Analyze hot topics related to information security

Assignment Help Python Programming
Reference no: EM132124327

Learning Outcomes

LO3 - Research, develop, and document a basic security policy, and analyse, record, and resolve all security incidents

LO4 - Identify and assess the threats to, and vulnerabilities of networks

Assessment Description

This assessment is designed to help students to research and analyze hot topics related to information security.

Assignment

This report gives you the opportunity to research, formulate, develop and document a basic security policy for a specific organization in Australia. Moreover, you are required to analyze, record, resolve security incidents and identify and assess the threats to, and vulnerabilities of the organisation's networks. This report will use many of the concepts and techniques discussed in this unit throughout the semester.

Please note, you will need to either choose from the list of examples of the industries provided below or come up with your own idea for a chosen specific organisation.

- Banking/Mortgage
- Hospital/Medical Centre
- Supermarket
- Vehicle rental
- Tourism agency
- Hotel/Motel

- School/University
- Library
- Aviation operator
- Property Management

Please discuss your chosen organisation and or ideas with your lecturer before you start your research. You might NOT be allowed to choose the same or similar specific organisation as other student in your class. You should aim at research, develop, and document answers to questions (a.) and (b.) below. Do not copy the examples of information security policies used in class!

You should state clearly:
- the name of the organisation you have chosen
- the stakeholders of the organisation
- the nature of the business and
- answer questions (a) and (b).

Questions:
(a.) Research, formulate, develop and document a strategic security policy for your chosen organisation based on the nature of the organisation and the stakeholders in the organisation.

(b.) Based on the security policy you have researched, formulated, developed and documented in the item (a.) above, identify and assess the potential threats and vulnerabilities of the company's network and discuss how such threats and vulnerabilities can be mitigated based on your research.

Verified Expert

The solution file is prepared in ms word and discussed about the objective and scope of security policy, roles and responsibilities, threats and vulnerabilities with solution to handle vulnerability for school case study. The solution has 2000 words approximately and references are included as per apa format.

Reference no: EM132124327

Questions Cloud

Analysing the telecommunications sector : K/508/0574 Business Strategy Assignment - Business Strategy: Telecommunication Sector (UK), UK College of Business and Computing
What are the most relevant concepts you have learned : What are the most relevant concepts you have learned in this course? In the MSL program?
Discuss the types of documents that would be useful : How would the business analyst ensure the business information system or solution satisfied all stakeholder requirements.
Do you think investors should be concerned with esg : Do you think investors should be concerned with ESG? Do you think ESG investments can perform better than non-ESG investments? Why or why not?
Analyze hot topics related to information security : ISY203 Information Security - This assessment is designed to help students to research and analyze hot topics related to information security
How has the patient and affordable care act of 2010 : How has the Patient and Affordable Care Act of 2010 (the "Health Care Reform Act") reshaped financial arrangements between hospitals, physicians.
What is home health care and the types of services : How are home health agencies paid and what services are covered?What is the purpose of the Medicare Home Health Face-to-Face requirement?
Prepare report to recommend about ABC model for your company : HI5017 Managerial Accounting Assignment, Holmes Institute, Australia. You are required to prepare a report to recommend about ABC model for your company
How personal should you get when doing business : Will a more direct or indirect approach be appropriate when making a business proposal? How personal should you get when doing business?

Reviews

urv2124327

11/19/2018 2:33:19 AM

I was informed that you guys take 12 hours to 2 days to complete the assignment i guess i got the assignment within less time. Hello there i just wanted to know how much this assignment will cost me i have attached the assignment Thanks.  It is best platform to do your assignment work. The quality of work is the best. Provide supporting documents and leave the rest on them, they wont let you feel down. This is what I like most in this service. I am scoring well with their help. thanks once more to such good service.

len2124327

9/27/2018 4:00:20 AM

Referencing Little or no evidence of any citations or reference list Referencing skills minimally intact, inaccurate and with multiple errors Referencing skills partially intact, partially accurate and used with some errors Referencing skills mainly intact, accurate and well-used with some errors Referencing skills fully intact, accurate and well-used no obvious errors 5 1 mark 2 marks 3 marks 4 marks 5 marks TOTAL 30

len2124327

9/27/2018 4:00:14 AM

Analysis, argument and cover all requirements (•the name of the organisation you have chosen • the stakeholders of the organisation • the nature of the business and) Very basic analysis evident but no depth, critique or insight. Only few requirements covered. 1 mark Some basic analysis evident but no critique or insight. Some requirements covered. 2 marks Good basic analysis lacking critique and insight. All requirements covered. 3 marks Sound overall analysis with limited critique and insight. All requirements covered. 4 marks Detailed analysis with evidence of critique and insight. All requirements covered 5 marks 5

len2124327

9/27/2018 4:00:05 AM

identify and assess the potential threats and vulnerabilities Very basic identification and assessment of the potential threats and vulnerabilities 1 mark Some basic identification and assessment of the potential threats and vulnerabilities 2 marks Good basic identification and assessment of the potential threats and vulnerabilities 3 marks Sound overall identification and assessment of the potential threats and vulnerabilities and mitigation 4 marks Detailed and excellent identification and assessment of the potential threats and vulnerabilities 5 marks 5 Discuss how such threats and vulnerabilities can be mitigated Very basic mitigation of the potential threats and vulnerabilities 1 mark Some basic mitigation of the potential threats and vulnerabilities 2 marks Good basic mitigation of the potential threats and vulnerabilities 3 marks Sound overall mitigation of the potential threats and vulnerabilities 4 marks Detailed and excellent mitigation of the potential threats and vulnerabilities 5 marks 5

len2124327

9/27/2018 3:59:45 AM

Research, formulate, develop and document a strategic security policy for your chosen organisation Very basic research and documentation of a strategic security policy 1 mark Some basic research and documentation of a strategic security policy 2 marks Good basic research and documentation of a strategic security policy 3 marks Sound overall research and documentation of a strategic security policy 4 marks Detailed and excellent with research and documentation of a strategic security policy 5 marks 5

len2124327

9/27/2018 3:59:39 AM

Poor Fair Good Format, Sources, and grammar Basic and partially correct format, non- contemporary low-quality articles, scholarly language not used and poor attention to detail Little evidence of smooth linking and logical linking 1 mark Basic and partially correct format, less recent fair-quality articles, scholarly language not used and poor attention to detail Few sections/paragraphs smoothly and logically linked 2 marks Clear and correct format, recent fair- quality articles, scholarly language partly used and good thorough attention to detail Some sections/ paragraphs smoothly and logically linked 3 marks

len2124327

9/27/2018 3:59:32 AM

Submission Late submissions will attract a 5% late penalty (of the maximum mark) per day (or part thereof) as per the late submission policy. Report Structure • Cover Page - your name, ID, subject, date, report title and WORD COUNT • Executive Summary • Table of Contents - listed sections (and sub-sections if required) • Introduction - Brief and clear introduction • Body • References-listing of all cited literature. A small number of high-quality references strategically used is the main aim here. Font: Times New Roman 12pt for paragraph text, 14pt bold for headings, with single paragraph breaks between paragraphs. Line Spacing: 1.5, Margins: 2cm all around

Write a Review

Python Programming Questions & Answers

  Write a python program to implement the diff command

Without using the system() function to call any bash commands, write a python program that will implement a simple version of the diff command.

  Write a program for checking a circle

Write a program for checking a circle program must either print "is a circle: YES" or "is a circle: NO", appropriately.

  Prepare a python program

Prepare a Python program which evaluates how many stuck numbers there are in a range of integers. The range will be input as two command-line arguments.

  Python atm program to enter account number

Write a simple Python ATM program. Ask user to enter their account number, and print their initail balance. (Just make one up). Ask them if they wish to make deposit or withdrawal.

  Python function to calculate two roots

Write a Python function main() to calculate two roots. You must input a,b and c from keyboard, and then print two roots. Suppose the discriminant D= b2-4ac is positive.

  Design program that asks user to enter amount in python

IN Python Design a program that asks the user to enter the amount that he or she has budget in a month. A loop should then prompt the user to enter his or her expenses for the month.

  Write python program which imports three dictionaries

Write a Python program called hours.py which imports three dictionaries, and uses the data in them to calculate how many hours each person has spent in the lab.

  Write python program to create factors of numbers

Write down a python program which takes two numbers and creates the factors of both numbers and displays the greatest common factor.

  Email spam filter

Analyze the emails and predict whether the mail is a spam or not a spam - Create a training file and copy the text of several mails and spams in to it And create a test set identical to the training set but with different examples.

  Improve the readability and structural design of the code

Improve the readability and structural design of the code by improving the function names, variables, and loops, as well as whitespace. Move functions close to related functions or blocks of code related to your organised code.

  Create a simple and responsive gui

Please use primarily PHP or Python to solve the exercise and create a simple and responsive GUI, using HTML, CSS and JavaScript.Do not use a database.

  The program is to print the time

The program is to print the time in seconds that the iterative version takes, the time in seconds that the recursive version takes, and the difference between the times.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd