Consultants to bring gala information security

Assignment Help Basic Computer Science
Reference no: EM13935469

Your team has been hired as consultants to bring GALA's information security up to an acceptable standard. To achieve this, you will need to undertake and complete the following activities:

1. A project plan which incorporates the essential components of project management. This will include personnel, the activities to be undertaken by each team member, a timeline using an appropriate planning tool, the risks and threats to successful completion of the project.

2. A risk assessment of the threats faced by GALA's information assets. Your risk assessment must be conducted according to ISO 31000:2009, the risk assessment standard. Also consider HB167 in your reading for this task. The information assets to be considered are: data storage (staff home drives etc), email, student records database, course management system (database), and the student enquiry management system. You will also need to identify and assess other information assets, risks and threats that Get A Life Advanetures may be subject to.

3. Develop an information security policy for GALA. As well as internal considerations about protecting information assets, you also need to consider the external compliance issues. e.g. Western Australian State legislation, Federal legislation, telecommunications legislation etc. This policy must be completely your own work, however it is suggested that you use ISO27002 5.1 Information Security Policy as a guideline to help you achieve this particular task. This two page document outlines all the key areas. Polices which contain any elements of "copy and paste" will result in a grade of zero (0) for this element of the assignment, and may also lead to a reduction in marks for the assignment overall.

4. Develop a security awareness and training (SEAT) program for users of GALA information assets relevant to USB dropping or the use of social networking media (Your group will be assigned ONE of these topics when you submit your group members to Blackboard). This will consist of a set of training materials to educate users about the risks and threats they face as end users of GALA's information assets.

Reference no: EM13935469

Questions Cloud

Paper - volkswagen huge diesel scandal : Write a research paper on given topic. Topic: Volkswagen's huge diesel scandal. You should be researchingyour topic as delivered to me earlier in the semester to write your paper focusing on the ethical,legal, and social responsibility issues that..
Write memo to managing director of worst performing company : Write a memo to the managing director of the worst performing company with recommendations of how the financial performance of the business can be improved.
Would the cells present have had to grow : Hamburger ground under the best condition often has a bacterial count of 1000-10,000 per g due to contamination. If your sample had 10^6 bacteria per g, could this number have been just contamination or would the cells present have had to grow? W..
What is maximum initial cost company would be willing to pay : Scanlin, Inc., is considering a project that will result in initial aftertax cash savings of $1.72 million at the end of the first year, and these savings will grow at a rate of 2 percent per year indefinitely. What is the maximum initial cost the co..
Consultants to bring gala information security : A project plan which incorporates the essential components of project management. This will include personnel, the activities to be undertaken by each team member, a timeline using an appropriate planning tool, the risks and threats to successful ..
Hr managers need to be up to the challenge : Written Analytical Essay (Individual) "Organisations are experiencing unprecedented levels of change in their environment, and HR managers need to be up to the challenge."
Write a script in perl : Write separate Perl scripts for each of the given requirements. Mentioned input data files are attached with this posting. In each case command to run the script from the command line should look like:
Why are direct gram stains ordered on clinical specimens : Why are direct gram stains ordered on clinical specimens? Why is a direct gram stain performed on all anaerobic cultures, even if it is not specifically ordered by the physician? Why is a gram stain performed on all CSFs?
What actions do you take to get the new shares : ABC Company is currently quoted at 53 on NASDAQ. A Rights Offering has been declared with an exercise price of 48, and 4.92 rights are needed to buy a new share. If you own 10 round lots of this company, answer the following: How many new shares can ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Tcp flags are utilized

Provide a detailed description of how each of the following TCP flags are utilized: (In Network Security) SYN (Synchronize) ACK (Acknowledgement)

  Write all strings are in this language and that contain char

Write all strings that are in this language and that contain seven or fewer characters

  The evolution of e-marketing tools

The Evolution of E-Marketing Tools

  Use mcnaughton''s wrap around rule

Use McNaughton's wrap around rule to construct a preemptive

  How many hits does the sequence exhibit

Assume LRU replacement policy, for each sequence, how many hits does the sequence exhibit?

  Er diagram of the normalised relations

You are required to perform the process of normalising the data shown in Appendix A and B to first (1NF), second (2NF) and third (3NF). Ensure you clearly outline the process you went through to create the database in 3NF and identity the appropri..

  Delete from s the 100 largest element

Give an efficient data structure supporting the following operations. Insert(S, x): add x to S. Delete - Max(S): Delete the maximum value from S. Delete - 100 - Max(S): Delete from S the 100 largest element. Delete - 100 - Min(S): Delete from S the 1..

  Searches of textual documents and database querying

Your company has been hired to design a product that will provide searches of textual documents and database querying. Your design team has not developed a product like this before

  Perform four unconstrained optimizations

Perform four unconstrained optimizations using the following values for the penalty parameter: R = 1 , 0 . 1 , 0 . 01, and 0 . 001.

  Computing cycles to save if registers are available

Determine the number of cycles will be saved if both registers are available?

  Briefly describe how you could achieve this

Suppose you would like to have most of your program variables residing in external RAM while a few time-critical variables should reside in the first 128 bytes of internal RAM. Briefly describe how you could achieve this.

  Create a comprehensive security policy for the company

Demonstrate an understanding of existing and emerging information technologies and strategic impact on organizational operations and evaluate the issues and challenges associated with information technology integration.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd