Preview

Pharmuniverse Case Writeup

Satisfactory Essays
Open Document
Open Document
511 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Pharmuniverse Case Writeup
We recommend following ISO 27001 model of information security management. It is a model of information security management based on the standard ISO / IEC 27001. It formally defines the mandatory requirements for an Information Security Management System.
Controls and Control objectives for this specific case can be derived from the clauses 5 to 15 of ISO/IEC 27001.
First let’s discuss few characteristics of the current measures in place at PharmUniverse.
1. Currently there are minimal measures (like firewalls) in place for information security.
2. No one in the top level management understands Information security at a deeper level and hence do not appreciate its importance. There is an impression that funding for information security might be suspended in the future.
3. Research is the division where information security is critical, as it is discussed in the case that loss of this information can cause loss of competitive advantage.
4. One of the ways this can happen was through disgruntled employees leaving the research team to join competitors.
5. Only superficial analysis was done on the existing controls.
Now, since one of the high priority threats to contain is leakage of information through employees, it is important to implement the following clauses from Clause 8 ( Human Resources Security):
1. 8.1.3 (Hiring Requirements and Conditions) which ensures that future employees accept the terms and conditions on Information security and comply with code of conduct for employees.
2. 8.3 (Termination and Change of Employment) will help regulate the manner in which former employees leave the organization.
3. 8.3.1 (Termination Responsibility) contains conditions that can extend for a period of time after termination.
4. 8.3.2 (Return of Assets) – If the employee has important knowledge on ongoing operations, it must be documented and transferred to the organization.
5. 10.8 (Exchange of Information) aims to maintain the security of information and software

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    Discovery helps to analyze and understand how breaches occur. If this company can reduce system vulnerabilities can reduce the risk and impact of threats, to the system significantly.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    References: Whitman, M., & Mattord, H. (2010). Management of Information Security (3rd ed.). Retrieved from https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx?…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Better Essays

    Hrm 546 Cost Club One

    • 1230 Words
    • 5 Pages

    References: Bennett-Alexander, D. D., & Hartman, L. P. (2007). Employment Business Law (5th ed.). New York, NY: The McGraw-Hill Companies.…

    • 1230 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett…

    • 299 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The terms and conditions are a statement and instruction of what the employer's expect of their staff and your job description. Employers expect their staff to read and follow the policy and procedures that each house has and to attend all training and update they have and to attend supervision and any observations.…

    • 973 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Is4550 Week5 Assignment1

    • 282 Words
    • 3 Pages

    organization. Also describe what an automated IT security policy compliance system would look like for…

    • 282 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1.3 – Explain the purpose of legal and organisational requirements for the security and confidentiality of information.…

    • 802 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is 411 Study Guide

    • 305 Words
    • 2 Pages

    Information Security Business Challenges and Policies the mitigate risk within the 7 domains. – p 77 - 83…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    Information security’s primary mission is to ensure that systems and their contents retain their confidentiality at all costs.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    From a management perspective, analyze the overall industry requirements and major organizational challenges of forming a sound information security program, and ascertain the fundamental manner in which regulations and compliancy may factor into the challenges in question.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Unit 5 Assignment 1

    • 1355 Words
    • 6 Pages

    * ensuring awareness of information security threats and concerns, and the necessary steps to mitigate those threats; and…

    • 1355 Words
    • 6 Pages
    Better Essays
  • Good Essays

    FFA & Pro Golf Case study

    • 940 Words
    • 4 Pages

    “Contracts that do not state a set length of time for termination are presumptively “at will” and may be terminated by either party at any time.”…

    • 940 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Drug Case Reaction Paper

    • 689 Words
    • 3 Pages

    We observed the case filed against Dan August Racaza and Hermocillo “Henie” Macaraya, who were in that time, detained. Before testifying, the witness, Alvin Clemente, a PDEA agent who was part of the team assigned to handle the case, took an oath. The witness narrated the story and said an informant went to their office located in Arlandon Street, Cebu City, about a drug dealing operation happening in Sitio Tunga, Barangay Tanke, Talisay City, relating to Dan August Racaza and Henie Macaraya. The latter was part of the PDEA Watch List containing a list of persons allegedly involved in drug trade but is yet to be confirmed. They put the accused under surveillance and planned an authorized buy-bust operation led by their team leader, Intelligence Officer 3 David Mark Maramba. Together with the informant, David briefed the team and Alvin was designated to be one of the poseur buyers. They prepared the things that will be needed for the operation like the money which was marked by Alvin’s initials. In June 21, 2012, they went to the area with 9 members including the witness. He said Racaza was standing by the door when they arrived and Macaraya was at the ground floor. The informant introduced them as his co-workers and told Racaza they’d like to “power-up”. Racaza invited them in and showed them a plastic container with different sachets of pots and shabu. Alvin bargained the sachet that costs 180 pesos to 2 for 300 pesos. Racaza and Macaraya agreed and asked him to pick what he likes. He chose 2 sachets that seemed to contain more than the rest and handed the mark money to Henie. Alvin made a signal then the team arrived and arrested the suspects. However, they fought back and a brief commotion ensued. David told the team to pull out. They recovered sachets from Racaza and another guy named Alot and the buy-bust money from Henie. These were under the custody of the witness after the operation and he marked it as “DAR-DBT”.…

    • 689 Words
    • 3 Pages
    Good Essays

Related Topics