BIT361 Security Management and Governance Assignment

Assignment Help Computer Network Security
Reference no: EM132854697

BIT361 Security Management and Governance - Melbourne Polytechnic

Assignment

The organisation in the case study has asked you to present a report to the CEO. The report must outline the need for a Security Management Program, propose an appropriate management structure for the case study, and describe the roles of each position in your proposed structure. The report must be presented as a professional document.

» Describe and discuss the purpose of a Security Management Program.
» Discuss the benefits derived from having Security Management Program as an ongoing process.
» Suggest an information security staffing structure for the business described in the case study and justify your proposed structure.
» Identify and present a description of the functions, tasks, roles, and responsibilities for each position you have defined in your suggested structure.
» Discuss the roles of different individuals/groups would play in terms of governance of security in general.

Report Development

The required report must be completed using MS word.

To coordinate the development of the report with your client (the organisation in the case study), you will organise two meetings to discuss the developing report. After the second meeting, the final report will be presented.

Meeting 1 Report Outline

This document will demonstrate the proposed layout of the final document. It will include, in outline form, all major parts: cover page, executive summary, table of comments, major headings, some minor headings named to match the case study. The introduction must include a complete statement of purpose. To help with this, take note of the description below of the requirements for the final document.

Report cover

Includes the report title, the date, who it has been prepared for, and the author's name (and Student ID, subject group). DO NOT USE MS TEMPLATES!
Executive summary 1 paragraph:
(Who the report is for, scope/purpose of report; action required. Page numbering starts at roman numeral ‘i').
Table of contents (page ‘ii'). Body of report:
Introduction (new page, numbering restarted at ‘1') that must include a description of the purpose, scope, and structure of the document.
Separate sections that address the client's requests. These sections need to cover the assessment criteria outlined below.

References
A list of works used in the document. Use the Harvard referencing style. (Every reference must have at least 1 in-text citation).

Meeting 2 Report Draft

The draft will extend the outline should include the main headings for each part of the final document. The executive summary and introduction must be complete. The major sections of the body must include either completed sections or bullet points or comments that provide information on the content of each section. References must be listed.

Attachment:- Security Management and Governance.rar

Reference no: EM132854697

Questions Cloud

Approximate the probability that the average shipping time : Approximate the probability that the average shipping time is less than 2.11 days.
What is the major reason behind leadership development : What is the major reason behind leadership development for managers in organizations? Are there any problems you see with this reason and/or model?
News on globalization : Think about what you have read and seen in the news on globalization. Consider the fact that the clothing we wear, the cars that we drive,
Explain how the perspectives of child abuse have changed : Explain how the perspectives of child abuse have changed over the last century. Identify how this evolution has affected the victimization of minors.
BIT361 Security Management and Governance Assignment : BIT361 Security Management and Governance Assignment Help and Solution, Melbourne Polytechnic - Assessment Writing Service
Find the probability that a randomly selected acre : Find the probability that a randomly selected acre in the forest has fewer than 29,221 ants.
Identify two risk factors associated with victim of bullying : Identify at least two risk factors associated with victims of bullying. Identify at least two general characteristics of minors who engage in bullying behaviors
What is the sample mean proportion : The 99% confidence interval for a population proportion is [0.24, 0.86]. What is the sample mean proportion.
What is the probability that a mutual fund : A financial analyst has determined that there is a22% probability that a mutual fund will outperform the market over a 1-year period provided

Reviews

len2854697

4/12/2021 12:41:51 AM

I want 3 separate reports according to weekly submission (week 3,6,8) but of the same scenario as given in the assignment. Week 8 should be more detailed. I will rearrange them by myself. Should have no plagarism. Please check the marking criteria at the bottom of the file to fulfill the requirements of the assignment.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd