Reference no: EM133066191
CIS 7028 Information Security and Document Management - Cardiff Metropolitan University
Information Security Management Assignment
Learning outcome 1: Critically discuss how corporate security objectives are impacted by business and environmental constraints, and by threats and vulnerabilities
Learning outcome 2: Analyse information security strategies, technologies and controls developed to address gaps between current and planned state to achieve
Learning outcome 3: Analyse the technical issues relating to the transmission and storage of data and information relating to cloud computing, big data, IoT
Learning outcome 4: Appraise approaches to information securityand forensic investigation of prominent cyber offences
Learning outcome 5: Discriminate between data management policies associated with data protection and the regulation of investigatory powers
Learning outcome 6: Evaluate elements of best practices in information security standards and frameworks
Learning outcome 7: Critically consider the major risks associated with data protection and privacy within relevant industries
Use the knowledge gained through the course (both direct and indirect learning), comprehensive literature survey and your own experience, analyse concepts/issues relating to the context and produce a research-based report. You are also expected to develop your own arguments and analysis based on your knowledge and experience.
For this purpose:
• Conduct a brief background investigation on the chosen company and industry, including the feasibility of developing a comprehensive individual investigative report and submit a proposal.
• Your proposal should take the form of a ‘synopsis' of the work you plan to undertake and approximately should be of 800 words.
• Structure of the proposal should include a background, justification for selecting the company, an outline of the main areas to be covered in the final report, and the final report structure.
• Once the feedback is received for the proposal, produce the final report incorporating suggestions and changes recommended in the proposal.
• Use the knowledge you have gained from the course module, analyse of relevant literature, and your own experience to develop the final assignment.
• Your final report should consist of appropriate analysis and synthesis appropriate to an assignment-based assessment of a Master's degree.
• The word limit is approximately 3200 words. You must ensure that all sources used in the compilation of this assignment are cited in the body of the assignment, and detailed references are included in the Reference/Bibliography section.
The proposal should include (not restricted to) following sections:
• Company, industrybackground/ description relevant to the given area
• Justification for selecting the company and feasibility of it
• Major sections/ outline (tentative) of the final assignment
The final report should include (not restricted to) following sections:
• Introduction
• Identification of a clear information security strategy/plan
• Analysis
• Discussion
• Recommendations
• Conclusion
Attachment:- Security and Document Management.rar