logo

Security System for Pharmaceutical Industry: Risk Management and Recommendations

   

Added on  2022-11-14

21 Pages3937 Words289 Views
Running head: SECURITY SYSTEM
SECURITY SYSTEM
Enter name of the Student:
Enter name of the University:
Author note:

SECURITY SYSTEM1
Table of Contents
1. Introduction................................................................................................................2
2. Discussion..................................................................................................................3
2.1. Current Security Threat Level.............................................................................3
2.2. Risk Management................................................................................................7
2.2.1. Identify Asset & Threat................................................................................8
2.2.2. Risk Vulnerability Study (174)....................................................................9
2.2.3. Consequence..............................................................................................11
2.3. Concept Plan & Security System Recommendations
(Electronic/Physical/Manpower)..........................................................................................11
2.4. Security devices layout plans............................................................................13
2.5. Security Block Diagrams of proposed security system. (520)..........................16
3. Conclusion................................................................................................................17
References....................................................................................................................18

SECURITY SYSTEM2
1. Introduction
Pharmaceutical industry can discovers, then improves, after that yields also finally
marketplaces the drugs to usage as the treatments to the patients1. In this industry, there are
many security threat are present. Security threat is harm all computers and also any
organization. There are many security threats such as Computer viruses, Trojan horse,
Rootkit and many more2. The vulnerability can refer to a popular weakness of any type of
asset which can destroy by more than one attackers or it can be said that it is the issue by
which the attacks become succeed. So first the organisation has to find the threats and rank
them according to their score of probability and impact. After analysing the risk, design a
plan for the security system to avoid these risk or threats. There are many things present
which can be included in this security system to protect the office such as CCTV, security
guard, alarm systems and many more3. After designing the plan, it can be implemented and a
block diagram is also generated for this security system. By implementing this security
system plan, the threats or the risks can be reduced and this pharmaceutical company has a
great security system.
1 Gereffi, Gary. The pharmaceutical industry and dependency in the third world. Vol. 4964.
Princeton University Press, 2017.
2 Aven, Terje. "Risk assessment and risk management: Review of recent advances on their
foundation." European Journal of Operational Research 253.1 (2016): 1-13.
3 DiMasi, Joseph A., Henry G. Grabowski, and Ronald W. Hansen. "Innovation in the
pharmaceutical industry: new estimates of R&D costs." Journal of health economics 47
(2016): 20-33.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment on Risks and Risk Management
|11
|781
|13

Analyzing Security Options for JKL Company
|12
|841
|51

Risk Assurance Management Assignment 2022
|3
|437
|11

IT Security: Types of Security Risks and Organizational Security Procedures
|9
|538
|80

Trojan Horse Attack
|11
|2804
|324

Cyber Threats: Understanding the Various Forms of Cyber-Attacks
|11
|2898
|479