CIS 333 Week 10 Technical Project Paper Strayer University

CIS 333 Week 10 Technical Project Paper Strayer University 

CIS 333 Week 10 Technical Project Paper

 

Preview :

 

After looking at your network security structure there are various physical threats that we will focus on that could have a Hugh impact on your business intellectual property and availability. For example threat like fire, hurricanes, tornadoes, flooding, lighting, earthquakes and electrical failure that can destroy the network vital information to be lost. In the case of any of these events, to protect the pharmacy from losing important patient data we need to secure this data by implementing a backup and recovery plan to help reduce the downtime to get back online and not loss customer loyalty. Offsite storage like Cloud technology can allow access to all critical information without invests additional resource to maintain the storage solutions and the staff to maintain integrity of the network.

When looking at logical threats we must protect the network from unauthorized access internally and external attacks. Hackers understand that every device on the network has it weakness and they are trying to take advantage of it, devices that are most looked at are: servers, switches, routers, desktops, security devices and internal employees themselves. Unauthorized access of the database is a major concern when protecting the IT infrastructure for the pharmacy. Users without the proper clearance will threaten the integrity of the data that will be so devastating that it will make it next impossible to recover from. One of the most over looked threat is the authorized user that has access to information that may not pertain to their job description. Implementing logic controls like creating groups by department and also setting administration control limit from making any changes to the network or database.

 

Viruses are the biggest ongoing treat to IT infrastructures. They can be installed into the network as an executable file or packet information to steal, track information or hijack the network.How virus work they can come in various way like Trojan, Adware, pup files, Tracking cookies and malware. In some cases virus have affected networks so bad that hardware and software had to be replaced, do to damage it can take months to restore the network and recover database to optimal levels. Hackers form the outside may send emails to employees, making it look like a work related email. Once it is installed it will make the user think that it is performing that task that it was meant to do…xxx……………………..

 

More Details are Hidden…. Purchase to get Complete Tutorial Downloadable file…

Answer Detail

Get This Answer

Invite Tutor