Opinions money due to excessive cost of

Opinions – Analysis of Current Security System of Pharmacy Store
center287020Identification of Assets
Table 1
Risk, Threat, and Vulnerability
Risk Threat Vulnerability
Leakage of data to inappropriate people
Loss of data
Loss of money due to excessive cost of restoration and repair
Loss of trust to company’s reputation due to data breach
Loss of productivity
Unauthorized devices access to internal information Exploits
Trojan Horse
Identity Theft
Advanced Persistent Threat (APT)
Distributed Denial-of-Service (DDoS) Attack
Rootkit Allow staffs’ personal mobile devices connect to Wi-Fi as some malware can spread through network
Free anti-virus software may not detect all malware
Lack of security policy
Lack of appropriate network and device security
Unauthorized devices may allow to access to internal applications and network
Black Hat Hackers
Malicious Insiders
Industrial Spies
Hacktivists Table 2
Firewall is a network security system that limits network access based on the access policy of an organization. It acts as a stand guard between trusted internal network of an organization and the untrusted Internet. Firewall can be built using hardware, software or both as shown as Diagram 1 and 2.
Diagram 1 – Hardware Firewall
Diagram 2 – Software Firewall

Firewall is often used to avoid the unauthorized devices or users to access the internal private network that connected to the Internet. It scans each packet of all the entering and leaving data that pass through it and blocks the packets that do not fulfil the criteria of specified security. There are network layer firewalls (network-based firewall) and application layer firewalls (host-based firewall) as shows in Diagram 3.
0-1270Diagram 3 – Network and Application Layer Firewall
Network layer firewalls also called packet filters, which route the traffic directly through them. In other words, network layer firewalls block unauthorized access or allow authorized access to the network based on the destination address, source address and ports in a single IP packets. On the other hand, application level firewalls are the hosts that running proxy servers, which do not allow direct traffic between network and perform elaborate auditing and logging of the traffic that pass through them. Moreover, firewall is easy to be configured in which can set up firewall quickly and the configuration errors can be seen easily based on security policy as shows in Diagram 4.
Diagram 4 – Configuration of Firewall

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

Continuous Data Protection (CDP) Software & Hardware 
Continuous data protection (CDP) also known as real-time backup or continuous backup. It is a storage system which automatically saving all versions of data, essentially capturing every change of the data to back up the computer data as shows in Diagram 5. It allows user to recover the data to any point of time. Continuous data protection software is run as a service that captures every change made to the data to a specific storage location which is CDP hardware. With CDP hardware – a disk storage, CDP provides data recovery in seconds. The main advantage of using CDP is the record of every transaction of business that occurs in the pharmacy store is preserved. This system allows user to recover to the recent cleanest copy of the effected data if the computer system is infected with a Trojan or the data is corrupted. Moreover, if the computer system has infection of ransomware, user no need to pay the ransom as CDP has every copy of the computer data.  
Diagram 5

Upgrade to Paid Anti-Virus Software
Paid anti-virus software are more advance than free anti-virus software. Paid anti-virus software usually offer more advanced security tools than free anti-virus software. It not only can detect and resist spyware, malware and viruses, and also prevent identity theft and provide parental controls. Diagram 6 shows example of paid anti-virus software features.
03175Diagram 6

Media Access Control (MAC) Filter
left1324610MAC filter allows user to whitelist and blacklist certain devices based on their MAC address which is a unique identifier of network hardware. In other words, user can configure the filter to reserve the local MAC address of few specific devices to prevent unauthorized devices gain access to the network as shown as Diagram 7 & 8. MAC filter provides an addition layer of protection of the network.
center3416935Diagram 7 – MAC Filter Configuration
Diagram 8

Implement Security Policy
It is critical for all the network’s users to understand the important of security policy and comply with security policy. A security policy is an official statement that defines the responsibilities and expected behavior of all the users in the pharmacy store in order to protect the network and device’s security. Diagram 9 & 10 show the nine elements that need to include in a company’s security policy which stated by RFC 2196.
Diagram 9 – Elements of Security Policy

00Diagram 10 – Elements of Security Policy (continued)

Conduct Periodic Security Audit
After implementation of security system, a company should conduct security audit periodically to ensure that the security policy of the company is being followed. Auditors should identify the habits of users that lead to network attacks and keep them aware of the security consequences of their behavior in the network. Random audits usually can capture the vigilance of the company and disclose the penetrability during maintenance. A systematic audit should also test the system protection measures to make sure that they are operating as expected. Diagram 11 is one of the examples of audit checklist.

Diagram 11


I'm Owen!

Would you like to get a custom essay? How about receiving a customized one?

Check it out