Demonstrate an understanding of change on organisations

Assignment Help Other Subject
Reference no: EM133533111 , Length: word count:3600

Research Paper - Cyber security

Task Overview:

Chosen Organization - Walmart

Objectives:

The course objectives met by this assignment include:

LO 1. Evaluate, synthesise and critically review theoretical frameworks with other evidence to provide solutions to real-world problems by applying security management models and practices to security programs;

LO 2. Demonstrate an understanding of change on organisations in the global environment and the impact of these on organisational systems by developing risk management strategies that incorporate appropriate controls;

LO 3. Communicate professionally and effectively in written communication to various audiences to achieve targeted outcomes demonstrating and collating concepts of Cyber Security.

Background
Using the previous organisation (Walmart) from assessment item one (Report 01), write a research paper that reflects on the current roles and titles of the security personnel. The size of the organisation (small, medium, large) will determine what you are asked to assist in developing a security program. You are needed to invent a cyber security situation to safeguard the selected organisation.

In your research paper, reflect on the current roles and titles of the security personnel and provide suggestions of improvements. Provide a plan to make these changes incorporating training requirements. Determine if the organisation uses any ISO security standards and provide reasoning as to which security model would be more suitable. Determine the suitability of certification. Justify by using threat identification and provide risk assessment for this organisation.

As in the previous assessment item, please make sure NOT to divulge any sensitive information. If you are working for an organisation, use the internet to determine what information is available to the public.

We will require you to provide the URL of the organisation and values, vision, and mission statement added as an appendix.

- Understanding of key ideas and concepts (CLO4):

Identify key ideas and concept within a real-life scenario of issues; able to explain an issue with the use of key ideas and concepts; able to relate own experience to course material and issue by introducing own perspective; showing judgement by incorporating objective view of how implementing a concept may not work and providing suggestions on how this could be overcome.

- You need to explain an issue with the use of key ideas and concepts within a real life scenario and present explanations relate own experience to course material and issue by introducing own perspective.

Research Paper structure

Write a research paper and organise it in the following way:

• Title (you are required to decide your paper's title)
• Your name and student number
• Abstract (about 200 words)
• Introduction
• Body context (you could divide into several sub-sections if required)

- Reflect on the current roles and titles of the security personnel and provide suggestions of improvements in the form of suitable cybersecurity certification.

- Provide a plan to make these changes incorporating training requirements

- Conduct risk assessment including threat identification for this organisation.

- Determine if the organisation uses any ISO security standards and discuss why such a security model would be more suitable to mitigate any identified cyber risks.

• Conclusion.
• References.
• Appendix.

Textbook: Whitman, ME & Mattord, HJ 2018, Management of information security, 6th edn, Thomson Course Technology, Boston, Massachusetts.

The word-count is approximately 3500

Reference no: EM133533111

Questions Cloud

Should counsel be appointed in noncriminal matters : Gideon v. Wainwright guarantees the right to court appointed counsel for indigents in felony cases. Should counsel be appointed in noncriminal matters?
What are strengths and limitations to operant conditioning : What are strengths and limitations to operant conditioning in a classroom setting? What are strengths and limitations to using a token economy in a classroom
Which approach aligns most closely with your personal style : COSC 510- Show your ability to analyze and critically think through which approach aligns most closely with your own personal/professional style of counseling.
What is the workplace problem you are planning to discuss : What is the workplace problem you are planning to discuss? Include at least 1 research article to support your explanation of why this is an issue
Demonstrate an understanding of change on organisations : Research Paper Assignment - Cyber security - Demonstrate an understanding of change on organisations in the global environment and the impact of these
How you would evaluate a program or organization policies : Review the various program evaluation tools provided by SAMHSA, the CDC, the WHO, or other resources you have. Describe an approach you would take toward
How accurately did the media report the study : Compare the original journal article (primary source) to the article that reported on it (secondary source). How accurately did the media report the study?
What are your impressions on the conversation in the youtube : what are your impressions on the conversation in the YouTube clip this week, America's Critical Thinking Crisis? What is your takeaway?
How will they benefit your further study and career : What key knowledge and skills have you learned through the subject- PRO100 Information Systems Project Management ? How will they benefit your further study

Reviews

len3533111

9/28/2023 11:20:37 PM

I have the Part 02 of this assignment now. We have done the 1st part and the organization we chose is Walmart. So here's The 2nd part of this assignment what I'd like you to work on this semester: In this assessment, you are required to write a research paper same as part 01 (Assessment 01). Please kindly assign it to the same expert who did Part 01 in cyber-Security Textbook: Whitman, ME & Mattord, HJ 2018, Management of information security, 6th edn, Thomson Course Technology, Boston, Massachusetts. WORD LIMIT: approx. 3,600 words for this task (references will not count). Everything else you need to know is explained clearly in the assignment file. Please read through all the details and let me know your update as soon as possible. Alos i have added the relevant chapters for this assignment from the textbook in the assignment file.

Write a Review

Other Subject Questions & Answers

  An essay which discusses three philosophical responses

RELS 3345 :Write an essay which discusses three philosophical responses to the Shoah. Which of these responses seems most meaningful to you, and why?

  Describe the scope and consequences of the problem

Select a criminal justice topic related to "organized crime"/problem to define, describe the scope and consequences of the problem, and assess society's.

  Exhibiting extremely disturbed behaviors

13- year old Martin has been exhibiting extremely disturbed behaviors. He is very aggressive and repeatedly violates the basic rights of others. He is also physically cruel and routinely dishonest.

  What did you learn from experience

What did you learn from this experience. Did you find it helpful to you in your personal or professional life. Why or why not

  Small and meduim enterprise organizational performance

TOPIC IS THE IMPACT OF TRAINING AND DEVELOPMENT IN A SMALL AND MEDUIM ENTERPRISE ORGANIZATIONAL PERFORMANCE

  This assignment or report is on cloud computing 1what cloud

this assignment or report is on cloud computing1what cloud computing is?2why is it useful?3what is it made

  Describe the roles of the nurse for the program

Describe the roles of the nurse for the program you are currently enrolled. Identify the scope of practice for the nurse in the state where you intend.

  What does it mean if a graph is normally distributed

What does it mean if a graph is normally distributed. What percent of values fall within 1, 2, and 3, standard deviations from the mean

  Describe how the holy spirit works

Describe how the Holy Spirit works together with us in developing strong spiritual habits. Discuss the goal(s) of spiritual habits

  Examine effectiveness of vulnerability management programs

Examine the effectiveness of vulnerability management programs of organizations when utilizing third party vendors for threat intel or vulnerability scanning.

  Who was an early proponent of functionalism

You attend a lecture by a psychologist who uses terms such as free will and self-actualization. Which psychological perspective is most consistent with the points the psychologist presented?

  Create a presentation about the learning process

Explanation of the role of families in promoting the intellectual, social, emotional, physical growth, and well-being of children.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd