COM7005D Information Security Strategy Development

Assignment Help Computer Engineering
Reference no: EM132505736

COM7005D Information Security Strategy Development - Arden University

Assignment Brief

As Section of the formal assessment for the programme you are required to submit an Information Security Strategy Development assignment. Please refer to your Student Handbook for full details of the programme assessment scheme and general information on preparing and submitting assignments.

Learning Outcome 1) Evaluate the basic external and internal threats to electronic assets and countermeasures to thwart such threats by utilising relevant standards and best practice guidelines.
Learning Outcome 2) Analyse the legalities of computer forensics phases and the impact of the legal requirements on the overall information security policy.
Learning Outcome 3) Critically assess the boundaries between the different service models (SaaS, PaaS, IaaS) and operational translations (i.e. cloud computing) and to identify the associated risks.
Learning Outcome 4) Critically investigate a company information security strategy to provide consultation and coaching through reporting and communication.
Learning Outcome 5) Assess, compare and judge computer media for evidentiary purposes and/or root cause analysis.
Learning Outcome 6) Apply relevant standards, best practices and legal requirements for information security to develop information security policies.
Learning Outcome 7) Lifelong Learning: Manage employability, utilising the skills of personal development and planning in different contexts to contribute to society and the workplace.

Section 1

This assignment is worth 50% of the total marks for the module.

Using your current or previous workplace1 as the case study, please answer the following:

Question 1) Critically analyse the different types of software acquisition models and try to relate that to those systems you are using at your workplace.

Question 2) Do you have a handbook that describes the policies, processes, and procedures in place? Evaluate the security strategy in that handbook for network activity monitoring, for instance? What are the issues missing in the handbook? You need to discuss the legal issues raised by this handbook as many companies consider a handbook as Section of the contract.

Question 3) What is the information security strategic plan in place and how it is implemented?

Question 4) Analyse the external and internal threats to information systems in your workplace and show how your security strategy should protect against those threats. Report your risk assessment methodology in a flowchart-like figure. You can have a look at Stoneburner (2002) work to understand how you should relate all the activities together. Please do not copy the work from (Stoneburner, 2002) as you need to compile your own risk assessment methodology as Section of your security strategy plan. You also need to discuss how you are going to manage the identified risks.

Question 5) Critically analyse the access control strategy? If you are to rewrite that Section of your security plan, what would you change? Why? What sort of a strategy you will use here? proactive or reactive? Justify your answer.

Question 6) What do you recommend for a proper incident management strategy? How would you implement it? Hint: Stakeholders and role responsibilities.

Question 7) Compile a brief security strategy that suits the business requirements as well as the security requirements of this workplace.

Attachment:- Information Security Strategy Development.rar

Reference no: EM132505736

Questions Cloud

Prepare a formal research proposal investigating innovative : Design research for a particular project, explaining the limitations, advantages, and technical and ethical implications of the techniques employed.
BAF 403 Financial Institutions and Markets Assignment : BAF 403 Financial Institutions and Markets Assignment Help and Solution - Emirates College of Technology, UAE - Assessment Writing Service
How the use of selected methodologies is relevant : Explain how research outcomes may be affected by the nature and application of particular research techniques. how the use of selected methodologies is relevant
Demand and costs at various activity levels : Tory Company sells a single product. Troy estimates demand and costs at various activity levels as follows:
COM7005D Information Security Strategy Development : COM7005D Information Security Strategy Development Assignment Help and Solution, Arden University - Assessment Writing Service
Internal rate of return-yama corporation : Yama Corporation recently purchased a new machine for its factory operations at a cost of $328,325. The investment is expected to generate $115,000
Make journal entry to record adoption of the annual budget : What are the key differences between a governmental unit and a commercial company?Make the journal entry to record the adoption of the annual budget.
Calculate the profitability of the chester company account : Wizard Corporation has analyzed their customer and order handling data for the past year and has determined the following costs:
Describe the key elements of your desired doctoral research : Look ahead to the Dissertation Research Prospectus that you will be expected to prepare in RES861 to describe the key elements of your desired doctoral research

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd