An information security risk assessment for the organisation

Assignment Help Computer Network Security
Reference no: EM13924395 , Length: 3500 Words

Based on the case study supplied,write a report that includes;

a) An Information Security Risk Assessment for the organisation (Wolftech). A good answer will identify threats, vulnerabilities, and impacts. It will include priorities and risk treatment options. (35).

b) Discuss whether you think that the organisation will be able to successfully implement an information security policy. Identify any potential obstacles to success. (10)

c) You have been asked by the Chief Executive to consider whether seeking

Certification for ISO 27001 would be a good idea for the company. What is

your response? (10)

d) Discuss what the organisation needs to have in place in order to try to

Maintain operation following a major incident. (15)

You should aim to write no more than 3500 words (excluding appendices).

In your answers you are expected to demonstrate knowledge of appropriate topics discussed in the module, justify your answers and demonstrate further reading (please provide a list of references and / or bibliography). Any work that you submit must be your own interpretation written in your own words (cutting and pasting from the internet will result in an automatic fail).

Opportunity will be provided during / after the Lectures and workshops to ask individual or collective questions about this assessment. These are the times when tutors are available to answer questions relating to this module. You are encouraged to ask questions. Tutors cannot provide answers to the assessment questions asked above, but it is important that you are clear on what you are being asked to do. So please ask questions at an early stage. It is recommended that you begin work on this assessment as soon as you can in order to clarify anything that you are unsure of. Waiting until the final week to say that there is something that you do not understand will mean that you will struggle to produce a good answer.

Case Study

Wolftech is based in the Energy sector and currently employees 85 people who deal with businesses that are located in the UK, Central Europe and China. They have offices in each location, but the management team and main office are located in Wolverhampton. The company is part of a group that includes power plants in developing countries that are considered by some to be harmful to the environment.

Office staff have a range of PCs with different specifications and a number of staff and managers use laptops and mobile devices. Most of the company’s computers are now running Microsoft Windows 7 operating system and Microsoft Office 2010 Professional edition, however some computers are running Windows XP. Many senior staff use a variety of mobile devices (phones, iPads) to access mail, contacts and other work related files. When asked, the MD of the company was not aware of any addition security systems or software being used with mobile devices and believes that staff use both their own and company issued devices. The company servers are located in the basement of the Wolverhampton office. Backups are taken via removable hard disks which are locked in the system administrator’s desk. There does not appear to be any plans to respond to a loss of the servers.

The company uses Microsoft exchange server and operates Outlook for e-mail. Standard applications recently introduced include Microsoft CRM (for Customer Relationship and Contact Management) and Microsoft Share Point for collaborative working and document handling. Outlook Web Access is employed for remote web access to e-mail and public folders. Some staff use their webmail accounts to forward emails to when they are working from home or overseas. Back office systems may use bespoke front end and web-based applications linked to the company Oracle 11g database housed on a database server. The company website is hosted by an external hosting company. There is an integrated sales and purchase system. Accounting is linked with these systems but the main application is Sage 50 Accounts Professional together with the Sage 50 Forecasting package.

The company has a small IT Support team based at the Wolverhampton offices. Outside of the main office, support is provided via a help-line and remote access. A third party company is used for dealing with some of the more difficult problems. The Board do not consider that the company has experienced any cyber-security issues. The company does not currently have an information security policy, any issues would be the responsibility of IT Support.

The MD says that the systems administrator is very able to deal with any security issues; when passwords have been forgotten, he has been able to get into the affected accounts and he will not allow anyone else know the administrator passwords. He also told us that the administrator had been able to reduce the costs of some of the equipment by sourcing less expensive versions from China.

The MD stated that he never had password problems as his PA is able to remind him if he forgets a password. When asked whether the company used encryption he did not seem to understand the question but said that he would talk to the system administrator about this.

Reference no: EM13924395

Questions Cloud

Compute shamrocks roe directly : Compute Shamrock's ROE directly. Confirm this using the three components. Using the ROE computed in Part a, what is the expected sustainable growth rate for Shamrock?
Explain what you interpret about the target audience : Evaluate the message that is conveyed from what you observe from this digital footprint. Explain what you interpret about the target audience/users for this site.
Fisheries and conservation department : Routine surveillance by the Agriculture, Fisheries and Conservation Department (AFCD) has detected the presence of low pathogenic avian influenza A (H7N9) in a chicken cloacal sample from the Cheung Sha Wan Temporary Wholesale Poultry Market in Ho..
Construct the variables that you need in order to estimate : ECOM094 - a. Using the data contained in the dataset, construct the variables that you need in order to estimate eq. (1). b. Estimate eq. (1), report the results and comment on them. Are the results consistent with Taylor’s theory? Explain.
An information security risk assessment for the organisation : Based on the case study supplied,write a report that includes, An Information Security Risk Assessment for the organisation (Wolftech). A good answer will identify threats, vulnerabilities, and impacts. It will include priorities and risk treatment o..
Standard deviation of the scores : The standard deviation of the scores in the frequency distribution above is (to the nearest 1/10)
Is there evidence of a difference in daily customer count : At the 0.05 level of significance, is there evidence of a difference in the daily customer count based on the price of a small coffee?
What is the air pressure in the closed chamber b : Perform a dimensional analysis to determine the dimensionless groups that would be required to define the pump performance. Arrange the groups so that the power and pump pressure each appear in only one group.
Difference in the mean waiting times in the four locations : At the 0.05 level of significance, is there evidence of a difference in the mean waiting times in the four locations?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd