Preview

Cis 333 Final Term Paper

Better Essays
Open Document
Open Document
2531 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cis 333 Final Term Paper
Technical Project Paper: Information Systems Security
Information Systems Security
Haseeb Ahmed Khan
Mark O’Connell
CIS 333 Fundamentals of Information Security
March 12, 2012

Abstract
In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.
The case we have been assigned today deals with physical and logical vulnerabilities and protection against the risks and threats by implying the best controls to either mitigate, avoid and transfer the risks. Being an Information Security officer at a newly opened location in a busy mall, I have been asked to identify physical and logical risks to the pharmacy operations and also to suggest remedies to avoid any huge loss to the business. The pharmacy operations involve the unique transactions which involves the critical patients’ data, valuable medication and access to cash. The regulation set by the government obligates a pharmacy to meet certain standards to secure logical and physical access to information systems.
The pharmacy is comprised of 4 work stations, there is a drug storage are and an office in the premises which has a file server, domain controller and a firewall. The three of the four work stations are placed at the counter to record and retrieve information of customers’ order. The entry of the store if from the mall and there the drug storage area is securely locked location behind the front counters. The store has a back door entry which is used by the employees and for delivery of new drugs. As an IT officer I have to



References: Kim, D., & Solomon, M. (2012). Fundamentals of information systems security. Sudbury, MA: Jones and Bartlett. Department of Finance and Administration, State of Tennessee. (2008). Enterprise Information Security Policies. (Document Version 1.6) Swanson, M., & Guttman, B. (1996). Technology Administration, NIST. Generally Accepted Principles and Practices for Securing Information Technology System, retrieved March 11, 2012, from http://csrc.nist.gov/publications/nistpubs/800-14/800-14.pdf Benton, R., (2005). Securing The Enterprise, retrieved March 12, 2012, from http://www.sans.org/reading_room/whitepapers/casestudies/case-study-information-security-securing-enterprise_1628 Ghosh, A., & Cigital, M. An Approach to Defending Against New and Unknown Malicious Software. Retrieved Feb 16, 2012, from http://www.cigital.com/resources/papers/ Farahmand, & F., Navathe, & S., Sharp, G., & Enslow, P., Assessing Damages of Information Security Incidents and Selecting Control Measures, a Case Study Approach, Retrieved March 11, 2012, from http://infosecon.net/workshop/pdf/39.pdf

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Is 411 Study Guide

    • 305 Words
    • 2 Pages

    Section 2. Information Security Business Challenges and Policies the mitigate risk within the 7 domains. – p 77 - 83…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    References: NIST (2011), Managing Information Security Risk -- Organization, Mission and Information System View, National Institute of Standards and Technology Special Publication 800-39.…

    • 721 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Cyber Warfare/Motivations

    • 1841 Words
    • 8 Pages

    References: Easttom, C., "Computer Security Fundamentals (2nd Edition)" (2011)., New York, Pearson Press, Krutz, Ronald L.; Russell Dean Vines (2003). The Information Security Systems Prep Guide (Gold Edition ed.). Indianapolis, IN: Wiley.…

    • 1841 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Garbars, K. (2002). Implementing an Effective IT Security Program. Retrieved from http://www.sans.org/reading_room/whitepapers/bestprac/implementing-effective-security-program_80 Greiner, L Guel, M. (2007). Policy Primer. Retrieved from http://www.sans.org/security-resources/policies/Policy_Primer.pdf…

    • 8519 Words
    • 35 Pages
    Powerful Essays
  • Good Essays

    Hussein, Handbook of Information Security ( I, 38-64). Hoboken, New Jersey: John Wiley & Sons,…

    • 483 Words
    • 2 Pages
    Good Essays
  • Good Essays

    References: Partners, C. (2014, January 24). Addressing the ongoing problem of IT security. Caldwell Partners. Retrieved February 19, 2014, from http://www.caldwellpartners.com/addressing-the-ongoing-problem-of-it-security/…

    • 649 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems Security. Burlington: Jones & Bartlett Learning.…

    • 1074 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Setting ground rules for an organizations internal structure) “Businesses, governments, and other organizations face a wide array of information security risks. Some threaten the confidentiality of private information, some threaten the integrity of data and operations, and still others threaten to disrupt availability of critical systems” (Sullivan, 2009). Since such security risks are always going to present in the cyber world, businesses and organizations need to fully be aware of any vulnerabilities in their systems. The initial realization of any organization’s vulnerability can only first be understood through the knowledge of what vulnerability means. A vulnerability is a security weakness but not a security threat. It is what needs to be assessed in order to examine an organization’s network. One of the main network vulnerabilities facing IT managers today is the absence of encrypted data being transferred and received between uninformed users and the lack of knowledge and understanding within an organization’s internal structure.…

    • 1764 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    It is crucial for any organization to take necessary steps in securing their business’ assets, and customer’s data. Furthermore, it is also important for these security measures to be effective, and thoroughly planned. It is as equally important, in this interconnected and high-tech world, for corporations to also have and enforce an effective corporate security policy, because there are both internal and external threats (Symantec Corporation, 1995-2010).…

    • 1470 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    Threats References: 1. (2010). Principles of Computer Security: CompTIA Security+ and Beyond (2nd ed.). : McGraw-Hill.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Security in many organizations today is focused on technology and tools; this can be a benefit to organizations as much as it can be a risk. It can be benefit because it can facilitate things for the organization but, it can be harmful because it can backfire, it can facilitate the organizations percentage of being breached by a malicious hacker from either inside or outside the organization. Organizations don’t seem to focus enough on business requirements, physical and information assets, and risk assessment, this can be harmful since these are very important things you need when you have your own organization/company. In this paper I will be talking about the security plans and procedures for important things to an organization such as; E-mail, Acceptable use, Physical security, and last but not least Incident response.…

    • 1383 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Term Paper

    • 1470 Words
    • 5 Pages

    Miyazaki, A., & Fernandez, A. (2001). The Journal of Consumer Affairs. Wiley.com. Shoniregun, C. A. (2002, October 1). The Future of Internet Security. Ubiquity, p. 1.…

    • 1470 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Security Program

    • 1803 Words
    • 8 Pages

    SECURITY PROGRAM Outline Mecael Getachew Assignment 14 IT-570-OL Scope Cyber security is the most important goal in the United States today. In order to achieve this, government agencies and organizations must align the education needed with the required skill-set and knowledge mandatory in the workforce. Information security programs manage business and technical risk by documenting roles and responsibilities in an organization. Information security programs have grown over the last decade because of business-related reasons such as cost control and regulatory requirements. An effective program helps maintain trust between business partners and customers while facilitating guidelines and decision-making in protecting information (Onsett). They provide confidentiality, integrity, and availability for information (stored or in transit) and several other security elements (Office of the CISO).…

    • 1803 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Active Review #4

    • 552 Words
    • 3 Pages

    Chapter 12 #1 & #2 Chapter 10 #8 & #9 Active Review #4 Information Systems Development and Information Security Management are two of the most common workflow in almost every business and organization. If information systems is development well and correctly, many benefits will occur, including increase productivity, reduce the stock of material production, eliminating activities, improve service and customer satisfaction (“Benefits of management,” 2012). Certainly, Information Security Management is critical in today’s business. Information security management raises awareness throughout the business for information security risks and organization will improve credibility and trust among internal stakeholder and external vendors (“Six Main Benefits”, 2012). Information Security Managements an Information Systems Development are explained in many ways.…

    • 552 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Syllabus MIS 6330

    • 3060 Words
    • 13 Pages

    Course Pre-requisite MIS 6304 or MIS 6350 Course Description The need for organizations to protect critical information assets continues to increase. Today, more than ever, organizations require professionals who understand technical issues and who are also capable of devising security strategies. Contrary to the common view, information security is mainly a managerial problem. Only through effective management of security, can security polices be defined and technical solutions be selected. The…

    • 3060 Words
    • 13 Pages
    Good Essays