CO4512 Information Security Management Assignment

Assignment Help Other Subject
Reference no: EM132456436

CO4512 - Information Security Management - University of Central Lancashire

Learning Outcomes

This assignment addresses the following learning outcomes from the module syllabus:

Learning Outcome 1 - Select and use applicable standards and methods for information security and risk management.

Learning Outcome 3 - Conduct and properly document risk assessment based on a given scenario.

Learning Outcome 4 - Find and evaluate appropriate published information to remain up-to-date about threats, vulnerabilities and patches.

Assignment Description

This assignment requires you to plan, conduct and document a risk assessment based on the scenario described in Section 3.

Assignment task

In this assignment you have to:

Question 1. Conduct a risk assessment on the network in Figure 1, based on the ISO 27005 standard.

Question 2. Write a detailed risk assessment report.

Report Structure

To meet the requirements your report must have a professional look. In order to help you in this regard the following structure is provided as a guideline. The report must contain the following main sections, however, you are allowed to add subsections as you find reasonable.

Introduction
Here you will specify the risk assessment method that you use, discuss the advantages of this risk assessment method. Finally, highlight the certain tasks that you will perform during the risk assessment on the given system.

Risk Assessment

This section contains the main part (result) of the report, namely, the whole risk assessment process made on the system in Figure 1, besides your chosen system parameters. The section can include several sub-sections:
• Owner specification,
• Assets (primary and secondary). You should explain briefly why the assets are primary or secondary. You can give a collective explanation for a group of assets instead of explaining for each asset.
• One threat for each asset.
• One vulnerability for each asset. The vulnerabilities have to be taken from one of the online vulnerability database (e.g. NVD), and have to be given with the official CVE number.
• Likelihood level computation, using Boston gird
• Impact table specification
• Risk identification with the risk level, using risk matrix (Boston grid).
o At most 10 risks should be given.

Summary and Recommendations
Summarize the main findings and write a non-technical recommendation (executive summary) for the management/director board, summarizing why they should invest in security and follow the ISO 27001 standards.

Attachment:- Information Security Management.rar

Reference no: EM132456436

Questions Cloud

What direction would it likely shift and why : A change in the legal-institutional environment can shift the Aggregate Supply curve to the right (increase) or left (decrease). Cite a specific example
Company historical resident trends-current strategic plan : The company's historical resident trends and current strategic plan, Developing recommendations to ensure alignment with company strategy
What is the price elasticity of demand for flour : Using the midpoint formula method, what is the price elasticity of demand for flour? Is the demand for flour elastic or inelastic?
Briefly discuss osha requirements : Discuss the benefits and weaknesses of that method, including how your method will affect the accuracy and precision of the data.
CO4512 Information Security Management Assignment : CO4512 Information Security Management Assignment Help and Solution, University of Central Lancashire - Assessment Writing Service - Select and use applicable
Inflation rate and the natural rate of unemployment : In the 1970s in the United States, the inflation rate and the natural rate of unemployment both rose. Let's use this model of time inconsistency to examine this
What is the amount of Adam gain on the sale : Adam sold a piece of business equipment that had an adjusted basis to him of $50,000. What is the amount of Adam's gain on the sale
Examples of exercises where monte-carlo simulation : Give two examples of exercises where Monte-Carlo simulation should be performed using the same choice of random numbers, explaining your reasoning in each case.
Calculate marginal revenue over each interval : Willy's Widgets, a monopoly, faces the following demand schedule (sales in widgets per month):

Reviews

Write a Review

Other Subject Questions & Answers

  How the student met the competencies aligned to the course

Students will outline what they have discovered about their professional practice, personal strengths and weaknesses that surfaced, additional resources.

  Identifying and improving patient safety or quality issues

IHP604 - Healthcare Quality Improvement - Southern New hampshire University - Is the PDSA tool useful in identifying and improving patient safety or quality

  Where is the theatre headed

Predicting trends in the theatre is the work of theatre artists the world over. While their first and foremost concern is with self-expression.

  What does the author mean by the phrase race becomes biology

What does the author mean by the phrase "race becomes biology"? How does ‘race become biology' according to the author? How did the tragedy of September 11, 2001, affect the health of mothers and children with Arab surnames in the United States?

  Explore the importance of statistics in business

Explain the importance of statistics in business. What is the difference between a population and a sample? List different types of charts available in Excel.

  What role does private sector play in determination of risks

Looking at the six strategic challenges driving current and future risks as provided in the 2014 Quadrennial Homeland Security Review.

  Identify the different types of reinforcements

Identify the different types of reinforcements. How do these types enhance learning?

  Explains the concept of a continuum of sanctions

Compose an essay of 500 - 700 words that explains the concept of a continuum of sanctions as a means for administering treatment and/or punishment options for juvenile delinquents

  In artificial intelligence

In Artificial Intelligence, the claim was made several times by different characters that David and his feelings were not 'real.' There were 2 scenes that forced us to wonder about that:

  Describe specifically what you did as a customer in case

Describe specifically what you did as a customer in each case. How did your involvement vary across the three types of service situations?

  Illustrate the fields current terminology

The Real Estate terms used should illustrate the field's current terminology - Write a formal, 4 page APA formatted research paper

  Each of the students is new to online learning

Which of the following sentences has a subject/verb agreement problem.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd