Consultants to bring gala information security

Assignment Help Basic Computer Science
Reference no: EM13935469

Your team has been hired as consultants to bring GALA's information security up to an acceptable standard. To achieve this, you will need to undertake and complete the following activities:

1. A project plan which incorporates the essential components of project management. This will include personnel, the activities to be undertaken by each team member, a timeline using an appropriate planning tool, the risks and threats to successful completion of the project.

2. A risk assessment of the threats faced by GALA's information assets. Your risk assessment must be conducted according to ISO 31000:2009, the risk assessment standard. Also consider HB167 in your reading for this task. The information assets to be considered are: data storage (staff home drives etc), email, student records database, course management system (database), and the student enquiry management system. You will also need to identify and assess other information assets, risks and threats that Get A Life Advanetures may be subject to.

3. Develop an information security policy for GALA. As well as internal considerations about protecting information assets, you also need to consider the external compliance issues. e.g. Western Australian State legislation, Federal legislation, telecommunications legislation etc. This policy must be completely your own work, however it is suggested that you use ISO27002 5.1 Information Security Policy as a guideline to help you achieve this particular task. This two page document outlines all the key areas. Polices which contain any elements of "copy and paste" will result in a grade of zero (0) for this element of the assignment, and may also lead to a reduction in marks for the assignment overall.

4. Develop a security awareness and training (SEAT) program for users of GALA information assets relevant to USB dropping or the use of social networking media (Your group will be assigned ONE of these topics when you submit your group members to Blackboard). This will consist of a set of training materials to educate users about the risks and threats they face as end users of GALA's information assets.

Reference no: EM13935469

Questions Cloud

Paper - volkswagen huge diesel scandal : Write a research paper on given topic. Topic: Volkswagen's huge diesel scandal. You should be researchingyour topic as delivered to me earlier in the semester to write your paper focusing on the ethical,legal, and social responsibility issues that..
Write memo to managing director of worst performing company : Write a memo to the managing director of the worst performing company with recommendations of how the financial performance of the business can be improved.
Would the cells present have had to grow : Hamburger ground under the best condition often has a bacterial count of 1000-10,000 per g due to contamination. If your sample had 10^6 bacteria per g, could this number have been just contamination or would the cells present have had to grow? W..
What is maximum initial cost company would be willing to pay : Scanlin, Inc., is considering a project that will result in initial aftertax cash savings of $1.72 million at the end of the first year, and these savings will grow at a rate of 2 percent per year indefinitely. What is the maximum initial cost the co..
Consultants to bring gala information security : A project plan which incorporates the essential components of project management. This will include personnel, the activities to be undertaken by each team member, a timeline using an appropriate planning tool, the risks and threats to successful ..
Hr managers need to be up to the challenge : Written Analytical Essay (Individual) "Organisations are experiencing unprecedented levels of change in their environment, and HR managers need to be up to the challenge."
Write a script in perl : Write separate Perl scripts for each of the given requirements. Mentioned input data files are attached with this posting. In each case command to run the script from the command line should look like:
Why are direct gram stains ordered on clinical specimens : Why are direct gram stains ordered on clinical specimens? Why is a direct gram stain performed on all anaerobic cultures, even if it is not specifically ordered by the physician? Why is a gram stain performed on all CSFs?
What actions do you take to get the new shares : ABC Company is currently quoted at 53 on NASDAQ. A Rights Offering has been declared with an exercise price of 48, and 4.92 rights are needed to buy a new share. If you own 10 round lots of this company, answer the following: How many new shares can ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd