Develop a security policy

Assignment Help Other Subject
Reference no: EM132929123 , Length: 4000 Words

Assessment item - Develop a Security Policy

TASK

Read the DR Alarms case study document before attempting this assignment.

You are an ICT Security and Risk consultant and you have been approached by DR Alarms to help them recover from a cyber-attack. You have successfully isolated the machines affected by the attack and brought the company's system back into operation.

You have now completed a risk assessment for DR Alarms, and in your discussions with the Managing Director (MD) have indicated that they need a policy to protect their data and their Intellectual Property (IP) around their ICS and IoT monitoring systems. The MD has indicated that he thinks this is "being a bit excessive" and will "cost more than it's worth".

The company is the in process of developing some new IoT monitoring systems that have attracted considerable interest from some major industrial companies in Australia and overseas. The Engineering Manager is concerned about the designs for these new devices being stolen or hacked, but the MD still thinks that the company is too small to attract that sort of attention. However, one of the government organisations that intends to purchase the new IoT devices has asked the Engineering Manager to describe their level of cyber security maturity.

The DR Alarms MD is still not entirely convinced that this is necessary, but wants you to develop a proposal for some security policies, just in case they win a government contract.

Tasks:

You have been contracted by DR Alarms to discuss and propose security policies to protect their data and resources in view of their existing risk assessment.

1. Write a proposal for DR alarms that discusses:
a. The need for security policies at DR Alarms. The discussion should include how these policies (as outlined in Q1b.) will enhance DR Alarms security and help to raise their level of cyber security maturity,
b. Outline the following security policies:
1. A security policy that would act to preserve the Confidentiality,
Integrity and Availability of their data,
2. A security policy that would act to protect their data centre resources, and
3. A security policy that would act to educate DR Alarms staff in how they can protect the company's data and resources.
As part of the outline for each security policy your proposal should discuss:
a. The intent and rationale and scope of the policy,
b. The mandatory requirements for the rules or actions that you think are reasonable to place into this policy to meet its intent and rationale,
c. Any exemptions that you think are reasonable to place into this policy to meet its intent and rationale.
The reference list is not counted as part of the word count.

RATIONALE
This assessment task will assess the following learning outcome/s:
• be able to justify the goals and various key terms used in risk management and assess
IT risk in business terms.
• be able to apply both quantitative and qualitative risk management approaches and to compare and contrast the advantages of each approach.
• be able to critically analyse the various approaches for mitigating security risk, including when to use insurance to transfer IT risk.

PRESENTATION
When submitting your assignment be sure to meet the following presentation requirements:
• Assignments are required to be submitted in either Word format (.doc, or .docx), Open
Office format (.odf), or Rich Text File format (.rtf) format. Each assignment must be submitted as a single document.
• Assignments should be typed using a 12 point font.
• This assignment should be referenced using the APA 7th format.
• The reference list is not counted as part of the word count.

Word Count: 4000 words

Reference no: EM132929123

Questions Cloud

What the weight of ball corporation in portfolio is : What the weight of Ball Corporation in your portfolio is? uppose you invest $15,000 by purchasing 200 shares of Abbott Labs (ABT)
Constitution and court system : How does the Constitution grant authority to the government to regulate business? What is the system of federalism?
Find what the total value of the portfolio is : Find what the total Value of the portfolio is? You have $100,000 invested in Stock A, $250,000 in Stock B, and $150,000 invested in Stock C.
What is the company total cost of issuing the securities : The company's share price increased to $83 on the first day. What is the company's total cost of issuing the securities
Develop a security policy : Discussion should include how these policies (as outlined in Q1b.) will enhance DR Alarms security and help to raise their level of cyber security maturity
Internalize the persuasive nature of management : 1.internalize the persuasive nature of management and relate it to the social groups and the neighboring pillars
Describe the performance independence : 1.help analyze the strict limit allocation operations by the ministry to the exchequer management reinforcement
What share price would expect based on estimate : If Coca-Cola's equity cost of capital is 8%, what share price would you expect based on your estimate of the dividend growth rate?
How would you advise John to improve his approach : But when profits are low, he spends many hours analyzing the differences. How would you advise John to improve his approach to variance analysis

Reviews

Write a Review

Other Subject Questions & Answers

  Person-situation controversy and reciprocal determinism

Using knowledge of both the person-situation controversy and reciprocal determinism, explain why the variability of Tonya's behavior in different situations

  How would cramming effect retrieval

How would cramming effect retrieval? What is one technique that each friend could use to help improve memory and prepare for the exam?

  Explain your position on the consumption of marijuana

Explain your position on the consumption of marijuana, providing reasoning on why you hold Ge poop o, not you do, and what impacts your position would have on society.

  How does patient safety relate to evidence based practices

Choose one of the national patient safety initiatives identified by The Joint Commission or AHRQ. How does patient safety relate to evidence based practices

  Principles of social structure and personality perspective

Review the three principles of social structure and personality perspective. How do scholars from this perspective see society affecting interaction among individuals? Minimum of 300 words

  Explain brief history of civil rights in the united states

Explain in 300 words a brief history of civil rights in the United States. Explain in 300 words a brief history of human rights in the United States.

  What role does differential reinforcement play

What is an example of a behavior that may require shaping? What role does differential reinforcement play

  How might insufficient or excessive amounts of proteins

How might insufficient or excessive amounts of proteins, carbohydrates, fats, or fiber contribute to health or illness? Provide examples.

  What common patterns of behavior and methods

What common patterns of behavior and methods can you identify across regions and movements

  How would you modify trader joe strategy moving forward

What are the key sources of Trader Joe's competitive advantage? What are the main threats to Trader Joe's competitive advantage? Is their advantage sustainable? How would you modify Trader Joe's strategy moving forward

  Define what is the ml per hour ordered flow rate

What is the mL per hour ordered flow rate for this solution

  Synthesize your research and create two arguments

Synthesize your research and create two arguments: one for and one against parents with intellectual disabilities raising children.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd