I’ve recently been assigned as the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls geared towards protecting medication and funds located on the premises, as well as the personally identifiable information and protected health information of your customers that resides on your system. I’ve been tasked with identifying inherent risks associated with the pharmacy and establishing strong physical and logical access control methods to mitigate the identified risks.
The pharmacy is also responsible for safeguarding electronic patient records and medical data, as well as maintaining drug and other controlled substance on the premises. The IT professional must protect the firewall, file server, domain controller and onsite computers.
Physical threats can cause damage to the hardware and storage capacity of computer systems, consequently limiting the readability of the data. The physical threat often causes the computer system or hardware to crash. It may be caused by internal, external or human errors.
Identify at least five (5) potential physical threats that require attention.
1. Five (5) potential Physical Threats that we believe require attention are:
a. Insider Threats
b. Hardware/Software Theft and Vandalism
c. Unstable Power Supply
d. Firewall and IDS
Logical threats accounts for most computer threats in an organization as the hacker can attack the internal network without physically touching the host system.
Determine the impact of at least five (5) potential logical thre...
... middle of paper ...
...le for checking all incoming and outgoing packets from the network; Intrusion Detection (ID) is the process of monitoring for and identifying attempted unauthorized system access or manipulation. Together they both will it help protect the pharmacy from outside networks trying to communicate with the internal network. Firewalls packet filtering is helpful in that it checks all packets coming into the network and decided if it should pass on or deny the packet. Conducting your own vulnerability scan on your network will help you detect your network strengths and weakness that could be exploited. IDS gather and analyze information from diverse areas within a computer or a network to identify possible security breaches which include both intrusions (attack from outside the organization) and misuse (attack from within the organization) ("firewall/ids," 2013, p. 1).
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Introduction The mediator Today In Government sectors and all the organizations around the world, notes that it expand dramatically and rapidly. And as a result we see the amount of great development to keep pace with this expansion. So they began requesting information systems to achieve that thing in all sectors and departments, according to the nature of the work of the organization and the number of sections. However, some projects of information systems in organizations that cannot provide the asking them for several reasons and result in the failure of these systems in organizations.... [tags: Management, Project management]
1413 words (4 pages)
- the inherent supply chain in this industry, which is done through encouraging the collaboration of all these elements in a given project. Some of the unique barriers in the process have been discussed below- Technical barriers: The civil industry has been termed as fast paced wherein most of the involved parties face the issue of time constraints and thus tends to find it difficult to look for a mutual commitment to use any kind of extranets (Sauer, 2007). Thus, the involved extranets should work fast and easy to operate.... [tags: Construction, Project management, Project manager]
3721 words (10.6 pages)
- This paper will reflect on the different uses of Project Risk Management and ways in which it can benefit organizations to have the ability to identify potential problems prior to the problem occurring. Risk, this is not something to be taken lightly whilst dealing with matters that include high end projects meeting specific details, deadlines and expectations for the end client. Project risk management teaches one to be aggressive early on in the phases of planning and implementing the tools for a project.... [tags: Project management, Risk management, Management]
1157 words (3.3 pages)
- Technical and domain knowledge are both important in IS development. Domain knowledge is essential for successful software design and implementation (Tesch, D., Sobol, M., Klein, G., & Jiang, J., 2009). The familiarity of the domain affects the performance of the IS developers. The specific knowledge of the domain is important for the IS developers to finish the job which then reflects the work of the IS researchers. The participation of users in the ISD, group decision-making and the building of relationship ties are developed from pulling of domain knowledge as well as sharing development expertise.... [tags: Information Technology ]
619 words (1.8 pages)
- The development team has begin to have meetings with both Bob and Thelma Mellankamp. They have expressed that they need to go ahead with an upgrade of their information system. To conduct the planning necessary several step must be taken. These are to include the identification of the issue; the scope of the project as a whole; the feasibility of the project; and the development of a project scope statement in order to identify expectations, deliverables, and benefits of conducting this project.... [tags: Management, Inventory, Project management]
1155 words (3.3 pages)
- The pre-construction phase is vital to any major project as it’s where everything gets sorted out. You will have the client that has a plan on what building they will want, they will work closely with a project manager. An architect that will listen to the client’s needs regarding what they want. The designer will design the building with help from the architect. (Wiki 2016) Schematic diagram of job roles (Wiki 2016) During the construction programme, there are 8 planning stages known as Royal Institute of British Architects (RIBA) RIBA Plan of Works 2013: • Strategic Definition – Stage 0 • Preparation and Brief – Stage 1 • Concept Design – Stage 2 • Developed Design – Stage 3 • Technica... [tags: Construction, Project management, Building]
793 words (2.3 pages)
- Hardware Replacement Project The information technologies department is improving itself by integrating the newest solution for customer relationship management (CRM). The hardware replacement project (HRP) for this addition includes five major variables. These variables are time, costs, scope, quality, and risk. Many thoughts are worth considering and taking into account when choosing the best projects, and they are important to have the most worthwhile final results for the business. The issues that affect project risks need to be discussed, and I can recommend ways to carry out this project with the minimum of necessary risk.... [tags: cost and project management analysis]
987 words (2.8 pages)
- Use Case: Project Progress Reports One of the biggest problems with project management is updating, monitoring, and communicating the progress of a project. How often should progress be updated. How often should progress reports be distributed. To whom should the progress reports be distributed. In what form should the progress reports be distributed. What software programs can or should be used. What is the security level of project progress. As part of developing the need in the initial investigation step in the systems development life cycles (SDLC) process, a constructive method is use case.... [tags: Project Management]
946 words (2.7 pages)
- INTRODUCTION This paper outlines the specific project management services recommended for the following three stages of any development. 1. A new project that as yet has not commenced 2. A project underway though only the design has been completed 3. A project underway that is already within the construction phase As the services within items 2. and 3. primarily form a subset of item 1, we will identify all of the services normally recommended for a complete project and then list those that are applicable to items 2.... [tags: Business Project Management]
1902 words (5.4 pages)
- Project Management In today's business it is in the best interest of companies to have project managers. Common sense isn't always easily accomplished. Anyone who's ever worked on a project in a technical setting knows this. Indeed, much of working with others consists of solving unexpected problems and learning from mistakes along the way. Knowing this and having the proper tools a project manager will be able to manage and complete the most intense project out there. It seems that people time and again have the wrong impression of what a project manager does.... [tags: Business Project Management Leadership]
2243 words (6.4 pages)