StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Risk Assessment for the Pharmacy - Report Example

Cite this document
Summary
This report "Risk Assessment for the Pharmacy" discusses data security hazard assessment of the pharmacy. The assessment is led to distinguish the seriousness of every data framework, which deserves priority because of the estimation of information that needs to be ensured…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.1% of users find it useful
Risk Assessment for the Pharmacy
Read Text Preview

Extract of sample "Risk Assessment for the Pharmacy"

Full Paper Risk Assessment for the Pharmacy Before conducting data security hazard assessment of the pharmacy, there are fundamental ideas that need to be reviewed. One of them is a threat that is characterized as the plausible network security rupture which may happen later on and will harm the system, and also Information frameworks. The current patterns in technology progression have empowered the systems to be pervasive. Individuals are associated at home, workplaces, and additionally when they are voyaging either by means of portable computer or cell telephones. The assessment is led to distinguish the seriousness of every data framework, which deserves priority because of the estimation of information which needs to be ensured. Both dangers and vulnerabilities need to be considered simultaneously. Dangers can give harm to the confidentiality, accessibility and uprightness of information present in the data frameworks. They investigate opportunities for security breaches to cause classified information intrusion by means of unapproved access, amendment of information, removal of data from data frameworks. Threats can hit the pharmacy system from different sources. These threats are confidential on the parameters of distinctive capacities and methodology including outer approaches by cyber-crimes, hackers, terrorists. For taking care of dangers of diverse nature for the pharmacy, distinctive risk alleviation and control techniques are needed in the connection of securing the organized information systems. Vulnerabilities are the shortcomings which are exhibited in the framework against the current dangers. Vulnerabilities can be recognized as security loop holes in the framework. If hackers discover these loop holes in the framework, results are wrecking including unauthorized access, revision or complete cancellation of the framework. A recent example is the hacking of wiki leaks site which affected the entire world furthermore influenced strategic and financial relations between nations as different classified documents were spilled out from the site. Vulnerabilities are fruitful because of approach shortcomings, deficient usage of security framework, and information of individual issues. For recognizing any conceivable threats, testing of the security framework including system parts, hardware and software is essential which may happen later on. The risk is characterized as the probability of diverse dangers by means of distinctive circumstances, which are influencing the system and data frameworks. The circumstances ought to consider the system, efforts to establish safety, ecological measures, own experience and the experience of other joined substances in the connection of data security failure. The effect computation is additionally needed as far as information respectability, accessibility; secrecy and the expense connected with the altering frameworks, lost accessibility and other related issues which are of prime concern to the system and data framework operations. Estimations comprise of: Cost which is utilized to secure the data and system Estimation of the information and information systems Threat likelihood and event Effectiveness of Controls Hazards focus the personalities and amounts of any chemicals or unsafe substances exhibit as contaminate causes in nature. There are distinctive sort of risks needed for cleaning and support of the workplace furniture and things of the pharmacy. Dangers may masquerade to human health or the system and data frameworks when spilled out unintentionally by mistake. They likewise require flammable qualities which may happen in serious dangers and help to increase fire or different incidents. Resources are the parts serving inside, and also remotely, inside the pharmacy. Resources can be separated into a few diverse data innovation situations. The physical foundation contains Servers, workstations, data centers, switches, switches and so forth. The center framework contains virtual private systems, Microsoft active registry, domain controllers, email servers and so forth. The Internet framework contains open cryptographic keys, preparing manuals, messages and so on. Risk Analysis Methodology The "www.businessdictionary.com" characterizes risk analysis as "Relative measure of danger or resource worth in view of positioning or partition into descriptive categories, for example, low, medium, high; not imperative, critical, vital; or on a scale from 1 to 10". Numeric values are consigned for estimations that can be explored to focus risk needs. For performing risk analysis for the venture system, stages are isolated to center particular stage absolutely. The goal is to make the system secure from dangers and vulnerabilities. The approach will delineate choices as yields for every stage. Evaluating Risks by Qualitative Risk Analysis A complete meaning of qualitative risk analysis is delineated by (Hintzbergen, Hintzbergen et al. 2010) which says” Qualitative risk analysis, which is utilized all the more regularly, does not include numerical probabilities or expectations of misfortune. Rather, the subjective strategy includes characterizing the different dangers, deciding the degree of vulnerabilities and formulating countermeasures ought to an assault happen". Qualitative risk analysis can be performed on electronic information examination, and manually. The goal is to recognize just the most noteworthy danger components which are identified with interruption identification and cybercrime aversion. Qualitative risk analysis likewise gives assessment of the potential harm in the connection of security controls. Ineffectual quantitative investigation includes questionable and inefficient data on threat occurrence and likelihood alongside the prospect unwavering quality and execution of controls identified with interruption location and digital wrongdoing counteractive action. Fig 1.1 demonstrates quantitative investigation and the distinguished dangers alongside the event and security levels. Occurrence Risk Severity Identified Risks Highly likely to occur High risk 1) Network Monitoring Medium likely to occur High risk 2) Information Leakage Not likely to occur Medium/low risk Highly likely to occur Medium risk 3) IT Security Framework Medium likely to occur Medium/low risk 4) System and Network Administration Not likely to occur Low risk Highly likely to occur Low risk 5) Integration of data between systems Medium likely to occur Low risk Not likely to occur Low risk Fig1.1 Network monitoring (High Risk / Occurrence high) Network monitoring is the prime obligation of the association after execution. There are such a variety of dangers creating once a day. They embrace better approaches for assaulting systems. The steady and proficient checking of the system identifies any break to the system at a starting stage. The early ID of any security break helps the association to isolate the threats or minimize the effect of these dangers on the system and frameworks. Cautions can be activated for any uncommon action on the system. If the system checking is compromised, no malevolent action will be identified bringing about genuine harm to the system parts, and additionally the data frameworks. System and Network Administration (Medium Risk / Occurrence Low) Framework organization danger includes problems, for example, Anti-virus programs are not up to date Latest framework security patches are not installed Forgot to install the security software on every system Employees who have effectively resigned, client records still not erased If the system organization strategies are not executed effectively, threats are more inclined to be directed inside the association. Interior threats may happen. For instance, unapproved access, rupturing into very ordered data frameworks and systems. Information Leakage (High Risk / Occurrence Medium) The information leakage can bring about transmitting highly characterized information to the hacker. The hackers can likewise send a malicious code to break in the system. The small software can be introduced on any arrangement of the system and is not noticeable. The small software then tries to build an association with mission discriminating data frameworks to either harm the information or transmit the information to the hacker. IT security framework (Medium Risk/ Occurrence High) An effective configuration of the security framework is important concentrating on the potential dangers and vulnerabilities. All the procedure and capacities are performed on the security structure of the system and data frameworks. If the system or the security base is not satisfactory, associations may confront extreme dangers and vulnerabilities later on. Integration of data between systems (Low Risk / Occurrence High) The transmission of information internally and externally is dangerous. The associations with the external framework are the doors for hackers to enter the system. Encryption conventions need to be executed for encoding the information between the inside and outside frameworks. For giving enhanced functionality to the association, approaches and methodology must be characterized. They assume an essential part for an associations smooth working. So as to actualize strategies and methods, group discussions are needed for developing and executing them in a certifiable situation. The main necessity is to separate them. A security approach contains as an archive or standards that indicate the announcement What must be carried out with a specific end goal to guarantee efforts to establish safety in the framework or the system. Though, methodology is connected with the rules and practices that are executed keeping in mind the end goal to force the guideline. Case in point, in a system security situation, where there is a necessity for keeping the remote system, and unknown access must be blocked. Similarly, the security arrangement report will characterize What needs to be carried out to block anonymous access for a remote system. While, the methodology will characterize the practices and guidelines that need to be followed with a specific end goal in order to block the unknown access (In InfoSecCD 05: Proceedings of the second yearly gathering on Information security educational program improvement, 2005). After differentiating both the security strategies and techniques, these two are connected with improvement and organization in an association. The term security regarding improvement and organization is more like an administration issue instead of a specialized issue in an organization. The justification is to use and classify employees of an association productively. Also, from the administration point of view, discourses occur for depicting different vulnerabilities and dangers alongside the making of arrangements and methods that may contribute for the accomplishment of association objectives. After the exchanges and arrangement of strategies and methods to contribute for associations prosperity, the improvement methodology is launched at an abnormal state, and a while later executed at lower levels inside an association. The supposition mirrors the improvement of approaches and methods, necessity of approbation from concerned staff and after that executing them easily for the representatives (In InfoSecCD 05: Proceedings of the second yearly gathering on Information security educational module advancement, 2005). Then again, launch of these security arrangements is simple and not extravagant, yet the execution is the most troublesome angle. On the other hand, the improvement and organization dont agree viably, or neglects to build mindfulness between representatives identified with the strategies and methods, the impediments may influence insufficiently for the association. For example, an attack from a social engineering site, for example, Facebook, twitter, or "MySpace" may extricate sensitive information from senior or trusted workers of an association. If the arrangements and strategies were comprehended or actualized legitimately, workers will be very much aware of not giving any information or they will confirm approval before giving data on the locales. To ensure data frameworks for association is a complex undertaking as hackers make new vulnerabilities from time to time. The security gadgets are redesigned for just shielding the information and system from the current known dangers and vulnerabilities. The likelihood for new dangers cant be expected. Sending of firewall cant ensure the system, as dangers are connected with both internal and external system. To ensure the system, measurements are made as far as physical security, working framework security, database security and system security. Physical security is connected with standards and strategies to be trailed by the clients. For example, if an association has the approach to arrange secret key for a screen saver, each representative must take after, despite the fact that these are the rudiments yet need to be followed. Additionally, the information servers must have a backup server on some other physical area that is reproduced. The operating system security must characterize guidelines and methodology for representatives to upgrade antivirus routinely, security patches, and whatever other programming fix that the system manager has quite recently imparted for likely vulnerabilities. Also, representatives ought to output the framework every so often or amid their lunchtime to evade security breaks. Keeping in mind the end goal to give database security, association must finish all the obliged stages before making it operational. The stages incorporate outline, advancement and spread of strategies and methods. The three basic parameters that are connected with database incorporate respectability, accessibility, and information. Besides, the optional and access control is likewise vital as it confines and permits particular clients to get to the database (In InfoSecCD 05: Proceedings of the 2nd annual conference on Information security curriculum development, 2005). For joining strict approaches and methods to guarantee system security and data resources, execution of IDS is prescribed as it sense unusual activities on the system. It is characterized in network dictionary’ reference as “Network-based intrusion detection system (NIDS) alludes to an interruption discovery framework (IDS) that screens action on a system, rather than a specific host”. The NIDS will listen to all system exercises as opposed to confining for only one host. Also, incapacitating USB ports from the employee workstations can likewise secure the system from infections and Trojans that came along with the flash drives. References HINTZBERGEN, J., HINTZBERGEN, K., SMULDERS, A. and BAARS, H., 2010. Foundations of Information Security: Based on ISO27001 and ISO27002. Van Haren Publishing. In InfoSecCD 05: Proceedings of the 2nd annual conference on Information security curriculum development (2005), pp. 49-53, doi:10.1145/1107622.1107634 Network-Based Intrusion Detection System. 2007. Network Dictionary, , pp. 340-340. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CIS 333 Week 10Technical Project Paper Coursework”, n.d.)
CIS 333 Week 10Technical Project Paper Coursework. Retrieved from https://studentshare.org/information-technology/1682209-cis-333-week-10technical-project-paper
(CIS 333 Week 10Technical Project Paper Coursework)
CIS 333 Week 10Technical Project Paper Coursework. https://studentshare.org/information-technology/1682209-cis-333-week-10technical-project-paper.
“CIS 333 Week 10Technical Project Paper Coursework”, n.d. https://studentshare.org/information-technology/1682209-cis-333-week-10technical-project-paper.
  • Cited: 0 times

CHECK THESE SAMPLES OF Risk Assessment for the Pharmacy

Gastrointestinal disorders

The rest of the 10% of the customers belong to the elderly group with age ranging from 65 years old and above. 80% of patient – pharmacist – pharmacy staff discussion is… Only 10% of the discussion is on the need of antihistamine and referral to GP. About 60% of the consumers who walks into the pharmacy requesting for analgesics and explaining their symptoms to the pharmacist Only 30% of the consumers are not the patient.... Patients who came in to the pharmacy requesting for OTC analgesics oftentimes think that it can be used anytime without acquiring the potential side effects of the medications....
4 Pages (1000 words) Essay

The Practices and Principles Related to Health Disaster

The paper "The Practices and Principles Related to Health Disaster" analyzes manual task hazards that might be experienced in any given organization or workplace.... It covered the strategies of proactive that are used in order to achieve legal compliance.... nbsp;… The main purpose of this report was to identify hazardous manual tasks and discover if they are compliant or non-compliant, to assess the risks involved with the manual tasks and the various strategies which are used to eliminate or minimise these risks....
8 Pages (2000 words) Research Paper

The Public Health Infrastructure, and the Status of World

Inadequate development in Afghanistan has lead to poverty resulting from excess consumption, together with an expanding population (Bowley, 2012).... This has caused harsh environmental health issues in Afghanistan and some other… The relation of health, socio-economic and environmental improvements demands traverse efforts....
4 Pages (1000 words) Essay

Challenges of CVS Pharmacy Company

Roberta Watterson claimed that the $600 yearly health insurance addition charge for CVS employees who fail to complete biometric screening and health risk assessment is illegal in reference to provisions of the state's Labor Code.... The author of the paper "Challenges of CVS pharmacy Company" presents the faults of CVS Company in the supply-chain management system.... hellip; CVS is the largest pharmacy chain in the USA.... Just recently, a cashier for CVS pharmacy in Oakland California testified in court about the company's practices....
2 Pages (500 words) Assignment

Project Management - Project Analysis and Risk Management Plan

The purpose of this paper is to analyze the two real-life projects related to the adoption of Information Technology in the organization by identifying the success factors of these projects, and also to identify the risk factors with the help of risk map as well as provide suggestions for mitigating or managing the risks....
16 Pages (4000 words) Essay

The IT Infrastructure of the Pharmacy Business

The paper 'The IT Infrastructure of the pharmacy Business' focuses on Information security which is a particular approach of protecting confidential data within a computer security system.... the pharmacy business will need to implement basic IT components in business such as Firewall, Desktop computers, Windows 2012 active directory domain controllers (DC), Dedicated T1 connection, and File server among others.... nbsp;Notably, the pharmacy business is currently using Firewall, Desktop computers, Windows 2012 active directory domain controllers (DC), Dedicated T1 connection, and File server for its IT operations all of which are open to both physical and logical threats....
8 Pages (2000 words) Case Study

A Process Develop a Business Continuity Plan

oots pharmacy Operating Environment Boots limited, which is commercially referred to as Boots, is basically the leading pharmaceutical chain in U.... In addition the business is part of the Alliance pharmacy which is composed of the very best pharmacies referred to as the Boots business.... n order to exercise an effective business continuity plan, it is essential that the plan must be subjected to validation and verification through carrying out self assessment and an audit of the organization in order to ensure that the continuity plan is fit for the purpose it was intended....
11 Pages (2750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us