Analyse a broad range of issues related to real-world

Assignment Help Other Subject
Reference no: EM133570456 , Length: word count:1000

Information Risk Management

Assessment title: A critical reflection on a real- world security incident

Learning outcome 1: Form deep and systematic understanding of relevant standards, such as ISO27001, in the context of Information Security Management.

Learning outcome 2: Analyse a broad range of issues related to real-world security issues that face commercial organisations and other institutions.

Learning outcome 3: Evaluate and critique the shortcomings of real-world security incidents and provide clear justification and innovation solutions for how ISMS could help mitigate future incidents.

Learning outcome 4: Assess and evaluate the appropriateness of security laws and regulations.

Learning outcome 5: Reflect on personal capabilities for the proposal of an ISMS, providing a strong rationale for the methods adopted.

Broadly speaking, the assignment requires you to produce a group presentation of 30 minutes that provides a critical reflection on a real-world security scenario provided in the case study, with evidence of risk assessment using suitable methodologies, and how this can inform mitigation of future incidents.

Working on this assignment will help you to develop your knowledge and understanding of applying risk methodologies to resolve real-world security incidents. It will also help to develop your critical thinking skills for identifying appropriate mitigation strategies to avoid future security incidents. If you have questions about this assignment, please post them to the discussion board "Information Risk Management Assignment" on Blackboard.

Task Specification
For this assignment, you are provided with the following case study built around a real-world security incident.

Case study:
Imagine you are responsible for overseeing an organizational risk management strategy spanning three distinct departments. The organization perceives risk as the potential vulnerabilities within our security landscape, which could result in exposure, thereby facilitating cyber incidents against our infrastructure, capabilities, services, and applications. Such incidents could, in turn, have adverse effects on Confidentiality, Integrity, and/or Availability, leading to reduced resilience, compromised safety, impaired capabilities, loss of business services, financial setbacks, and reputational damage to the UK Government.
These risks pertain to three primary business domains:
1. IT & Infrastructure
2. Equipment
3. Logistics & Support Services

Although each business domain operates under the purview of a separate Director, the collective ownership of the risk extends to all three departments. A dedicated Director bears responsibility for managing this risk, consistently reporting its status to the Executive Board throughout the year.

Given the intricacy and expansive nature of this risk, establishing a baseline level of risk exposure, pre-mitigation, that encompasses the entire business across all three domains proves to be a challenging endeavor. Similarly, defining a Risk Appetite (RA) presents its own complexities, owing to the domain-specific variations, differing perspectives from each Director, and resource constraints, among other factors.

*Students have the flexibility to choose any organization for their study, drawing inspiration from real-world incidents that have occurred in the past, rather than being restricted to predefined case study.

Considering all of the above, answer the following questions,

1. You are expected to analyse a broad range of issues related to real-world security issues that face commercial organisations and other institutions.

2. Assess the suitability of security laws and regulations.

3. How would a baseline risk level be established? How ISMS and FAIR can be applicable to organisation.

4. What approach could be taken to define a risk assessment and can a single approach work or it will be more appropriate to individually assess for each domain? Along with risk analysis and treatment strategies.

5. How would the effectiveness of controls (risk response) be measured? What can be risk quantification measures and metrics? How to monitor ongoing (residual) risk?

Reference no: EM133570456

Questions Cloud

Describe the cultural environment of your chosen country : Describe the cultural environment of your chosen country, using Hall's framework and Trompenaars' framework.
Describe strategic changes to training : Describe strategic changes to training that might help improve the intended outcomes.
What is the most common range of distances flown : BUSA 701- How many cities have the flights originated from? What is the most common range of distances flown? What is the most common distance flown?
Establish centralized record management system : Establish a centralized record management system that allows for efficient indexing, scanning, and storage of digital records, reducing redundancy and errors.
Analyse a broad range of issues related to real-world : UFCFWN-15-M Information Risk Management, University of the West of England - Analyse a broad range of issues related to real-world security issues
What technological spillovers are and provide some examples : Technology clusters often emerge because, explain how this happens. Discuss what technological spillovers are and provide some examples.
Estimate the value and performance achieve so far : Discuss how NASA could better govern its space suit projects in order to realise its strategic objectives. estimate the value and performance achieve so far.
Apply capital market theory : FIN601 Managing Finance - Evaluate and compare the various sources and costs of financing available to an organisation
Discuss the various elements of governance in projects : Discuss the various elements of Governance in Projects. Which areas do you think would make managing a project easier?

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd