BIT361 Security Management and Governance Assignment

Assignment Help Management Information Sys
Reference no: EM132896877

BIT361 Security Management and Governance - Melbourne Polytechnic

Assessment Part

Perform a risk analysis on a small part of a business system and provide a list of possible controls. Provide the results in a report which discusses costings, implementation issues and user impacts. (1000 words)

The Case study scenario: (continued from Part A)

Your report on the need for a Security Management Program has been accepted, but they management have requested more information on: policy development and the need for a risk management program. Specifically, they have asked for an explanation of benefits of a risk management plan, the steps for creating a risk management plan, a description of risk assessment process.

To meet the client's request, you need to do the following:

Document contents:
• A discussion of the types of policies needed for information security.
• A discussion on what policy documents should look like.
• Explanation of benefits and purpose of a risk assessment.
• Description of risk assessment process.
• Outline the steps for creating a risk management plan.
• A set of asset and risk priorities using the tables below:
o Identification of Assets.
(One asset from each of the different categories: people, process, hardware and software).
o Identification of threats/vulnerabilities.
(One threat from each of the different categories: Internal, external, deliberate, and accidental).
• Priorities determined, Preliminary impact of risks
• Suggest controls for the items in the last table.

To assist with their understanding of risk assessment and management you have decided to consider 4 assets and 4 threats to be used to complete the tables below. To effectively demonstrate your skill, the tables would need to include examples of assets from different categories: people, process, hardware and software. Threats should also include examples from different categories: Internal, external, deliberate, and accidental.

The Assignment (Part B)
The format for submission for this document is less formal than for the original report: Cover page
Introduction (What is the purpose and why the report was needed/requested. Headings for each part of the client's request.

Attachment:- Security Management and Governance.rar

Reference no: EM132896877

Questions Cloud

Impact of climate change on agriculture in south africa : Impact of climate change on agriculture in South Africa and recommend adaptation response/strategies.
Different from ordinary tables and files : Discuss the characteristics of relations that make them different from ordinary tables and files.
Ethical issues in financial market : Which of the following are ethical issues in financial market?
Record transactions for the month and prepare its ledger : Record transactions for the month and prepare it's ledger, trial balance and financial statement
BIT361 Security Management and Governance Assignment : BIT361 Security Management and Governance Assignment Help and Solution, Melbourne Polytechnic - Assessment Writing Service
Create mobile applications on the iOS platform : Why is Android competition to itself? Describe key ingredients needed to create mobile applications on the iOS platform.
Make the journal entries related to the investment : Make the journal entries related to the investment in bonds assuming that the bonds are held as Trading Securities (FA @FVPL)
Determine the internal rate of return of the investment : An investment that costs $201,285 will reduce operating costs by $32,880 per year for 13 years. Determine the internal rate of return of the investment
Definitions for data mining : Define data mining. Why are there many names and definitions for data mining? What are the main reasons for the recent popularity of data mining?

Reviews

len2896877

5/25/2021 2:06:23 AM

1st file i attached is the assessment file for PartB. 2nd file i attached is the case study 3rd file i attached is the partA of the assignment which was made by your experts. I am attaching partA for the relevancy of partB. Now this assignment which i requested is partB which includes risk assessment tables. Please make sure this assignment is plagarism free. PartA which i got from your experts didn''t get me good marks. Please make this a better one and please fulfill all the marking criteria listed at the end of assessment file. Thanks

Write a Review

Management Information Sys Questions & Answers

  Find an article on the internet outline a security breach

Find an article on the Internet outline a security breach or cyberattack. Provide a link to the article and suggest a control that would mitigate against that attack. Clearly explain why that control would be an effective mitigation strategy.

  Create an introductory section where you clearly define risk

Create an introductory section where you clearly DEFINE RISK.Research and Pick ONE organization that can you conduct a risk assessment on.Identify the potential risks found in the organization and for it's ability to function in it's chosen business..

  Which site would be best for the new garage

Which site would be best for the new garage? What other criteria are important in making a final garage location decision? What concepts in the assigned reading are illustrated by this case study?

  Explain how those communications should be structured

Explain how those communications should be structured and relayed through the use of graphical tools in Visio, or an open source alternative such as Dia.

  It was already 72 degrees when astrid young pulled into the

it was already 72 degrees when astrid young pulled into the parking lot at the western oceanography institute woi. the

  How an organization should choose between saas and paas

How an organization should choose between Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS).

  What are the basic functions used in encryption algorithms

What are the two basic functions used in encryption algorithms? Why do some block cipher modes of operation only use encryption while others use both encryption

  Money market environment1 why is information important to

money market environment1. why is information important to lenders? to borrowers? what type of information do parties

  Create a document with a mockup of a proposed dashboard

Create a document with a mockup of a proposed executive dashboard. This display will be utilized to provide data to an IT consulting firm.

  Describe the business problem that is being faced

Determine whether this is perceived as a larger problem that affects companies providing similar products or services.

  What is normal time that he is assumed to take to perform

If he is allowed a 6% fatigue allowance, a 6% delay allowance, and 6% for personal time, what is the normal time that he is assumed to take to perform each inspection?

  How do you see the knowledge gained

Which type of certification do you think is the most value? Why? Of that type, which do you think you'll pursue?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd