Design security policies for a small to medium enterprise

Assignment Help Computer Network Security
Reference no: EM132313961

Goal - To design and write the security policies for a small to medium enterprise

Introduction

The task is to produce a printed consultancy report that is for establishing the security provisions for an organization described in a case study. The case study will be created by the team and will be submitted several weeks prior to the remainder of the report to enable the team to receive feedback on its suitability for the assignment. The report itself will contain multiple parts, some created by the whole team, while some will be largely undertaken individually, but with input from the rest of the team.

As this assignment contains a sizable amount of team work, there will be a peer assessment perspective of the assignment. This will involve each team member providing some feedback and information to the tutor about how the group functioned as a team, and how much work was completed by each member.

Case Study

The first component of the assignment, due in week 10, is the case study.

You are going invent a company based in the IoT (Internet of Things) area and write a 500-700 word document describing the company your team has invented.

IoT encompasses everything connected to the Internet, but it is increasingly being used to define devices or elements that connect together through the Internet - from simple sensors, cameras to smartphones and wearable devices. IoT is being used in many forms in the agriculture, construction, industrial, medical, transport and social sectors. IoT devices provide real-time data gathering/monitoring and, as data is gathered over time, it can provide detailed business insights and lead to improvement in efficiency.

The company can be in any industry in IoT that the team chooses. For example, some ideas are:

• Agricultural/Environmental - Temperature, Humidity, Water purity, Energy usage
• Transport & Logistics
• Health
• Smart homes

It is suggested that you try to model the company off of an existing company and then make changes to create your own company. This will enable you to get a more detailed picture in your minds of what the company is like, its context, and its security needs.

It is suggested that the team invents a name for the company, and indeed names for key employees at the company. It is a good idea to describe the purpose of the company, the number of employees, geographical location, its ICT infrastructure and any specific industry-related risks to the company.

IoT Infrastructure - This is provided as a basic guide only and is by no means exhaustive. Your team doesn't need to limit your design to the basic infrastructure (you can use any other structure). The basic elements to be considered for your business are shown below:

1754_figure.jpg

• Cloud Based Infrastructure will be accessed by both Corporate and Customers. It provides a flexible, scalable platform for your customers to connect to and receive reports. Corporate users build customer Web portals and manage the customer devices
• Corporate Infrastructure provides the environment for the company servers, finance and administration.
Your task is a creative process requiring everything to be imagined to achieve a realistic view of the company to understand its needs and threat profile.

Consultancy Report

The report will have two sections: the first will contain information common to the entire report, such as the threat and risk analysis, while the second section will address specific security issues facing the company.

The first section of the report should contain:

• an executive summary (~400 words)
• an introduction including a description of the assumptions made and extra context for the case study (2-3 pages max)
• a threat and a brief risk analysis (2-3 pages)
• a definition of the main security goals for the case study's organisation and an accompanying set of high-level security policies (2-3 pages).

Include any extra material at the end of the report as appendices.

• The appendix should contain a copy of the case study, updated with any changes made since the first submission in week 10.

The second section of the report should contain the following subsections, each written by a different group member:

• Physical Security
• Logical Security
• Data and System Security
• Network Security
• User Education and Compliance (only if the group has 5 members)

The content should provide an overview of how you will achieve the security goals stated in the first section of your document in the area that you are tackling. Each recommendation should refer explicitly to a numbered security goal from the first section of your report. You need to explain why you are making the recommendations and mention any obvious competing solutions and why your suggestion is more appropriate.

Each of these subsections should be ~4 pages (no more than 5) in length.

Attachment:- Data Network Security.rar

Verified Expert

Attached is a consultancy report for Tech On company. The solution provides in depth description of the overall organisation of the company, what it deals with, the threat and the risks which the company is exposed to, the recommended policies which needs to be set in place and the security measures which the company need to take to ensure its data, information, and systems are safe

Reference no: EM132313961

Questions Cloud

Motivators of money because all the chairpersons : CEO's are not best motivators of money because all the chairpersons of any company mostly they preferred the fame of the company.
More positive work attitudes : Shared Values between employees and the organization lead to more positive work attitudes
Probability of employee satisfaction becoming successful : If a person has a satisfying life outside the workplace, the probability of employee satisfaction becoming successful is greater within the workplace
Positive outcomes increase job satisfaction : Explain and Why does happy positive outcomes increase job satisfaction? Explain, give an Example
Design security policies for a small to medium enterprise : KIT711 - Data Network Security - design and write the security policies for a small to medium enterprise - invent a company based in the IoT
Identify examples of competing values and paradoxical views : Complete the CVF ‘spiderweb' activity and write a reflective commentary with reference to the changes (if any) from your first attempt.
Difference between structural unemployment and cyclical : Explain the difference between structural unemployment and cyclical (or demand deficient) unemployment
Pros and cons of medicaid expansion : List a comprehensive, comparative list of the pros and cons of Medicaid expansion as Chief Financial Officer (CFO) to be reported to the Board of Governors
What is the heckscher-ohlin model : What is the Heckscher-Ohlin model and some of its applications and real life examples?

Reviews

len2313961

5/30/2019 12:52:04 AM

Contains specific, detailed and thorough facts about the topic Contains specific, detailed and thorough facts about the topic Contains specific, detailed and thorough facts about the topic

len2313961

5/30/2019 12:51:49 AM

HD The presentation encouraged me to read this work and the formatting was consistent and nicely designed Summary accurately and succinctly summarizes contents of report or phase deliverables. Introduction contains background information and details a definition, classification and description Analyses key and emerging aspects of the topic

len2313961

5/30/2019 12:51:40 AM

HD Company is very well described and imagined A realistic company that can easily have a security policy written for their needs Well written, good spelling and grammar throughout Very good style, resulting in a professional looking document

len2313961

5/30/2019 12:51:22 AM

This assignment involves each team peer-reviewing three other team’s submissions. This involves marking their submission against the CRA marking rubric (which is included as part of this specification) and providing feedback. After this has been completed, each team will then grade this assessment based on the quality of the feedback and how fair they think the mark was.

len2313961

5/30/2019 12:50:58 AM

The report will have two sections: the first will contain information common to the entire report, such as the threat and risk analysis, while the second section will address specific security issues facing the company. The first section of the report should contain: • an executive summary (~400 words) • an introduction including a description of the assumptions made and extra context for the case study (2-3 pages max) • a threat and a brief risk analysis (2-3 pages) • a definition of the main security goals for the case study’s organisation and an accompanying set of high-level security policies (2-3 pages).

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd