IT Plan
As the world continues to evolve with technology and technological advances, certain problems arise that requires precise and involved management of these advances. The purpose of this essay is to examine the importance of information security systems and how they demonstrate their importance in the commercial world. To do this, this essay will be presented from the viewpoint of an Information Security Officer (ISO) who has been tasked to identify the inherent risks associated with a business operation and to establish physical and logical access control methods that will help minimize those risks. A scenario has been created to help explain this process where a pharmacy and its accompanying information systems scheme are presented to give an example of how this may be done.
In order to accomplish this task, this report will first identify the physical vulnerabilities that are given in the directed scenario before identifying the logical vulnerabilities and threats that require an ISO's consideration. Next, the potential impacts of all of these threats will be presented in order to formulate a solid solution to the problem. The logical threats and vulnerabilities will also be discussed in terms of their full impact on the situation. This report will then move into a mindset that attempts to thwart and lessen these threats as controls are introduced to help mitigate each risk presented.
Background Scenario
This particular scenario revolves around a pharmacy store and their associated information and computing systems that are being utilized by the leadership at this store. As the ISO for this organization, it is my responsibility to ensure that these systems are safe, secure and, most importantly, fall within the larger strategic concept of the firm. The pharmacy itself contains several important details that will help shape and define the controls that will eventually be implemented.
The pharmacy is a standard square store with some unique features. The front entrance of the store, leading from a larger mall, is where most of the interaction with customers begins. There are three windows in this store that have personal computers to assist the customers and their purchases. The back room has a unused caged area, drug inventory and an office with the information systems components. In this architecture, these components consist of a firewall system, a server domain controller, a file server and another computer. The system runs on a TI line to communicate between machines and elsewhere. There is also a rear entrance to this shop that is used for employees only.
Ultimately, the ISO is responsible for ensuring that this system operates fluidly and efficiently. This requires having knowledge and understanding of the users of the system, the hardware, software, operating system and network administration. Only when all of these prerogatives are matched with an accompanying plan, will this pharmacy be safe to operate within. .
Potential Physical Vulnerabilities
The physical layout of the store provides the best information on how to identify physical threats to the pharmacy store. The most obvious of these factors can be understood by the location of the most important items of the system. In this particular instance, there are some glaring problems with the physical security of this pharmacy.
The main components of the network, the firewall, server and controllers are all located within an unsecured office location. Any individual wishing to invade the physical space of this system would be relieved to know that there is very limited physical security associated with the network itself. The back door's location also denotes this risk as well.
The physical constructs of this system is not taking into consideration one of the biggest threats to security, the employees themselves. Prince (2009) explained that "Employees with malicious intent have always been the biggest threat to an organization. " Hiring practices are never perfect and the human condition will always surprise, so it is important to defend against this threat even if it is not obvious.
Any employee to the pharmacy has direct access to all of the drug inventory, but more importantly the computer systems as well. . Theft of equipment or vital data can have a large and significant effect on any organization. Theft of important equipment within the firm, such as cables, routers or even computers can have a big affect. For example, if someone were to take a vital piece of equipment, it could cause the whole system within the organization to completely shut down, or could even open up holes for security breaches to occur. Employees are most familiar with their employer's computers and applications, including...
Executive Business Program As the world continues to globalize, education becomes more important than ever before. There was a time when experience and a high school diploma could get someone a position, and with years of dedication and experience they would advance without ever furthering their education. Those days are gone for good. In today's world, higher education is the key to being able to define and achieve one's professional
World War I was believed to be the last general war that this world had to go through. Due to massive losses during the first major conflict, people believed that no country will ever want such an event to happen. However, twenty years after the Treaty of Versailles, Britain and France declared war on Germany. The Second World War caused the death of many more people than the first. Unlike
Governments turned out to be involved with original subjects for instance rationing, manpower distribution, home defense, removal in the time of air raid, and reply to job by an enemy control. The confidence and mind of the persons replied to management and publicity. Classically women were militarized to an exceptional degree. The achievement in rallying financial production was a main factor in secondary battle processes. Altogether of the power
World War II WW II Manhattan Project: Begun in 1939, this project was the codename for the United States' secret Atomic Bomb project. With America's entry into the war, the project grew substantially and ultimately involved more than 125,000 people, 37 separate installations, 13 university laboratories and a number of the nation's top scientists. (History.com: "World War 2: Atomic Bomb") In 1942 the project was put under the control of the U.S.
The strike at Heligoland Bight was not intended to seriously hurt the German fleet. Rather, it was intended to distract Germany from the landing of marines at Ostend in Belgium. Catching the German fleet completely by surprise in its own port, German light cruisers engaged the Royal Navy without proper cover. The Germans lost 3 light cruisers and a destroyer, as well as more than 1,000 men. In great
World War II Economical and military abilities of major participants of the war - Germany Soviet Union France Great Britain Important military campaigns France (including Belgium and Holland) Balkan campaign (Greece and Yugoslavia) Russian campaign Industrial production in 1943 World War II is the most tragic but extremely interesting period of human history of al centuries. It was a regular continuation of previous absurd bloody conflict - World War I. New war began after Germany was defeated in WWI and after
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now