Analyse a broad range of issues related to real-world

Assignment Help Computer Network Security
Reference no: EM133270311

Information Risk Management

Cyber Security

This Case Study is related to Cyber Security domain. A cyber security expert who knows ISO 27001 standards can do this assignment.

We use an Information security management system also known as IS0 27001. Assess the risk of three business domains: IT & Infrastructure, Equipment, and Logistics & Support services. you have to choose one company from the UK and assess the risk of these three business domains of the company.

Section 1: Overview of Assessment

Question 1. Form a deep and systematic understanding of relevant standards, such as ISO27001, in the context of Information Security Management.

Question 2. Analyse a broad range of issues related to real-world security issues that face commercial organisations and other institutions.

Question 3. Evaluate and critique the shortcomings of real-world security incidents and provide clear justification and innovation solutions for how ISMS could help mitigate future incidents.

Question 4. Assess and evaluate the appropriateness of security laws and regulations.

Question 5. Reflect on personal capabilities for the proposal of an ISMS, providing a strong rationale for the methods adopted.

Broadly speaking, the assignment requires you to produce a 3000-word report that provides a critical reflection on a real-world security scenario provided in the case study, with evidence of risk assessment using suitable methodologies, and how this can inform mitigation of future incidents.

Working on this assignment will help you to develop your knowledge and understanding of applying risk methodologies to resolve real-world security incidents. It will also help to develop your critical thinking skills for identifying appropriate mitigation strategies to avoid future security incidents.

Section 2: Task Specification

Produce a 3000-word report to address a case study of information risk management, informed by a real-world security incident and demonstrating concepts of information risk management.

For this assignment, you are provided with the following case study built around a real-world security incident,

Case study:

Imagine you are in charge of an organisational risk management strategy across three distinct departments of the organisation. The organisation envisions risk as, ‘potential vulnerabilities present across our security landscape leads to exposure which enables a cyber incident against the infrastructure, capability, services and applications, which leads to an impact upon Confidentiality, Integrity and/or Availability resulting in reduced resilience, reduced safety, ineffective capabilities, loss of business services, financial impact and reputational damage to UK Government'.

The risk applies to three main business domains:

1. IT & Infrastructure

2. Equipment

3. Logistics & Support services

Each business domain is managed by a separate Director, but collectively they (all three) own the risk. There is a separate Director who is accountable for the risk, and they report the status to the Executive Board throughout the year.

Given the complexity of the risk and its significant breadth and depth it's difficult to establish a baseline level of risk exposure - a pre-mitigation level, which represents the whole business (all three domains). Defining the Risk Appetite (RA) is also challenging given the differences across the domains, the views from each Director, the level of resources available etc.

Considering all of the above, answer the following questions,

Question 1. How would a baseline risk level be established? How ISMS and FAIR can be applicable to organisation.

Question 2. What approach could be taken to define a risk assessment and can a single approach work or it will be more appropriate to individually assess for each domain? Along with risk analysis and treatment strategies.

Question 3. How would the effectiveness of controls (risk response) be measured? What can be risk quantification measures and metrics? How to monitor ongoing (residual) risk?

You are expected to use risk assessment methodologies as covered in this module with critical reflection on your choice of risk methodology, and its strengths and limitations.

You have the freedom to select the risk assessment approach.

Reference no: EM133270311

Questions Cloud

Why would an industrial company want to buy from us : Who is the most technical customer that GTC deal with and why and Why would an industrial company want to buy from us
Identify the policy or program featured in each article : Identify the policy or program featured in each article. What type of crime is it intended to address? What is the context for the policy or program
What is the critical incident overview on mental health : What is the critical incident overview on mental health client in long term care who don't receive the appropriate care
What result would likely occur and why : Knowing of Arthurs previously expressed hate for Bob, Bob's family sought to have Arthur prosecuted for murder. What result would likely occur? Why
Analyse a broad range of issues related to real-world : Information Risk Management - Analyse a broad range of issues related to real-world security issues that face commercial organisations and other institutions
How can this article inform your practice as a sentencing : How can this article inform your practice as a sentencing advocate working with clients in the criminal justice system
Compare reasonable suspicion and probable cause : Compare/contrast reasonable suspicion and probable cause. Provide one example of a traffic stop involving reasonable suspicion and one involving probable cause
Define connected destiny : How do academics in this week's course material define connected destiny? Please apply the connected destiny theory to a new sample/group
What do you think of the ideas included in the article : What do you think of the ideas included in the article include your opinion if implementation could help improve quality policing in the United States

Reviews

len3270311

11/9/2022 10:16:01 PM

These two pdf files and the video file are very important to make sure you read and watch them carefully. After confirmation, I will provide you with slides that teach by a teacher and sample reports of the previous student that will help you to complete a first-class case study report.

len3270311

11/9/2022 10:15:41 PM

You have to choose one company from the UK and assess the risk of these three business domains of the company. A detailed description is provided in the file and video. Section 2 in a pdf file is really really important, read section 2 carefully. Also, watch the video carefully. please look at the pdf file and video and respond back to me Thanks. Sample Heading file has a title and structure so you should need to do by using this sample heading. Make sure you read this sample heading pdf file carefully. and also watch the video that define sample heading very well.

Write a Review

Computer Network Security Questions & Answers

  Data Communications Assignment

Data Communications Assignment - What type of device could be used to connect the multiple signals from both voice and data

  Comparison of the digital forensics tools

Comparison of the digital forensics tools that you used in this work and Demonstration of the two digital forensics tools that you used in this work on week 7

  Coit20262 advanced network security assignment

COIT20262 Advanced Network Security Assignment Help and Solution, Central Queensland University - Assessment Writing Service

  What are guest-hopping attacks

Identify the security advantages of cloud-based solutions.

  Assess any potential malicious attacks and threats

Analyze and assess any potential malicious attacks and threats that may be carried out against the network.

  How can due diligence processes help a company

How can due diligence processes help a company manage supply chain risks and Supply Chain Cybersecurity: Experts on How to Mitigate Third Party Risk

  What are the specific limitations of a computer system

1. what are the specific limitations of a computer system that provides no operating system? what must be done to load

  Describe situation that can cause breach of network security

Bolstering Network Security by Using Group Policy and Configuring GPO Security Settings. Determine one situation that can cause a breach of network security.

  Explain and analyse critically three security issues in sdn

Explain and analyse critically three security issues in SDN. Explain the countermeasures techniques and tools used for each one of the security issue mentioned.

  Perform an attack against the cipher

Perform an attack against the cipher based on a letter frequency count: How many letters do you have to identify through a frequency count to recover the key? What is the cleartext?

  Design and provide the ip scheme for the network

Design a Secure Network using either Visio, Paint, Word, etc showing the All locations. Design and provide the IP Scheme for the network. Establish a VPN between the All offices and allow the ability to work from home

  Report on information security planning and policy

Write a research report on information security planning and policy. Based on information security planning and policy around 3000 words.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd