 23, 2012, and released on May 7, 2012.[1] On May 6, 2013 Adobe announced that CS6 would be the last version of the Creative Suite,[2][3][4] and that future versions of their creative software would only be available via their Adobe Creative Cloud subscription service. Adobe also announced that it would continue to support CS6 for OS compatibility and would provide bug fixes and security updates as necessary.[5] The Creative Suite packages were pulled from Adobe's online store,[6] but still remain available via a section of their website.[7].”(Source 6) Opinion: I really enjoy using Dreamweaver, it helps speed up web development, and helps to keep sites organized....

Words: 1487 - Pages: 6

Technical Paper It Project Management

...Technical Paper Project Information Technology Project Management (CIS517) Date: Introduction There is an old adage which insists “time is money.” While simple, in concept, it has been proven true, in fact. In a global, technologically driven society, however, the very idea of time has changed. Having once implied a spanning space between the hours of “nine to five” relative to the person or organization from whose vantage money was viewed, time is now irrespective of person, organization, or location; it is, literally, “24/7.” With this shift in perception, organizations, especially, have taken on the greater challenge of ensuring efficiency in their operations, allowing their customers the freedom and peace of mind to have access to the products or services they purchased without interruption. Working behind the scenes, as it were, are the IT companies that make the realization of this freedom and peace of mind possible. In the scenario with Fiction Corporation, it is quite evident that the role of IT is paramount to the success of the business, in general, and to the company’s decision to- move, in particular. Big-Proj will receive the “big break” for which it is looking by ensuring compliance with the goals set forth in regards to the scope of the project, the timeline projections, and the budgetary requirement of $500,000.00. Scope Big-Proj has chosen to name this project “Fiction Corporation’s Data-Center Move” to avoid any confusion with......

Words: 2587 - Pages: 11

Cis 502 Technical Paper

...CIS 502 Technical Paper Purchase here http://homeworkonestop.com/CIS%20502/cis-502-technical-paper Product Description CIS 502 Technical Paper: Risk Assessment Week 10 A Graded Work 13 Pages Excluding Title and References Page. CIS 502 Week 10 Technical Paper Technical Paper: Risk Assessment Due Week 10 and worth 150 points Global Finance, Inc. Internet OC193 10Gbps Remote Dial UpUsers OC193 10Gbps DMZ Border (Core) Routers Distribution Routers VPN Gateway 10Gbps RAS PBX Printers Mgmt (x3) Credit Dept Finance Accounting Worstations Printers Worstations (x5) LoanDept WorstationsPrinters 10Gbps 10 Gbps 10 Gbps Oracle 9i DB Server 10 Gbps Access Layer VLAN Switch 10 Gbps 10 Gbps Exchange 2000 Email Worstations (x10)Printers (x3) Worstations (x49) Printers (x25) Customer Services Worstations (x12) (x5) Printers (x3) SUS Server (x5) (x63) (x7) Off-Site Office VPN Gateway PSTN Intranet Web Server Internal DNS File and Print Server Workstations (x7) 100Mbps Trusted Computing Base Internal Network Global Finance, Inc. Network Diagram Above is the Global Finance, Inc. (GFI) network diagram. GFI has grown rapidly this past year and acquired many network devices as displayed in the diagram. The company invested in the network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its network......

Words: 1769 - Pages: 8

Cis 502 Technical Paper

...CIS 502 Technical Paper Purchase here http://homeworkonestop.com/CIS%20502/cis-502-technical-paper Product Description CIS 502 Technical Paper: Risk Assessment Week 10 A Graded Work 13 Pages Excluding Title and References Page. CIS 502 Week 10 Technical Paper Technical Paper: Risk Assessment Due Week 10 and worth 150 points Global Finance, Inc. Internet OC193 10Gbps Remote Dial UpUsers OC193 10Gbps DMZ Border (Core) Routers Distribution Routers VPN Gateway 10Gbps RAS PBX Printers Mgmt (x3) Credit Dept Finance Accounting Worstations Printers Worstations (x5) LoanDept WorstationsPrinters 10Gbps 10 Gbps 10 Gbps Oracle 9i DB Server 10 Gbps Access Layer VLAN Switch 10 Gbps 10 Gbps Exchange 2000 Email Worstations (x10)Printers (x3) Worstations (x49) Printers (x25) Customer Services Worstations (x12) (x5) Printers (x3) SUS Server (x5) (x63) (x7) Off-Site Office VPN Gateway PSTN Intranet Web Server Internal DNS File and Print Server Workstations (x7) 100Mbps Trusted Computing Base Internal Network Global Finance, Inc. Network Diagram Above is the Global Finance, Inc. (GFI) network diagram. GFI has grown rapidly this past year and acquired many network devices as displayed in the diagram. The company invested in the network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its network......

Words: 1769 - Pages: 8

Cis 502 Technical Paper

...CIS 502 Technical Paper Purchase here http://homeworkonestop.com/CIS%20502/cis-502-technical-paper Product Description CIS 502 Technical Paper: Risk Assessment Week 10 A Graded Work 13 Pages Excluding Title and References Page. CIS 502 Week 10 Technical Paper Technical Paper: Risk Assessment Due Week 10 and worth 150 points Global Finance, Inc. Internet OC193 10Gbps Remote Dial UpUsers OC193 10Gbps DMZ Border (Core) Routers Distribution Routers VPN Gateway 10Gbps RAS PBX Printers Mgmt (x3) Credit Dept Finance Accounting Worstations Printers Worstations (x5) LoanDept WorstationsPrinters 10Gbps 10 Gbps 10 Gbps Oracle 9i DB Server 10 Gbps Access Layer VLAN Switch 10 Gbps 10 Gbps Exchange 2000 Email Worstations (x10)Printers (x3) Worstations (x49) Printers (x25) Customer Services Worstations (x12) (x5) Printers (x3) SUS Server (x5) (x63) (x7) Off-Site Office VPN Gateway PSTN Intranet Web Server Internal DNS File and Print Server Workstations (x7) 100Mbps Trusted Computing Base Internal Network Global Finance, Inc. Network Diagram Above is the Global Finance, Inc. (GFI) network diagram. GFI has grown rapidly this past year and acquired many network devices as displayed in the diagram. The company invested in the network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its network...

Words: 4421 - Pages: 18

Cis 502 Technical Paper

...CIS 502 Technical Paper Purchase here http://homeworkonestop.com/CIS%20502/cis-502-technical-paper Product Description CIS 502 Technical Paper: Risk Assessment Week 10 A Graded Work 13 Pages Excluding Title and References Page. CIS 502 Week 10 Technical Paper Technical Paper: Risk Assessment Due Week 10 and worth 150 points Global Finance, Inc. Internet OC193 10Gbps Remote Dial UpUsers OC193 10Gbps DMZ Border (Core) Routers Distribution Routers VPN Gateway 10Gbps RAS PBX Printers Mgmt (x3) Credit Dept Finance Accounting Worstations Printers Worstations (x5) LoanDept WorstationsPrinters 10Gbps 10 Gbps 10 Gbps Oracle 9i DB Server 10 Gbps Access Layer VLAN Switch 10 Gbps 10 Gbps Exchange 2000 Email Worstations (x10)Printers (x3) Worstations (x49) Printers (x25) Customer Services Worstations (x12) (x5) Printers (x3) SUS Server (x5) (x63) (x7) Off-Site Office VPN Gateway PSTN Intranet Web Server Internal DNS File and Print Server Workstations (x7) 100Mbps Trusted Computing Base Internal Network Global Finance, Inc. Network Diagram Above is the Global Finance, Inc. (GFI) network diagram. GFI has grown rapidly this past year and acquired many network devices as displayed in the diagram. The company invested in the network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its network...

Words: 6189 - Pages: 25

Cis 502 Technical Paper

...CIS 502 Technical Paper Purchase here http://homeworkonestop.com/CIS%20502/cis-502-technical-paper Product Description CIS 502 Technical Paper: Risk Assessment Week 10 A Graded Work 13 Pages Excluding Title and References Page. CIS 502 Week 10 Technical Paper Technical Paper: Risk Assessment Due Week 10 and worth 150 points Global Finance, Inc. Internet OC193 10Gbps Remote Dial UpUsers OC193 10Gbps DMZ Border (Core) Routers Distribution Routers VPN Gateway 10Gbps RAS PBX Printers Mgmt (x3) Credit Dept Finance Accounting Worstations Printers Worstations (x5) LoanDept WorstationsPrinters 10Gbps 10 Gbps 10 Gbps Oracle 9i DB Server 10 Gbps Access Layer VLAN Switch 10 Gbps 10 Gbps Exchange 2000 Email Worstations (x10)Printers (x3) Worstations (x49) Printers (x25) Customer Services Worstations (x12) (x5) Printers (x3) SUS Server (x5) (x63) (x7) Off-Site Office VPN Gateway PSTN Intranet Web Server Internal DNS File and Print Server Workstations (x7) 100Mbps Trusted Computing Base Internal Network Global Finance, Inc. Network Diagram Above is the Global Finance, Inc. (GFI) network diagram. GFI has grown rapidly this past year and acquired many network devices as displayed in the diagram. The company invested in the network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its network......

Words: 885 - Pages: 4

Cis 502 Technical Paper

...CIS 502 Technical Paper Purchase here http://homeworkonestop.com/CIS%20502/cis-502-technical-paper Product Description CIS 502 Technical Paper: Risk Assessment Week 10 A Graded Work 13 Pages Excluding Title and References Page. CIS 502 Week 10 Technical Paper Technical Paper: Risk Assessment Due Week 10 and worth 150 points Global Finance, Inc. Internet OC193 10Gbps Remote Dial UpUsers OC193 10Gbps DMZ Border (Core) Routers Distribution Routers VPN Gateway 10Gbps RAS PBX Printers Mgmt (x3) Credit Dept Finance Accounting Worstations Printers Worstations (x5) LoanDept WorstationsPrinters 10Gbps 10 Gbps 10 Gbps Oracle 9i DB Server 10 Gbps Access Layer VLAN Switch 10 Gbps 10 Gbps Exchange 2000 Email Worstations (x10)Printers (x3) Worstations (x49) Printers (x25) Customer Services Worstations (x12) (x5) Printers (x3) SUS Server (x5) (x63) (x7) Off-Site Office VPN Gateway PSTN Intranet Web Server Internal DNS File and Print Server Workstations (x7) 100Mbps Trusted Computing Base Internal Network Global Finance, Inc. Network Diagram Above is the Global Finance, Inc. (GFI) network diagram. GFI has grown rapidly this past year and acquired many network devices as displayed in the diagram. The company invested in the network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its network...

Words: 885 - Pages: 4

Cis 502 Technical Paper

...CIS 502 Technical Paper Purchase here http://homeworkonestop.com/CIS%20502/cis-502-technical-paper Product Description CIS 502 Technical Paper: Risk Assessment Week 10 A Graded Work 13 Pages Excluding Title and References Page. CIS 502 Week 10 Technical Paper Technical Paper: Risk Assessment Due Week 10 and worth 150 points Global Finance, Inc. Internet OC193 10Gbps Remote Dial UpUsers OC193 10Gbps DMZ Border (Core) Routers Distribution Routers VPN Gateway 10Gbps RAS PBX Printers Mgmt (x3) Credit Dept Finance Accounting Worstations Printers Worstations (x5) LoanDept WorstationsPrinters 10Gbps 10 Gbps 10 Gbps Oracle 9i DB Server 10 Gbps Access Layer VLAN Switch 10 Gbps 10 Gbps Exchange 2000 Email Worstations (x10)Printers (x3) Worstations (x49) Printers (x25) Customer Services Worstations (x12) (x5) Printers (x3) SUS Server (x5) (x63) (x7) Off-Site Office VPN Gateway PSTN Intranet Web Server Internal DNS File and Print Server Workstations (x7) 100Mbps Trusted Computing Base Internal Network Global Finance, Inc. Network Diagram Above is the Global Finance, Inc. (GFI) network diagram. GFI has grown rapidly this past year and acquired many network devices as displayed in the diagram. The company invested in the network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its network...

Words: 885 - Pages: 4

Technical Paper

...Technical Paper: Database Administrator for Department Store Due Week 10 and worth 200 points The Strayer Oracle Server may be used to test and compile the SQL Queries developed for this assignment. Your instructor will provide you with login credentials to a Strayer University maintained Oracle server. Imagine that you have been hired as the database administrator for a local department store. The department store has recently expanded by opening five (5) stores within your local region. They have also launched a series of marketing campaigns to attract new customers and increase sales. For your hired role, you will be responsible for creating and maintaining an enterprise-wide database system that will hold the sales and inventory data for the organization. The designed database will help operations in supporting its new business marketing strategy. Using the concepts presented throughout the course, you will develop a plan to create this database and establish a design that aligns with the product sales initiatives of the organization. Write a twelve to fifteen (12-15) page paper in which you: 1. Identify the potential sales and department store transactions that can be stored within the database. 2. Design a database solution and the potential business rules that could be used to house the sales transactions of the department store. 3. Evaluate all relationships of each entity within your database solution using the Crow’s Foot notation. Include all data elements,...

Words: 878 - Pages: 4

Technical Controls Paper

...Technical Controls Paper A.M SE578 Gordon Francois Keller Graduate School of Management January 22, 2012 Technical Controls Technical controls use technology as a basis for controlling the access and usage of sensitive data throughout a physical structure and over a network. Technical controls are far-reaching in scope and encompass such technologies as: * Encryption * Smart cards * Network authentication * Access control lists (ACLs) * File integrity auditing software Logical controls (also called technical controls) use software and data to monitor and control access to information and computing systems. For example: passwords, network and host based firewalls, network intrusion detection systems, access control lists, and data encryption are logical controls. An important logical control that is frequently overlooked is the principle of least privilege. The principle of least privilege requires that an individual, program or system process is not granted any more access privileges than are necessary to perform the task. A blatant example of the failure to adhere to the principle of least privilege is logging into Windows as user Administrator to read Email and surf the Web. Violations of this principle can also occur when an individual collects additional access privileges over time. This happens when employees' job duties change, or they are promoted to a new position, or they transfer to another department. The access privileges required...

Words: 905 - Pages: 4

Technical Term Paper

...Technical Term Paper The Technical Term Paper will include the detailed response to the network design request. The document will be submitted in MS Word with graphics embedded within the document. Background You are a small network design company called Wide-IP that is looking for that big break. As the CTO of the Wide-IP company, you recently made a persuasive presentation of your company’s approach to designing networks at a large industry event. The CEO of Fiction Corporation, a large retail chain, was impressed by your presentation. It looks like you’ve finally got your break! You have a small team of 10 technically proficient staffers with a strong background in project management, networking, and internetworking skills that include PMP, Network+, CCNP, and CISSP credentials. You have been selected by Fiction Corporation to develop a network design document and plan without an RFP. Overview Fiction Corporation, a large national retail chain of 10,000 employees and 500 retail outlets, is migrating its one primary data center operation to a new headquarters building several miles away. The company wishes to upgrade its network and correct any security flaws in its infrastructure as part of this move. The Fiction CEO has informed you that the capital budget for this migration cannot exceed $500,000 and must not interrupt business operations. What follows is a brief background that will serve as your foundation in developing the network design. The data in......

Words: 657 - Pages: 3

Preparation of Papers for Aiaa Technical Conferences

...Preparation of Papers for AIAA Technical Conferences First A. Author[1] and Second B. Author, Jr.[2] Business or Academic Affiliation 1, City, State, Zip Code Third Author[3] Business or Academic Affiliation 2, City, Province, Zip Code, Country and Fourth C. Author[4] Business or Academic Affiliation 2, City, State, Zip Code These instructions give you guidelines for preparing papers for AIAA Technical Conferences. Use this document as a template if you are using Microsoft Word 2000-XP or later, or Word for Mac OS X. Otherwise, use this document as an instruction set. Define all symbols used in the abstract. Do not cite references in the abstract. The footnote on the first page should list the Job Title and AIAA Member Grade for each author. Nomenclature A = amplitude of oscillation a = cylinder diameter Cp = pressure coefficient Cx = force coefficient in the x direction Cy = force coefficient in the y direction c = chord dt = time step Fx = X component of the resultant pressure force acting on the vehicle Fy = Y component of the resultant pressure force acting on the vehicle f, g = generic functions h = height i = time index during navigation j = waypoint index K = trailing-edge (TE) nondimensional angular deflection rate Introduction T HIS document is a template for Microsoft Word version 2000-XP, Microsoft Word version 2003, or Word for Mac OS X. If you are reading a hardcopy or PDF version of this document, please......

Words: 5337 - Pages: 22

Technical Paper and Seminar Report

...as its weakest link. So, in order to make MANETs secure, all its The following are the advantages of MANETs: weak points are to be identified and solutions to make • They provide access to information and services all those weak points safe, are to be considered. Some regardless of geographic position. of the weak points and solutions to strengthen them are • These networks can be set up at any place and considered in this article. However the list is possibly time. incomplete, and some more weak points of MANETs are likely to be discovered in near future. So Security issues in MANETs will remain a potential research area Some of the applications of MANETs are in near future. • Military or police exercises. The rest of the paper is organized as follows. Section 2 will illustrate about MANETs. Section 4 will raise the • Disaster relief operations. 1 • Mine cite operations. 2.4.1 • Urgent Business meetings. Dynamic Source Routing (DSR) uses source routing to deliver packets from one node in the network to some other node. The source node adds the full path to the destination in terms of intermediate nodes in every packet . This information is used by intermediate node to determine whether to accept the packet and to whom to forward it. DSR operates on two mechanisms: Route Discovery and Route Maintainance. Route Discovery is used when the sender does not know the path upto the destination. In this mechanism, the sender broadcasts a ROUTE......

Words: 7796 - Pages: 32

تحميل APK | 7 /10 0 716 X-Men: Apocalypse (2016) | A Guide To Crisis Intervention Book Only