IT Plan
As the world continues to evolve with technology and technological advances, certain problems arise that requires precise and involved management of these advances. The purpose of this essay is to examine the importance of information security systems and how they demonstrate their importance in the commercial world. To do this, this essay will be presented from the viewpoint of an Information Security Officer (ISO) who has been tasked to identify the inherent risks associated with a business operation and to establish physical and logical access control methods that will help minimize those risks. A scenario has been created to help explain this process where a pharmacy and its accompanying information systems scheme are presented to give an example of how this may be done.
In order to accomplish this task, this report will first identify the physical vulnerabilities that are given in the directed scenario before identifying the logical vulnerabilities and threats that require an ISO's consideration. Next, the potential impacts of all of these threats will be presented in order to formulate a solid solution to the problem. The logical threats and vulnerabilities will also be discussed in terms of their full impact on the situation. This report will then move into a mindset that attempts to thwart and lessen these threats as controls are introduced to help mitigate each risk presented.
Background Scenario
This particular scenario revolves around a pharmacy store and their associated information and computing systems that are being utilized by the leadership at this store. As the ISO for this organization, it is my responsibility to ensure that these systems are safe, secure and, most importantly, fall within the larger strategic concept of the firm. The pharmacy itself contains several important details that will help shape and define the controls that will eventually be implemented.
The pharmacy is a standard square store with some unique features. The front entrance of the store, leading from a larger mall, is where most of the interaction with customers begins. There are three windows in this store that have personal computers to assist the customers and their purchases. The back room has a unused caged area, drug inventory and an office with the information systems components. In this architecture, these components consist of a firewall system, a server domain controller, a file server and another computer. The system runs on a TI line to communicate between machines and elsewhere. There is also a rear entrance to this shop that is used for employees only.
Ultimately, the ISO is responsible for ensuring that this system operates fluidly and efficiently. This requires having knowledge and understanding of the users of the system, the hardware, software, operating system and network administration. Only when all of these prerogatives are matched with an accompanying plan, will this pharmacy be safe to operate within. .
Potential Physical Vulnerabilities
The physical layout of the store provides the best information on how to identify physical threats to the pharmacy store. The most obvious of these factors can be understood by the location of the most important items of the system. In this particular instance, there are some glaring problems with the physical security of this pharmacy.
The main components of the network, the firewall, server and controllers are all located within an unsecured office location. Any individual wishing to invade the physical space of this system would be relieved to know that there is very limited physical security associated with the network itself. The back door's location also denotes this risk as well.
The physical constructs of this system is not taking into consideration one of the biggest threats to security, the employees themselves. Prince (2009) explained that "Employees with malicious intent have always been the biggest threat to an organization. " Hiring practices are never perfect and the human condition will always surprise, so it is important to defend against this threat even if it is not obvious.
Any employee to the pharmacy has direct access to all of the drug inventory, but more importantly the computer systems as well. . Theft of equipment or vital data can have a large and significant effect on any organization. Theft of important equipment within the firm, such as cables, routers or even computers can have a big affect. For example, if someone were to take a vital piece of equipment, it could cause the whole system within the organization to completely shut down, or could even open up holes for security breaches to occur. Employees are most familiar with their employer's computers and applications, including...
Executive Business Program As the world continues to globalize, education becomes more important than ever before. There was a time when experience and a high school diploma could get someone a position, and with years of dedication and experience they would advance without ever furthering their education. Those days are gone for good. In today's world, higher education is the key to being able to define and achieve one's professional
Lesson 6 Journal Entry # 9 of 13 Journal Exercise 6.4B: Responding to Literature Modern British Poetry Lesson 6 Journal Entry # 10 of 13 Journal Exercise 6.5A: Responding to Literature The poem was written in 1919, which is immediately after the First World War. I think that Yeats is, on one hand, enthusiastic about the end of the world and the coming of a new era. On the other hand, I think he is
World Trade issues are an important issue to the plight of Africa as well. Providing a more level playing field for Africa to get into the game will set the wheels in motion for improvement and allow Africa to begin reaping some of the benefits of the world trade agreements. That money can be funneled back into the development of the continent thereby reducing the need for outside funding. Debt cancellation
Essay Topic Examples 1. Adapting to Cultural Diversity: Disney's Global Park Strategies This essay would explore how Disney World tailors its management strategies to accommodate diverse cultural preferences and practices across its international parks. It would involve an in-depth look at how the company navigates cultural nuances, adjusts its entertainment offerings, and trains its staff to effectively manage a global brand while maintaining local relevance. 2. The Expansion of the Disney Brand: Success
world's economy continues to struggle it has become fashionable in some political circles to advocate the adoption of a type of tax described as a carbon tax as a method of minimizing spiraling government costs. Use of the word, "carbon," is somewhat misleading. The broad meaning of the carbon tax term is to define a tax that is designed to not only raise revenue but also change the behavior
Thus, paramount American interests were to be presented as being really the interests of the Europeans themselves. It would be a situation wherein America was simply helping along people who were, at present, unable to adequately help themselves. The concept had much in common with the goals of many charity or self-help organizations - people grow and are transformed by learning to help themselves. They are given assistance so as
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now