Analyse a broad range of issues related to real-world

Assignment Help Computer Network Security
Reference no: EM133270311

Information Risk Management

Cyber Security

This Case Study is related to Cyber Security domain. A cyber security expert who knows ISO 27001 standards can do this assignment.

We use an Information security management system also known as IS0 27001. Assess the risk of three business domains: IT & Infrastructure, Equipment, and Logistics & Support services. you have to choose one company from the UK and assess the risk of these three business domains of the company.

Section 1: Overview of Assessment

Question 1. Form a deep and systematic understanding of relevant standards, such as ISO27001, in the context of Information Security Management.

Question 2. Analyse a broad range of issues related to real-world security issues that face commercial organisations and other institutions.

Question 3. Evaluate and critique the shortcomings of real-world security incidents and provide clear justification and innovation solutions for how ISMS could help mitigate future incidents.

Question 4. Assess and evaluate the appropriateness of security laws and regulations.

Question 5. Reflect on personal capabilities for the proposal of an ISMS, providing a strong rationale for the methods adopted.

Broadly speaking, the assignment requires you to produce a 3000-word report that provides a critical reflection on a real-world security scenario provided in the case study, with evidence of risk assessment using suitable methodologies, and how this can inform mitigation of future incidents.

Working on this assignment will help you to develop your knowledge and understanding of applying risk methodologies to resolve real-world security incidents. It will also help to develop your critical thinking skills for identifying appropriate mitigation strategies to avoid future security incidents.

Section 2: Task Specification

Produce a 3000-word report to address a case study of information risk management, informed by a real-world security incident and demonstrating concepts of information risk management.

For this assignment, you are provided with the following case study built around a real-world security incident,

Case study:

Imagine you are in charge of an organisational risk management strategy across three distinct departments of the organisation. The organisation envisions risk as, ‘potential vulnerabilities present across our security landscape leads to exposure which enables a cyber incident against the infrastructure, capability, services and applications, which leads to an impact upon Confidentiality, Integrity and/or Availability resulting in reduced resilience, reduced safety, ineffective capabilities, loss of business services, financial impact and reputational damage to UK Government'.

The risk applies to three main business domains:

1. IT & Infrastructure

2. Equipment

3. Logistics & Support services

Each business domain is managed by a separate Director, but collectively they (all three) own the risk. There is a separate Director who is accountable for the risk, and they report the status to the Executive Board throughout the year.

Given the complexity of the risk and its significant breadth and depth it's difficult to establish a baseline level of risk exposure - a pre-mitigation level, which represents the whole business (all three domains). Defining the Risk Appetite (RA) is also challenging given the differences across the domains, the views from each Director, the level of resources available etc.

Considering all of the above, answer the following questions,

Question 1. How would a baseline risk level be established? How ISMS and FAIR can be applicable to organisation.

Question 2. What approach could be taken to define a risk assessment and can a single approach work or it will be more appropriate to individually assess for each domain? Along with risk analysis and treatment strategies.

Question 3. How would the effectiveness of controls (risk response) be measured? What can be risk quantification measures and metrics? How to monitor ongoing (residual) risk?

You are expected to use risk assessment methodologies as covered in this module with critical reflection on your choice of risk methodology, and its strengths and limitations.

You have the freedom to select the risk assessment approach.

Reference no: EM133270311

Questions Cloud

Why would an industrial company want to buy from us : Who is the most technical customer that GTC deal with and why and Why would an industrial company want to buy from us
Identify the policy or program featured in each article : Identify the policy or program featured in each article. What type of crime is it intended to address? What is the context for the policy or program
What is the critical incident overview on mental health : What is the critical incident overview on mental health client in long term care who don't receive the appropriate care
What result would likely occur and why : Knowing of Arthurs previously expressed hate for Bob, Bob's family sought to have Arthur prosecuted for murder. What result would likely occur? Why
Analyse a broad range of issues related to real-world : Information Risk Management - Analyse a broad range of issues related to real-world security issues that face commercial organisations and other institutions
How can this article inform your practice as a sentencing : How can this article inform your practice as a sentencing advocate working with clients in the criminal justice system
Compare reasonable suspicion and probable cause : Compare/contrast reasonable suspicion and probable cause. Provide one example of a traffic stop involving reasonable suspicion and one involving probable cause
Define connected destiny : How do academics in this week's course material define connected destiny? Please apply the connected destiny theory to a new sample/group
What do you think of the ideas included in the article : What do you think of the ideas included in the article include your opinion if implementation could help improve quality policing in the United States

Reviews

len3270311

11/9/2022 10:16:01 PM

These two pdf files and the video file are very important to make sure you read and watch them carefully. After confirmation, I will provide you with slides that teach by a teacher and sample reports of the previous student that will help you to complete a first-class case study report.

len3270311

11/9/2022 10:15:41 PM

You have to choose one company from the UK and assess the risk of these three business domains of the company. A detailed description is provided in the file and video. Section 2 in a pdf file is really really important, read section 2 carefully. Also, watch the video carefully. please look at the pdf file and video and respond back to me Thanks. Sample Heading file has a title and structure so you should need to do by using this sample heading. Make sure you read this sample heading pdf file carefully. and also watch the video that define sample heading very well.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd