Skip to content

blogs of moodle monkey

INTRODUCTION
This essay is describing about a nurse who makes medication error on surgical patient who
admitted three year ago and nurse give metoclopramide tablet leh had documented allergy of
this tablet and leh had anaphylactic reaction to this medication and ventilated in ICU after some
time leh recover. Nurse did not properly monitor the patient and do medication error and in this
case nurse is in act of guilt of negligence and patient decided to take legal action for nurse. It also
discusses about Guilt of negligence is a law in which a person can't feel guilty if he or she does
crime. It is the form of criminal culpability.

 

DUTY OF CARE
Monitor patient health – Nurses monitor the health condition o f patient and according to
patient condition prepare them for relevant treatment. Properly analyze the patient and give
right medication according to patient health.

Administer medication – First of all monitor patient document and any allergy of any type of
medication Staff nurse ensure all patient get medicine on decided time after providing
medication they stay with patient and observe reaction of the medication talk about reaction to
physician at right time it is important work of nurses (Dowie, 2017).
Maintain medical record -Nurses maintain all medical record of patient for high quality of
medical care and use different type of software and computer for keeping record.
Diagnosis and test patient -All tests are require analyze patient condition and give good
treatment according to patient problem.
Operate medical equipment -Nurse work on thermometer, blood pressure machine,
stethoscope. Staff nurse work as an operator of all machine (McNeill, et al., 2019).
According to case study nurse did not perform duty of care properly and nurse did not monitor
properly previous medication and record and nurse did medication error. Nurse does not
maintain medical record and don’t ask past issue of patient and give medicine so patient had
trouble and ventilated in ICU after reaction of medication because patient have allergy of
metoclopramide medicine after treatment patient recover but took legal action against nurse
because nurse did not perform duty of care perfectly . Nurses did not monitor and administer
patient and record is not maintain so perform medication error.

BREACH OF DUTY OF CARE
Breach duty of care means nurses and doctors always has a duty of care of patient if doctor and
nurses not perform that duty well it means they breaches the duty causes more damage the
patient . If nurses and doctor fails to perform duty and result of this is patient take legal action
toward the doctor and nurses patient require standard degree of care if it does not found it means nurses breach the duty. The term breach defines failure to perform work and wrong doing.

According to case study lea (patient) admitted 3 year ago for surgical process and he
documented allergy of medication of drug but nurses give the tablet metoclopramide this
medication us for nausea and vomiting nurses not check previous record and give this tablet but
patient have documented allergy for this medication so patient have anaphylactic reaction to this
medication and ventilated in ICU after some time leh recover but nurse don’t have guilt of
negligence after breach duty and harm the patient and another more patient leh take legal action
for this nurse. It is example the breach the duty of care nurse not perform better in hospital and
play with and patient healths. Nurses are legally responsible for this failure.
Duty of Care is legal action of nurse patient are safe or not and in this case study this duty breach
the nurse and doctors. Nurses do not properly operate equipment any injury had patient it is part
to breach duty and claim by act of negligence. Medication error is also including in breach duty
of care. Falling to monitor the patient and miss the sign of patient and falling to call the
physician on time (Radoinova & Kolev, 2015). And patient health affect in any type it is
responsibility of nurses. If fail in duty means breach duty and patient take legal action.
Nurse breach the duty of care according to case study and did not properly monitor patient health
and did not check record and document so wrong medicine give patient and patient health affect
ventilated in ICU after some time patent recover but took legal action against nurse.

HARM AND CAUSATION
If nurses do any mistake and failure include medication error and fall in properly monitor it is
harm for patient and causes is failure in work. Medication error is cause of injury and avoidable
harm in health care system Drug error is the harm of medical department and higher harm seen
in surgical department. Diagnostic error and surgical error is harm for patient and blame the
nurse because they do not perform duty of care.
In case study harm is the patient leh suffer anaphylactic reaction to the drug and ventilated the
ICU and cause is medication error by nurses leh take wrong medication and leh have allergy of
this medicine is cause of injury. Leh fenster marcher admitted for surgical treatment and nurse given tablet metoclopramide this tablet use for nausea and vomiting but leh had allergy of this
tablet and leh had anaphylactic reaction to this drug and ventilated in ICU .harm in this process is
patient health and recover in long time and unable to do any work for several time affect health
of patient health is harm and causes id nurse did mistake in monitor customer health and perform
medication error and did not administer properly and affect the leh health.

 

CONCLUSION
Patient suffer medication error and nurses not accept guilt of negligence and patient take legal
action because leh suffer the reaction of medicine and unable to work for several month so many
loss occur because recovering after long time from reaction and ICU admission .Nurse doesn't
monitor properly and falling to check previous document so patient take action against nurses. In
this case nurse responsible for medication error according to guilt of negligence if any error by
nurses that affect that patient health board of nursing take disciplinary action and possible
criminal charges because patient take action toward nurse.

REFERENCES
Dowie, I. (2017). Legal, ethical and professional aspects of duty of care for nurses. Nursing
Standard, 32(16-19), 47-52. https://doi.org/10.7748/ns.2017.e10959
McNeill, C., Alfred, D., Nash, T., Chilton, J., & Swanson, M. (2019). Characterization of nurses’
duty to care and willingness to report. Nursing Ethics, 27(2), 348-359.
https://doi.org/10.1177/0969733019846645
O'Sullivan, J. (2020). A DUTY OF CARE TO BREACH MEDICAL
CONFIDENTIALITY?. The Cambridge Law Journal, 79(2), 214-217.
https://doi.org/10.1017/s0008197320000434
Radoinova, D., & Kolev, Y. (2015). Medical Errors and Negligence in Cases Versus Medical
Professionals. http://www.iempam.bas.bg/journals/acta/acta21/163-166.pdf

Briefing report

Introduction
Blue Healer Resort is the leading resort in Australia. They had one office based in Sydney. in
this particular resort they had 25 staff members. They want to do some changes in the policy
and the procedure in the resorts. In the current policy, they are not able to give them the proper
services in the restraint. So, they want to do some changes to the plan of the resort. They want
to set the “set of skill" program. In this program, they do the discussion regarding the culture of the resort. They want to establish a good approach to the company and share all the approaches
and innovations with the business plan (Rakus-Andersson, 2014).

Suitability of current policy
In this, they had a unique mind of the diversity policy in the organization. they support all over
the people who relate to the organization. they are shares the meeting of the company and they
share the business objectives of the company. Thus they are enhanced their inner capacity and
do the best quality services to the customer need and reach for the customer needs. They all
committed to each other to give fast and furious services. They give their services at the exact
time and they cover all the services with each other.

Overview of relevant legislation
But we want to do the changes in the resource so we think regarding the changes of the resort
policy procedure and the relevant legislation.in this, we think to take the action in our work
regarding this kind of issues in the workplace.
Disability discrimination- as we know regarding thee disability discrimination in the
workplace. Now it is becoming one of the most common forms of discrimination in the
organization (Rakus-Andersson, 2014).
Racial discrimination- nowadays, there is no secret regarding the secret and racial kind of
discrimination in the organization. There is a certain kind of minority group are often it is
based on the past over all the stages of the employment process.

Sex discrimination- as we know that gender discrimination is one of the most common
discrimination all over the world. They are treated you differently regarding your gender. It is
the things that take many forms. It can be done regarding the failure to hire and many more
issues.

Human rights- As we know that the Australia Human rights commission is the independent
third party is does the discrimination complaints and takes all the correct decisions regarding
this (Purnaya, 2016).
Equal opportunity. It is the kind of opportunity they are referred to with all of the good terms
and good treatment terms in the organization. there are many kinds of discrimination held there
like based on race and gender (Purnaya, 2016).
Overview of Dispute Resolution Policy and Procedures
Dispute resolution is a kind of dispute settlement it is the kind of process used to do the
resolution of the dispute between the parties. It is the kind of the terms related to the dispute
solution is te sometimes used interchangeably with the different kinds of conflict and
resolution, although it is generally more deep-rooted by the differences in the length and the
disputes (Seraphin, H., & Thanh, 2020).
Feedback and suggestions
They need to be the leverage with the organizational job boards. It is important and highly
diverse and it is also biased to the diverse area and the career page related to the work and the
website. It also gives you the target internship and scholarship. They need to implement
diverse mentorship. It is a kind of diversity and organizational training. It is rewarded with
diverse referrals

E-Mail
To – info@ceo.ac.in
From- manager.ac.in
Subject- feedback and the approval
Date- 12-07-2022
Hello sir,
Here to inform you that, I will give you the information regarding the management of the Blue Healer
Resort. In this, we are trying to do the implementation of some kind of new policy. In this report, we are
doing the discussion regarding the Diversity Policy and the procedure of the workplace. In this diversity
policy, we are doing the discussion regarding the management of the workplace and its policies. In this they are facing the issue regarding the resort services and process. In this, we are planning to do a diversity policy in the workplace.
Thanks
Regards
Update the diversity policy-
They need to do the leverage of the organizational diversity job boards.
Highlight the diversity regarding the career page.
Give them the target internship and the scholarship.
Offer them the diverse mentorship.
Gives them the training regarding the workplace diversity.
Create the counselling regarding the inclusion of the work.

Assessment task 1: Knowledge question

Question 1
1. Identify hazards and assessing risk for safety
2. Right decision take right time for reduce risk.
3. Creating the risk assessment and management plan.
4. Change in some work that affects the employee productivity and safety of workers.
5. Provide insurance and compensation policy for employees.

Question 2
1 checks all machine and equipment are safe and stable at work place for productivity.
2. How to work employee and analyze and organize the better way for achieve goal before
deadline
3. Provide training and instruction of employee.
4. Make sure employee is aware about hazard and policies of company. And continuously
monitor health of workers.

Question 3
1 .Know all hazards that can hold on work place and keep safe and follow guideline of company.
2. Safe use of machines is requiring all knowledge about equipment and machine before use.
3. Follow all safety signs and warning signal for your health.
4. Workers should follow WHS regulation for safety and welfare purpose.

Question 4
1. Consult about the important decision with employee that give the engagement of employee.
2. Changes are requiring for safety purpose and better health of employee.
3. Consult for hazards and assessing the risk.

Question 5
1. Identify all hazards that affect work force and assessing risk.
2. Control risk by making perfect decision and eliminate the risk.
3. If changes require than change the work place facilities and control hazards and risk.
4. Take care of employee health because better health is important for workplace.

Question 6
1. Management team consults regarding the WHS issue.
2. Employee who share work and consult directly or indirectly with workers.
3. Health and safety department with who manage this consult with person
4. Operational meeting is part of consult.

 

Question 8
The representative who is commonly referred to as the HSR is the worker who elected to serve
the health and safety measures and is interested in their work.
Roles and responsibility of a health and safety representative
He has to represent the workers on the health and safety measures and help them in the
discussion he has to do the discussion with the manager and provide hazards and safety issues.
He has to monitor the entire organization’s working conditions. and ensure that everything is
alright.
Helps to promote the develop the safety and health of employees at your workplace. Provide a huge role in communication link or bridge between the people the workers and the
PCBU.
He has to inspect or investigates the complaints from the employees (Mambwe, et al., 2021).

Question 9
To reduce or prevent risks related to health by ensuring that all the machines and pigments are
well and safe.
It is the employer’s duty and responsibility to protect the employee’s health by taking safety
measures.
Provide employees a safe and healthy environment that is free from serious hazards and health
issues and comply with the set standard (Nielsen, 2014).

Question 10
1. Represent the workers about any problem and health and safety of employee.
2. Investigate complaint from team about work and health or safety.
3 .identify potential hazards and risk and conduct audit at workplace about health and safety.
4. The important work is resolved health and safety issue.

Question 11
1. When new machine or equipment installed at work place and procedure changes.
2. When new information regarding health and safety risk becomes available means follow WHS
rule.
3. If worker do any mistake on new work than find WHS hazard at workplace.
4. after an accident WHS hazard take place

5. If you don't follow hazard guide and new work do and injure.

Question 12
1. physical hazard
2. chemical hazard
3. workload hazard

Question 13
1. Collect the information about workplace hazard.
2. Inspect the workplace for safety hazard.
3. Check all chemical properly before use for chemical hazard.
4. Investigate all equipment and machine before use for safety hazard.
5. Identify health related issue on workplace.

Question 14
1. Conduct internal research at work place for identify risk.
2. Conduct external research at work place for identify risk.
3. Analyze the work of employee and client complaint for risk
Question 15
1. First of all identify the risk than analyze the risk.
2. Isolate the risk those find
3. Engineer control the risk.

4. Administrative control.
5. Personal protective equipment use last time.

Question 16
Injury and accident reports, which is including records that are investigations and misses
All the policies and procedures which is related to the WHS are recorded.
Assessment of risk
Plan an emergency plan
Register the substance which is hazardous.

Question 17
 It helps to reduce the losses.
 Helps in managing the cash
 Helps to meet any legal requirements
 Helps in the improvement of financial analytics

Question 18
To ensure that the working environment and the working system are safe or not
 Check the machines and pieces of equipment in an effective way that it is safe or not.
 Provide workplace facilities to the workers.
 Make sure that the working condition like health is ok or not.
 Managers have to monitor on a regular basis.

Question 19
Tell employees about their health status and any problem related to health.
They should discuss the problem if they are facing any problem related to the workplace.
One should share the safety and health concerns with the employer.
They can take breaks during working.

Question 20
Ten possible ramifications for employers who fail to observe OHS or WHS laws are
 Fines
 Imprisonment
 Reputation loss
 Potential staff loss
 Reduces time and loss of productivity
 High penalties
 Reduction in employee retention
 Intense injuries and accidents at the workplace
 Death or serious injury (Boadu et al, 2021)
 Life-long jail

Question 21
It is a task that requires the person to lift, push, pull, lower, hold, and restrain any person

 Sustain and repetitive forces.
 Sudden and high forces
 The movement which is repetitive
 Awkward and sustained posture
 Vibration and exposure
It is hazardous when there is one or many factors risk involved are present which are sustains
and repetitive force.
For examples
Putting the shelves and boxes, gardening and painting, writing and typing, and cleaning
(Kadikon & Rahman, 2016)
Question 22
Methods of receiving updated information on OHS or WHS laws and codes of practice are by
watching the local tv news, or by the newspaper, or the social media or apps related to news,
books, and articles.

Question 23

Time when hazard identification
must be carried out Reason

Before premises are used for the first
time.

We have to check before the use for the
first time because it is very important to
check for ensuring the safety purpose and
for the safety of employees.

Before and during the installation or
alteration of any plant, machinery or
equipment.

It is important to check because if any
problems are in a machine it can cause big
issues or serious injuries. So, to prevent
serious injury at a workplace it is very
important to check the plant, machinery or
equipment Before and during the
installation.

Before changes to work practices,
procedures or processes are
introduced.

It is important to find the hazards and risks
before the changes to work practices,
procedures, or processes to prevent or
reduce fatality or serious or normal
injuries. And I the hazards are identified
they can be handled in an effective
manner.

When any new information relating to
health and safety risks becomes
available.

It helps in the analysis of risk and
evaluates and describes the safe risks
system. It helps to provide the information
which helps to enable the personnel
designs which helps to make safety
improvements in an effective way. That’s
why it is important When any new
information relating to health and safety
risks becomes available.

Question 24
 Health and safety procedures and policies
 Normal operating policies
 Code of conduct of an organization
 Induction and training records
 Injuries register

Question 25
Examples of WHS ‘consultation’ record requirements are
 Registers and incidents registers
 Company newsletters
 Notice boards of the company
 Pre-meeting daily
Question 26
Physical hazards, chemical hazards, biological hazards

Question 27
There are some examples of notifiable incidents which are related to the serious injury that are
 Badly or serious injury at head
 Electric shock
 Spinal injury
 Serious eye injury
 Or sometimes death
 Serious illness or a dangerous incident.

Question 28
It is denoted that this is a serious injury which is caused due to lack of concentration and wrong
working conditions a manager must ensure that the working conditions should be very good and
safe. All the machines and equipment are well and in a good situation.

Question 29
The WHS statistics should be reviewed on a regular basis, it is very important it WHS should be
reviewed and reported it allows the trends related to health and safety for the improvement which
is continuous for the WHS management system and for the WHS university’s performances. All
help organizations to control the risks for health and safety measures. Also helps in providing the
current status related to health (Lingard et al., 2014).

Question 30
Agendas for the minutes Agendas for the minutes is an important term that helps to get prepared for the meeting and get ready
and it helps in saving time and arranging an effective meeting.
Committee members
A committee member is an important part of the organization they help in sharing the data and we
can take their ideas and reviews because they have so much experience.
Consultation decisions and follow-up actions
It is very important to consult and decisions and follow up action plan it helps to make a final
decision and helps to manage the business effectively.
Consultation processes
It is a legal need and a very important part of the organization in managing health and reducing risks.
It is very useful and understanding the problem and helps to solve many problems.
Diaries of meetings
It is a very important and necessary thing for business it helps to track everything from an external
and internal meeting. and helps to the dealing conference and travel arrangements.
WHS information provided to personnel
It is a manager’s duty to take care of employees and keep them up to date about sharing with them
every issue and every information related to WHS to maintain a good and safe environment for
them.
Risk controls
For the health of the organization, it is very important. it helps to achieve the desired goals and helps
organisation against the financial risk.
Safe work practices It is generally a written method it is a way that how we can perform with a less risk to employees,
materials and equipment.

Question 31
Injury and accident reports, which is including records that are investigations and misses
All the policies and procedures which is related to the WHS are recorded.
Assessment of risk
Plan an emergency plan
Register the substance which is hazardous.
Health and safety procedures and policies
Normal operating policies
Code of conduct of an organization
Induction and training records
Injuries register.
It is an easy method to track the risks and them control it in an effective manner. helps to solve many
things.

Question 32
details that need to be maintained regarding WHS are identifying the risks related to the workplace,
measures to control the hazards, risk assessment, minimization model should be developed, and
implement the measures which are appropriated. During organization hazard reviews, accessing
with staff, visually viewing effort existence completed, analysis and evaluating internal WHS
records and data, recommending workers that they are essential and encouraged to interconnect
recognized WHS threats.

Question 33
Details that need to be maintained regarding WHS are identifying the risks related to the workplace,
measures to control the hazards, risk assessment, minimization model should be developed, and
implement the measures which are appropriated.

Assessment task 2: WHS Project
Following are the ways to create a safe and healthy working environment
 Identification of workplace hazards- Before the WHS practice, it is important to identify the
hazards taking place in the workplace.
 Conduct safety programs- Safety programs should be conducted to educate the workers and
employees working in the Blue Healer Café.
 Safety training should be provided- training regarding safety and security should be provided.
Education should be given to the employees and workers for safety and security (Johnstone, et
al., 2012).
 Use of safety Equipment- It is important to use safety equipment in the workplace. For example-
The use of PPE (personal protective equipment) Like hand gloves, protective eyewear, etc.
Health and hygiene requirements in a food business-
 Should tell chefs and food handlers regarding hygiene responsibilities.
 Food premises and food equipment like kitchen, utensils, etc should be clean and should be in
good working condition.
 Maintain cleanliness in the food surfaces.
 Food handlers who have any kind of infection should not be allowed to prepare food, until and
unless they get recovered from the infection.
The manager of Food Healer Café should ensure that-
 Whether the hygiene is maintained or not in the place where food is prepared
 The manager should make sure that the workers who are having a disease that can be passed to
one another, those people should stay away from the food.

 It should be kept in mind that the people on the premises do not contaminate the food.
 The food premises should be kept free and stay away from pests and animals.
 Avoid the use of cracked, defective, and broken food equipment and utensils.
 Emphasize cleaning and sanitizing facilities in the workplace.

A systematic procedure and policies should be implemented in the Food Healer Café for smooth
business activities. A chef or food handler in the café must ensure that the food which is going to
be served to the customers should not come into contact with infected people or they should
protect the food from contamination. The food handlers should make sure that they do not
prepare food that is unfit or unhealthy for the people. It is the responsibility of the food handler
to use the right and healthy food ingredients. The ingredients should be free from preservatives.
Blue Healer Café comply the Work Health and Safety Act 2011, codes of practices, and other
Australian legislation and standards to ensure fair and transparent business activities.
The café represents that there is a high fire risk in the workplace, so safety measures regarding
fire incidents should be taken. It includes the emergency exit door in case a fire takes place, or
the emergency evacuation drill should be conducted from time to time.
1. Legislation: Work Health and Safety refers to the safety practices that are developed and
implemented in the workplace to prevent hazardous risks and dangerous incidents or to reduce or
mitigate the risks.
The Work Health and Safety Act 2011- WHS act provides guidelines and a framework in
Australia for the protection of the workforce. It provides the safety measures that all business
organization has to follow to ensure the safety and security of the employees and workers.
The Work Health and Safety Regulations 2011- WHS regulations provide systematic
procedures and administrative requirements to comply with the WHS Act. It provides the roles
and duties which are needed to support the WHS Act. Codes Of Practice- These are the guides that give direction about how to achieve standards that
are mentioned in the WHS Act.

Reporting/Monitoring Monthly reporting
WHS Management Report
Summary of WHS briefing
To avoid serious and death-threatening incidents in the workplace, work health and safety
regulations are introduced in the organization. According to the WHS rules and regulations, all
the workers and staff members are required to follow the guidelines. This includes, if there is any
risk identified by the employee, and then it should be immediately notified to the superiors.
Hygiene and cleanliness should be maintained in the kitchen. It is the responsibility of the food
handler to prevent the food from being contaminated. If the food equipment and tools are getting
damaged, then it should be immediately replaced or repaired (Simao, et al., 2021).
Identification of non-compliance
It is the responsibility of the Manager to ensure that the rules and guidelines are properly
complied with or obeyed by the staff or not. To identify this, the manager will conduct an
inspection monthly to check or investigate whether the regulations are followed properly or the
employees breach the rules. In the inspection, if there is any activity or work fids out which are
to be avoided, then strict action should be taken.
Actions
If the manager finds that the employees or the staff, do not comply with the WHS regulations,
then strict action can be taken so that the mistake or the misconduct could not be repeated in the
future. The manager should implement the fine on breaching the rules. The manager can suspend
or terminate the worker or employee, if they do not follow or comply the WHS rules. The
training program should be conducted to educate the employees and workers for WHS measures
in the workplace.

The training program regarding the work health and safety of the workers and employees who
are working in the organization, the manager should coordinate with other superiors to give
training to the workers. In the training session, safety measures like the use of fire extinguishers,
emergency fire exit doors, etc should be provided. All the workers should use new and updated
technology and tools in the workplace. The obsolete and outdated tools should be avoided to use.
In this session, education is given to workers regarding food safety. The knowledge should be
given regarding How to prevent food and beverages from being contaminated and getting
spoiled, how to maintain the freshness of food etc. in this training program, the knowledge
should be given regarding the hygiene and cleanliness.
WHS Training Report
Summary of WHS training
The training is provided in the rooftop area of the Blue Healer Café on 11 July 2022 at 12:00
pm. The training session emphasizes on work health and safety regulations and rules. In this
session, the major roles and responsibilities of every employee and worker are discussed, and
how to deal with the problem or the risk, without getting anxious, training is provided. The
importance of WHS regulations are to be discussed in this session.
Training options
The training session is taken by the Food Safety Expert. This training is necessary to conduct in
every 2 to 3 months so that the workers and employees can implement the knowledge in the
workplace and face the problem during their work. This mentoring and coaching is important for
workers, they get knowledge regarding the incidents and how to deal with them.
General opinion on the outcomes of the training
Include information on:
 Staff adherence and compliance to the procedure

 How staff reacted during the training and if there is any need for additional training or changes to procedures or training
 The effectiveness of the WHS practice – are current practices ensuring the health, safety and
security of all employees?
Feedback from staff who participated in the training
The training session is taken by the food safety expert. And staff members fully participated in
this mentoring program. They also give feedback. And share their views and various idea which
can be implemented in the workplace.
Recommended actions
In future, the training programs should be taken and examples can be given with the help of 3d
graphs and pictures so that the staff can easily assess the knowledge. Some live examples can be
given regarding the exit entrance door, use of hand gloves etc so that workers could understand
things easily.

I hope you are good. As you know, it is important to comply or implement the work health and
safety measures in our Blue Healer Café, we conduct a training session for our employees and
workers. The training and mentoring session was taken b the Food Safety Expert. This session
goes very nice and various new and innovative idea also came from our staff. In this session, the
training was given on, how to prevent food from getting spoiled, the importance of cleanliness
and hygiene, the use of new and updated tools, etc.
Some deficiencies were also identified in this session which is important to correct immediately.
Like all the staff members have their insurance. Extra availability of the fire extinguishers, use of
preservative-free ingredients in the food, These deficiencies will be kept in mind and some
changes are to be made in the policies. I will ensure that the deficiencies will be corrected
properly. Thank you for your precious time.
Manager
Blue Healer Cafe

References
Australia, S. W. (2015). Work health and safety perceptions: Construction industry. Safe Work
Australia: Canberra, Australia.
Boadu, E. F., Wang, C. C., & Sunindijo, R. Y. (2021). Challenges for occupational health and
safety enforcement in the construction industry in Ghana. Construction Economics and
Building, 21(1), 1-21.
Johnstone, R., Bluff, E., & Clayton, A. (2012). Work health and safety law and policy. Thomson
Reuters. Kadikon, Y., & Rahman, M. N. A. (2016). Manual material handling risk assessment tool for
assessing exposure to. J Eng Appl Sci, 100(10), 2226-32.
Kuempel, E. D., Geraci, C. L., & Schulte, P. A. (2012). Risk assessment and risk management of nanomaterials in the workplace: translating research to practice. Annals of occupational
hygiene, 56(5), 491-505.
Lingard, H., Pirzadeh, P., Blismas, N., Wakefield, R., & Kleiner, B. (2014). Exploring the link
between early constructor involvement in project decision-making and the efficacy of
health and safety risk control. Construction management and economics, 32(9), 918-931.
Mambwe, M., Mwanaumo, E. M., Thwala, W. D., & Aigbavboa, C. O. (2021). Evaluating
occupational health and safety management strategy success factors for small-scale
contractors in Zambia. Sustainability, 13(9), 4696.
Nielsen, K. J. (2014). Improving safety culture through the health and safety organization: A
case study. Journal of safety research, 48, 7-17.
Simao, D. D. C., Karanikas, N., Cortes-Ramirez, J., & Sav, A. (2021). Workplace health and
safety consultation in Australia: a scoping review. Journal of Health, Safety and
Environment, 37(2).

Assessment 1
1.1 The network threats to consider are-
1. Phishing
2. Service attack denial
3. Malware
4. Computer viruses
5. Rogue security software (Jing, et al., 2014).
An enterprise can achieve the right level of security through-
 Malware scanning
 Prevention function of data leakage
 Internet protocol awareness (Jing, et al., 2014).
 AV scanning
 Dynamic URL categorization techniques.
1.2 Security goals that need to be considered are-
 Segmenting and creating the DMZ.
 Enabling secure network access.
 Building security layers around the castle as there is no such defense that is 100% effective.
 Harden security policies, device configuration, and software updates (Dadheech, et al., 2018).
 Perimeter security begins with secure network design by using-
 Authentication of all users access.

Some of the examples of active attacks are Masquerade, service distributed denial, session
replay, etc.
Some of the examples of passive attacks are analysis of traffic, release of a message.
1.3 Windows Defender Firewall with Advanced Security can be defined as a tool that
provides detailed control over the rules applicable by the windows defender firewall. One can
view all the potential rules that are being used by creating new rules, disabling new rules, and
changing their properties. It is an important and crucial part of the security model layer.
Through host-based, windows defender firewall blocks unauthorized network of traffic which
flows in or out of the local device (Ambhore & Wankhade, 2020).
For opening the windows firewall-
 First one has go to the start menu
 Then select Run
 Type WF.msc
 Select OK
Practices used for managing existing windows firewall rules are-
 Blocking by default.
 Allowing only specific traffic.
 Specifying internet protocol sources.
 Specifying the destination port.
1.4 Point to Point Tunneling Protocol (PPTP)- PPTP is created by Microsoft. All windows
operating system has developed PPTP client software. PPTP clients are also available for
Linux. In terms of scalability, PPTP is a good protocol option for remote access.
L2TP- L2TP was introduced as a joint effort among Cisco and Microsoft and joint features of
PPTP and Cisco’s Layer 2 Forwarding protocols. It offers strong security and uses IPSec for
encryption. L2TP has data integrity and also has data confidentiality. L2TP also has certificate-based authentication. L2TP client can be built-in server and XP 2003, Microsoft’s
Windows 2000. Client Software can be installed for free and can be downloaded on Windows
98, NT 4.0, and ME.
IPSec- Doing encryption for L2TP connections IPSec is used to create the connection in
tunnel mode. IPSec VPNs are extensively supported by firewall VPN appliances. IPSec is
the single tunneling protocol that is supported by all the firewall vendors. It includes Check
Point, Netscreen, Cisco PIX, Sonicwall, etc.
1.5 Security Audit- Examination and systematic evaluation of the information system of a
company is called Security Audit. In security audit, the physical configuration of the
system, software used by the company, information handling processes and user practices,
are to be checked or examined. In security audit, the technical experts and professionals
examines the wellness and accuracy of the security protocols. Following are the reasons and
benefits of conducting Security Audits-
It is required to identify the security problems and deviations, and also to know the system
weaknesses. Security Audits help to acknowledge the security policies of internal
organizations.
It helps to determine whether the security training is adequate or not.
It develops a security baseline that helps to conduct future audits.
Security Audits help in the identification of unnecessary resources.
Penetration Test- Penetration Test is a wider term and goes beyond the security audit. The
penetration test or a pen test is an authentic simulated attack that is conducted on the
computer system to check or examine its security. Penetration expert uses the same tools and
techniques which is used by the hackers and attackers to find or identify the weaknesses of
the system. By conducting a Penetration Test, the effectiveness of the computer system can
be improved as because the weak points and deviations can be identified. Following are the
benefits of this test- It helps organizations to eliminate hazardous security flaws (Stiawan,
2017). Helps to identify the defects and faults of the computer system
To analyze the robustness of controls
Helps to detect and prioritize cyber risks
Penetration testing helps to expose the vulnerabilities
1.6 Motion Sensors- Motion Sensors are the sensors that are established outside to detect movements. To sense the motion, these sensors use infrared rays. Motion sensors are of two
types- one is active and the other is passive. If the motion sensor is active, then it uses the
power source to detect the motion. On the other hand, if the motion sensor is passive, then it
only sends an alarm if the movement and temperature change.
CCTV Security- CCTV stands for Closed-Circuit Television. These systems use interior
and exterior cameras that keep a watch on a specific space. CCTV cameras keep an eye on
the activities of the people or the individuals where the cameras are fixed.
Radar System- Radar System is one the important security component. This device helps to
detect vehicles and people who are at short and medium distances. This system helps the
owners who have open field businesses. Radar systems provide protection from the theft of
vehicles.
Electrified Fences- Electrified Fences is a very effective way to stay away the burglars and
invaders. If an intruder tries to climb the fences or try to cut it, the alarm sends the signals
and the system will be activated. Electrified fences can also become a threat because of the
electric shock, which can take the lives of intruder.
Biometric Pattern- With this control system, an organization restricts the entry of unknown
individuals and persons in the business premises. This system uses pin, fingerprint or a
biometric pattern to take entry into the organization. With the help of biometric patterns, an
organization can limit the entry of the unknown persons (Göksel, et al., 2019).
Vibration Sensors- This system uses a wireless alarm to monitor the property. This is a
security device that detects suspicious objects or things. When the device detects something
suspicious, it triggers the alarm and starts to vibrate. These sensors are generally placed on
doorways and windows.
1.7 It is important to back up network configuration or a network backup because backing up
is an integral or important part of a recovery plan. As network configuration contains very
crucial or confidential business information or data, if it is not backed up then the operations
of the business can be adversely affected. If the business’s crucial or confidential data lose
due to a data breach or hacking activities, the backup ensures the recovery of data.
Benefits of network backup include- Decreasing human error, improving the ability of
disaster recovery, automating the backups, etc.
In the backup configuration dialog box, you should first enter the entire path to another folder
or a local folder where all the files can be copied easily. Then, you should provide a path for every data core server. In this, the entries are not case sensitive so we can include spaces
among them like c:\backup configuration. Then you should click on backup.
1.8 Log Analysis refers to interpreting, reviewing, and knowing the computer-generated
records which are called logs. It is the process of inspecting or assessing the computer-
generated logs to identify the security threats and bugs, application performance and other
risks. Log analysis is also used to review the behavior of the user (Svacina, et al., 2020).
The techniques of log analysis include-
Recognition of patterns, classification, and tagging, correlation analysis, and artificial
ignorance.
Purpose- The purpose of log analysis is that it provides a semi-structured data analytics
solution. It helps to mitigate the problem diagnosis and time resolution.
1.9 In the era of digitalization, various sophisticated technologies are becoming popular all
over the world. Business organizations use various technologies to run their business
activities. It is also important for business organizations to protect their confidential and
crucial business data from hacking and other cybercrimes. Security measures perform
following
Critical roles-
It protects the business organization’s ability to function.
It safeguards the technology assessed by the business.
It protects the company’s confidential data from hacking or information leakage.
The security mechanism provides protection against the cybercrimes.
By adopting security mechanisms, the company can protect their data from the misuse.
1.10 The popularity of android phones and smartphones is increasing worldwide. As mobile
devices and tablets become companions, hackers are ready to break the avenue. With the
inexpensive equipment, the hackers seek and gain or assess the nearby mobile devices. This
can leak the mobile data and personal information the individual. Technologies can also be
misused. So it is important to protect your mobile device from these hacking activities
(Karim, et al., 2015). To protect the data and information, the following options are available-
the use of a strong and hard password for mobile devices.

Stick to the official app stores you should backup the data of the mobile from time to time.
Should use VPN

Assessment 2
2.1 Phishing threat – In this threat hackers steal login id and card no via message or email
Cyber attack – in solution tack company network security device is not use for safety so cyber
attack attempt easily in this process steal unauthorized access and data.
Hacking threat – In this threat hack the personal information and discussion by bad websites
and traffic
Malware virus- it is group of viruses that affect your network and it is harmful computer
programs
Spy ware threat – it is most common threat for network and computer user it is installed
computer without your knowledge and hack information of your work.
2.2 Fire wall is use in solution Tech Company for safe use of all network and data or it will give
protection of network against all threat.
Because security is require in this network group of computer work for router and ISP so
hacking is easy and bad traffic occur so use antivirus and firewall for all computer for
maintain safe system.
2.3 Crisco packet tracer is a software use for complicated network and support multi user
network system. In solution tech company model use 3 department this company has 3
department sales, research and management so 3 different local area network VLANs use for
use internet in system if we use Crisco packet tracer means change to topology in network for
security purpose. Different topology from different department like research department has
different VLANs and management department has deferent VLANs and sales department has
own VLANs all network authority in one pace so safe data and communicate and discussion
easy for this change in topology. And add fire wall for data protection and computer
protection and hacking.
2.4 There is need to protect my network and edge router using the ACLs and if sales
department crate problem means block the port of sales department for safety of other department access control lists is control the bad traffic for network and use firewall software
for safety purpose and
SSH means secure socket shell it is protocol that allow to computer to share data it is
process of data transfer in one computer to another computer and because in solution tech
model 3 department work in group so it is important for safe data share.
2.5 For safe use of data and file use virtual private network it is beat solution for data safety
and security
Download the virtual private network firewall software and enter organization public IP
address and enter username or password and connect in network.
Advantage of VPN is secure network and hides private information it is way to secure online
data and web traffic and keep information safe and data secure by use of virtual private
network.
2.6 In this network use 3 department in one line sales department and research department
and management department and security did not use for safety purpose and edge router and
ISP router is use in solution tech network for internet so we add in this network ACLs
software of one port for protect all network device and all department change in deferent
building all department have own local area network for data share and one main VLANs is
for all network for security and this model is best model for protect all computer for hacking
and bad traffic and malicious traffic And virus and easily transfer all information in all
department host and secure data from hacker .
Use firewall in this system for security fire wall is basically use in two form hardware and
software and it is very important device for protect your devices from bad traffic and virus
and keep safe all data and information. Firewall promotes privacy and stops spyware and
virus and prevent from cyber attack and monitor bad traffic and keep safe all information so
this is most important security device that add in this network for safety purpose.

References
Ambhore, P., & Wankhade, A. (2020, January). Firewall for intranet security.
In International Conference on Mobile Computing and Sustainable Informatics (pp. 653-
659). Springer, Cham.
Dadheech, K., Choudhary, A., & Bhatia, G. (2018, April). De-militarized zone: a next level
to network security. In 2018 Second International Conference on Inventive Communication
and Computational Technologies (ICICCT) (pp. 595-600). IEEE.
Göksel, U. Ç. T. U., ALKAN, M., Doğru, İ. A., & Dörterler, M. (2019, October). Perimeter
network security solutions: A survey. In 2019 3rd International Symposium on
Multidisciplinary Studies and Innovative Technologies (ISMSIT) (pp. 1-6). IEEE.
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the Internet of
Things: perspectives and challenges. Wireless Networks, 20(8), 2481-2501.
Karim, A., Ali Shah, S. A., Salleh, R. B., Arif, M., Noor, R. M., & Shamshirband, S. (2015).
Mobile botnet attacks-an emerging threat: classification, review and open issues. KSII
Transactions on Internet and Information Systems (TIIS), 9(4), 1471-1492.
Stiawan, D. (2017). Cyber-attack penetration test and vulnerability analysis. International
Journal of Online and Biomedical Engineering.
Svacina, J., Raffety, J., Woodahl, C., Stone, B., Cerny, T., Bures, M., … & Tisnovsky, P.
(2020, October). On vulnerability and security log analysis: A systematic literature review on
recent trends. In Proceedings of the International Conference on Research in Adaptive and
Convergent Systems (pp. 175-180).