Analyze hot topics related to information security

Assignment Help Python Programming
Reference no: EM132124327

Learning Outcomes

LO3 - Research, develop, and document a basic security policy, and analyse, record, and resolve all security incidents

LO4 - Identify and assess the threats to, and vulnerabilities of networks

Assessment Description

This assessment is designed to help students to research and analyze hot topics related to information security.

Assignment

This report gives you the opportunity to research, formulate, develop and document a basic security policy for a specific organization in Australia. Moreover, you are required to analyze, record, resolve security incidents and identify and assess the threats to, and vulnerabilities of the organisation's networks. This report will use many of the concepts and techniques discussed in this unit throughout the semester.

Please note, you will need to either choose from the list of examples of the industries provided below or come up with your own idea for a chosen specific organisation.

- Banking/Mortgage
- Hospital/Medical Centre
- Supermarket
- Vehicle rental
- Tourism agency
- Hotel/Motel

- School/University
- Library
- Aviation operator
- Property Management

Please discuss your chosen organisation and or ideas with your lecturer before you start your research. You might NOT be allowed to choose the same or similar specific organisation as other student in your class. You should aim at research, develop, and document answers to questions (a.) and (b.) below. Do not copy the examples of information security policies used in class!

You should state clearly:
- the name of the organisation you have chosen
- the stakeholders of the organisation
- the nature of the business and
- answer questions (a) and (b).

Questions:
(a.) Research, formulate, develop and document a strategic security policy for your chosen organisation based on the nature of the organisation and the stakeholders in the organisation.

(b.) Based on the security policy you have researched, formulated, developed and documented in the item (a.) above, identify and assess the potential threats and vulnerabilities of the company's network and discuss how such threats and vulnerabilities can be mitigated based on your research.

Verified Expert

The solution file is prepared in ms word and discussed about the objective and scope of security policy, roles and responsibilities, threats and vulnerabilities with solution to handle vulnerability for school case study. The solution has 2000 words approximately and references are included as per apa format.

Reference no: EM132124327

Questions Cloud

Analysing the telecommunications sector : K/508/0574 Business Strategy Assignment - Business Strategy: Telecommunication Sector (UK), UK College of Business and Computing
What are the most relevant concepts you have learned : What are the most relevant concepts you have learned in this course? In the MSL program?
Discuss the types of documents that would be useful : How would the business analyst ensure the business information system or solution satisfied all stakeholder requirements.
Do you think investors should be concerned with esg : Do you think investors should be concerned with ESG? Do you think ESG investments can perform better than non-ESG investments? Why or why not?
Analyze hot topics related to information security : ISY203 Information Security - This assessment is designed to help students to research and analyze hot topics related to information security
How has the patient and affordable care act of 2010 : How has the Patient and Affordable Care Act of 2010 (the "Health Care Reform Act") reshaped financial arrangements between hospitals, physicians.
What is home health care and the types of services : How are home health agencies paid and what services are covered?What is the purpose of the Medicare Home Health Face-to-Face requirement?
Prepare report to recommend about ABC model for your company : HI5017 Managerial Accounting Assignment, Holmes Institute, Australia. You are required to prepare a report to recommend about ABC model for your company
How personal should you get when doing business : Will a more direct or indirect approach be appropriate when making a business proposal? How personal should you get when doing business?

Reviews

urv2124327

11/19/2018 2:33:19 AM

I was informed that you guys take 12 hours to 2 days to complete the assignment i guess i got the assignment within less time. Hello there i just wanted to know how much this assignment will cost me i have attached the assignment Thanks.  It is best platform to do your assignment work. The quality of work is the best. Provide supporting documents and leave the rest on them, they wont let you feel down. This is what I like most in this service. I am scoring well with their help. thanks once more to such good service.

len2124327

9/27/2018 4:00:20 AM

Referencing Little or no evidence of any citations or reference list Referencing skills minimally intact, inaccurate and with multiple errors Referencing skills partially intact, partially accurate and used with some errors Referencing skills mainly intact, accurate and well-used with some errors Referencing skills fully intact, accurate and well-used no obvious errors 5 1 mark 2 marks 3 marks 4 marks 5 marks TOTAL 30

len2124327

9/27/2018 4:00:14 AM

Analysis, argument and cover all requirements (•the name of the organisation you have chosen • the stakeholders of the organisation • the nature of the business and) Very basic analysis evident but no depth, critique or insight. Only few requirements covered. 1 mark Some basic analysis evident but no critique or insight. Some requirements covered. 2 marks Good basic analysis lacking critique and insight. All requirements covered. 3 marks Sound overall analysis with limited critique and insight. All requirements covered. 4 marks Detailed analysis with evidence of critique and insight. All requirements covered 5 marks 5

len2124327

9/27/2018 4:00:05 AM

identify and assess the potential threats and vulnerabilities Very basic identification and assessment of the potential threats and vulnerabilities 1 mark Some basic identification and assessment of the potential threats and vulnerabilities 2 marks Good basic identification and assessment of the potential threats and vulnerabilities 3 marks Sound overall identification and assessment of the potential threats and vulnerabilities and mitigation 4 marks Detailed and excellent identification and assessment of the potential threats and vulnerabilities 5 marks 5 Discuss how such threats and vulnerabilities can be mitigated Very basic mitigation of the potential threats and vulnerabilities 1 mark Some basic mitigation of the potential threats and vulnerabilities 2 marks Good basic mitigation of the potential threats and vulnerabilities 3 marks Sound overall mitigation of the potential threats and vulnerabilities 4 marks Detailed and excellent mitigation of the potential threats and vulnerabilities 5 marks 5

len2124327

9/27/2018 3:59:45 AM

Research, formulate, develop and document a strategic security policy for your chosen organisation Very basic research and documentation of a strategic security policy 1 mark Some basic research and documentation of a strategic security policy 2 marks Good basic research and documentation of a strategic security policy 3 marks Sound overall research and documentation of a strategic security policy 4 marks Detailed and excellent with research and documentation of a strategic security policy 5 marks 5

len2124327

9/27/2018 3:59:39 AM

Poor Fair Good Format, Sources, and grammar Basic and partially correct format, non- contemporary low-quality articles, scholarly language not used and poor attention to detail Little evidence of smooth linking and logical linking 1 mark Basic and partially correct format, less recent fair-quality articles, scholarly language not used and poor attention to detail Few sections/paragraphs smoothly and logically linked 2 marks Clear and correct format, recent fair- quality articles, scholarly language partly used and good thorough attention to detail Some sections/ paragraphs smoothly and logically linked 3 marks

len2124327

9/27/2018 3:59:32 AM

Submission Late submissions will attract a 5% late penalty (of the maximum mark) per day (or part thereof) as per the late submission policy. Report Structure • Cover Page - your name, ID, subject, date, report title and WORD COUNT • Executive Summary • Table of Contents - listed sections (and sub-sections if required) • Introduction - Brief and clear introduction • Body • References-listing of all cited literature. A small number of high-quality references strategically used is the main aim here. Font: Times New Roman 12pt for paragraph text, 14pt bold for headings, with single paragraph breaks between paragraphs. Line Spacing: 1.5, Margins: 2cm all around

Write a Review

Python Programming Questions & Answers

  Fill in the python code

Fill in the Python code to play Tic Tac Toe. I won't award points unless it runs succesfully. # Tic-Tac-Toe Game def drawBoard(board): # Draws the board using the list of numbers print(" ") print(" ",board[0]," | ",board[1]," | ", board[2]) print("--..

  Define a function findword that takes a line as input

Define a function "findWord" that takes a line as input and return the words & their counts (if stopwords, don't count the word)

  Ida to reverse engineer a piece of shellcode

You are a Malware Investigator at 0xC0ff33, Inc and an incident responder came across injected shellcode during an investigation. He has done all he can in IDA and has passed on the .idb file to you. Figure out what the purpose of the malware was ..

  Write python program that prompt user to enter integer value

Write a python program that computes the average of 5 numbers. Create 5 variables to store 5 different integers. Prompt the user to input the integers.

  Write single file python program in jupyter notebook format

BUAN 6340 - Programming for Data Science Programming Lab. You will write a single file Python program in Jupyter Notebook format

  Create a class called palindrome

Create a class called Palindrome. In your Palindrome class, create a method called reverse() which takes a string argument.

  The function should return the day name (''su'',''mo''..etc)

Write the function day(d,m) where m is an integer from 1 through 12 expressing a month, and d is an integer from 1 through 31 expressing the day part of a date in 2014.

  How a vertical scroll bar is associated with a list box

What are instance variables, and what role does the name ‘self' play in the context of a class definition. Describe how a vertical scroll bar is associated with a list box.

  Find the output of the given script in python

Find the output of the following script in Python. Note: All statements are valid. Rewrite the following for loop Python statements using while loop.

  Develop program that randomly generate shakespearean insults

Assignment: Shakespearean Insults- Develop a program that will randomly generate twenty Shakespearean insults using the lists of words in the table below.

  Implement the value iteration algorithm for mdp

CSCI424 - Reasoning and Learning - University of Wollongong - What prediction will the decision tree generated in part (a) of this question return

  What are the issues assciated with top-down analysis

what are the issues assciated with top-down analysis please explain?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd