COMP 0400 Information Security management Assignment

Assignment Help Management Information Sys
Reference no: EM132630326

COMP 0400 Information Security management - Middle East College

Learning Outcome 1: Develop information security baseline(s).
Learning Outcome 2: Manage reviews to identify events and corrective actions

Part 1 :

Submit a work proposal for this assignment or before 30/08/2020 (23:59) which must include:

• Understanding of deliverables - a detail description of deliverables.
• General overview of proposed plan - initial understanding of solution to task2.
• Timeline for completion of the given tasks.
• references
The work proposal must be submitted in a word file through the link available in Moodle.

Part 2:

SALT (Smart And Living Technologies) is a medium sized Software Development company in South Australia which was established in 2004. It is present in two premises, both of which have their offices. Additionally, they have hosted their information systems in a hosted data center facility with a service provider. That is the only instance of their IT infrastructure. SALT is providing software solutions and consulting services to clients all over the world, who fall under small to medium sized businesses. The departmental heads are mostly the people who were there since first day of the business, except the CISO that is a new role introduced recently. This explains why heads of department in SALT have a good knowledge about their business processes but did not make much effort towards formal documentation. Alex Smith is the CEO of SALT. He started the company in partnership with a friend Brett. Brett is an investor in the company but has a dormant role as far as the business operations are concerned. Mr. Smith is an engineer but he has no modern technical understanding of IT security issues. Alex has had no problems with IT Security until very recently when the Company's network was subject to a series of attacks. In the period of 3 days, the company's website was defaced, a serious virus infected the company e-mail and large quantities of data were corrupted. Smith is worried about cyberterrorism and is concerned about becoming a victim of e-crime. After discussing with the Executive committee, he appoints you as a Chief Information Security Officer (CISO). As a first step, you will review the current threats analyse the impacts, and create necessary management plans. The CEO has shared a recent audit report to start with and the shocking results are listed below:

a. General
Improper operating procedures used by employees. Lack of security awareness and general security laziness. Nil acceptance of security responsibility.
In-adequate standard operating procedures. Unattended machines.
Failure to take care of media. Printing sensitive material.
Failure to turn off computers at the end of the working day. Failure to backup information.

b. Hardware problems
Failure to adequately secure the hardware (eg laptops unsecured). Effects from the physical environment causing damage.
c. Software concerns
some application software is of inferior quality and untested in the field and therefore not able to be trusted in the office environment.
Nil audit logs.
Lack of adequate access control.
Lack of secure identification and authentication techniques. Limited antivirus software.
Lack of restrictions to specific files when certain applications are operating. Lack of security awareness and general security laziness.

1. Discuss the information security impacts of the current situation in SALT with appropriate examples. (20 marks)
(Hint: Give a minimum of two appropriate examples)

2. Using literature, recommend and discuss one cyber security incident response standard that would help SALT to manage the security incidents Smith is worried about.
(Hint: your discussion should be defended by literature)

3. Develop a baseline to protect SALT from being attacked again.
(Hint: your baseline should include at least 10 technical/ non-technical requirements with appropriate explanation.)

4. Most of cyber security crimes could be avoided by enhancing the users' security awareness. With appropriate security guidelines, design an appropriate cyber security awareness campaign to help SALT limit the impact of cybercrimes.

Part 3: Proper referencing, literature review, conclusion and report format
Rules & Regulations:
• All resources should be cited using CU Harvard style.
• The final assignment must have a Title page, Table of Contents, References/ bibliography using CU Harvard Style and page numbers.
• Title Page must have Assignment Name, Module name, Session, your name, ID, and the name of the faculty.
• The assignment answer is expected to be in total of 1500 - 2000 word.

Attachment:- Information Security management.rar

Reference no: EM132630326

Questions Cloud

What is the current weighted average cost of capital : Osama Co. is a listed company operating in the textile industry. Osama Co's board of directors met recently to discuss a new strategy for the business.
Explain the marketing of salt : Explain the marketing of salt. Salt was long marketed as one product for anyone who wants it for the need to season food, which is a universal need.
Determine the true cash balance as of November : On November 30, Hernandez Company's bank statement showed an ending balance of $37341. Determine the true cash balance as of November
Advantages and disadvantages of local taxes : Identify the taxes primarily used by your local jurisdiction to fund its operations
COMP 0400 Information Security management Assignment : COMP 0400 Information Security management Assignment Help and Solution, Middle East College - Assessment Writing Service
Explain several weaknesses or limitations of ratio analysis : You work for a brokerage firm. Your boss asked you to analyze Eagle Manufacturing's performance for the past five years and to write a report
Describe the accounting for treasury stock : Discuss the characteristics of the corporate form of organization? Describe the accounting for treasury stock
Discuss the yield curve : Discuss the yield curve and explain how it applies to the yield to maturity (YTM) of short and long-term bonds.
How much sales revenue must be earned : How much sales revenue must be earned to produce profits equal to 20 percent of sales revenue? Compute the contribution income statement to verify your answer

Reviews

Write a Review

Management Information Sys Questions & Answers

  Group information dependence problem

Group Information Dependence Problem. Develop power presentation of the 4 articles. Support your presentation with appropriate references

  Value creation through operations and technologyconsider

value creation through operations and technologyconsider the following scenario. be sure to reference the resources in

  How that method evolved into modern critical path analysis

What's the critical path of a project? The critical path of a project is a long sequence of the activities that must be complete in order for a project to be completed on time. How is slack time determined? Slack time is determined by subtractin..

  Explain the factors affecting our health care system

The onset of more advanced electronic record systems can be a huge boon to this changing environment.

  Commit and rollback

Describe how locks could be used in order to qualify data transactions and enhance concurrency control.

  Explain one example of some kind of information technology

In your first posting, you are expected to provide one example of some kind of information technology tool that helps organizations share knowledge.

  Create a presence on the world wide web

Write paper on the steps needed and options available for a company to create a presence on the World Wide Web

  Why do i have to do earned value management

Many project managers ask the question "Why do I have to do earned value management?". Kuehn (2007) states that the reason why is that it works... if it is done well. After reading the chapter and Kuehn's paper, what do you think are the biggest h..

  Develop further expertise in quantitative research

How have your own thoughts about quantitative research changed since learning more about it? How do these thoughts relate to your worldview?

  Explain the possible risks constraints and assumptions

Identify possible risks, constraints, and assumptions. Describe the needed integration with other systems and infrastructure. Describe the scope and analyze how to control the scope.

  Describe the current uses of bluetooth

Analyze how Bluetooth technologies can be used in an organization's strategic planning. Give at least one real-life example that supports your answer.

  The nature of internal cybersecurity threats

Areas of weakness that attackers may exploit in both external and internal attacks.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd