Develop and manage a security policy

Assignment Help Other Subject
Reference no: EM132420488

Task

Assignment Two is comprised of two parts and your report should be no more than 5 pages excluding the cover page, table of contents and references.

Part One

Plan, Develop and Manage a Security Policy

Background:

Consider that the Commonwealth Government of Australia is planning to launch ‘My Health Record' a secure online summary of an individual's health information. The system is available to all Australians, My Health Record is an electronic summary of an individual's key health information, drawn from their existing records and is designed to be integrated into existing local clinical systems.

The ‘My Health Record' is driven by the need for the Health Industry to continue a process of reform to drive efficiencies into the health care system, improve the quality of patient care, whilst reducing several issues that were apparent from the lack of important information that is shared about patients e.g. reducing the rate of hospital admissions due to issues with prescribed medications. This reform is critical to address the escalating costs of healthcare that become unsustainable in the medium to long term.

Individuals will control what goes into their My Health Record, and who is allowed to access it. An individual's My Health Record allows them and their doctors, hospitals and other healthcare providers to view and share the individual's health information to provide the best possible care.

The 'My Health Record' is used by various staff such as System Administrator, Doctor, Nurse, Pathologist and Patient. In order to convey and demonstrate the rules and regulations to the users of this system, Commonwealth Government of Australia needs a security policy.

You are employed as the Security Advisor for the organisation. The task that is handed to you by the Chief Information Officer now is to create, develop and manage "System Access Security Policy" for atleast any 3 users of the system.

Complete the following in your security policy:

Plan System Access Security Policy
Develop System Access Security Policy
Manage System Access Security Policy

Part Two

Conducting a Risk Assessment

You will be given a list of organisation in week 3 by your lecturer and you can select any one organisation from them. The organisation uses various IT systems for its daily operations. Assume that you are appointed as an IT Systems Auditor for the chosen organisation and you are asked to provide a risk register must come up for the IT systems in the organisation.

A brief introduction of the organisation and the IT systems
Identify and explain any major risk in the IT systems components
Discuss the consequences of the risk
Inherent risk assessment, that is the assessed, raw/ untreated risk inherent in a process or activity without doing anything to reduce the likelihood or consequence
Mitigate the risk

Residual risk assessment, that is the assessed, risk in a process or activity in terms of likelihood and consequence after controls are applied to mitigate the risk.

Create a Risk Register based on the risks identified in the IT systems and prioritise of the risk using a standardised framework such as the ANSI B11.0.TR3

Risk Assessment Matrix
Given the fact there is no clear prioritisation framework NOR risk appetite framework, the risk register is your professional assessment of the likelihood and consequence of the risks you identify. When preparing your risk register you should think carefully about the assets the chosen organisation may have and how these may be compromised from the perspective of Information Security.

Presentation

When submitting your assignment be sure to meet the following presentation requirements:

Only Word format (.doc, or .docx) must be submitted as a single document.
Assignment should be typed using Font Style: Arial/Times New Roman, Size: 12, Spacing: 1.5.
Please use APA referencing style where appropriate.
All diagrams that are required should be inserted into the document in the appropriate position.

Reference no: EM132420488

Questions Cloud

Calculate the price of the house in 1812 : Mark and Ann Kington bought their home for $2.5 million in 2000, the house was listed for sale in April 2018 for $8.5 million. With a growth rate of 7.04%,
Record keeping requirements for a business in australia : 1. What are the record keeping requirements for a business in Australia?
What is corpus : What is a corpus? What is a caveat of IDF? How does TFIDF address the problem? Name three benefits of using the TFIDF.
Calculate selina net tax payable-refundable : During the 2017/18 tax year, Selina Matterson (a single resident taxpayer, aged 41) has the following receipts:
Develop and manage a security policy : Plan, Develop and Manage a Security Policy and Conducting a Risk Assessment - Create, develop and manage "System Access Security Policy"
What are three challenges to performing text analysis : What is the value of performing text analysis? How do companies benefit from this exercise? What are three challenges to performing text analysis?
What is an income statement for smithson corporation : 1) What is an income statement for Smithson Corporation for the year ending December 31, 20X3.
Implemented is important to secure concerned environment : The textbook introduced you to types of physical security barriers, how these are assessed and implemented is important to secure concerned environment.
How characterize justin paperny in terms of moral awareness : Do you think that he was a victim of the some of the societal values inherent in American Corporate Capitalism? Why or why not?

Reviews

Write a Review

Other Subject Questions & Answers

  Research the history of cascading style sheets

Identify and discuss the primary agency responsible for developing and publishing CSS standards. Identify and discuss two tools that can be used to ensure CSS syntax complies with CSS standards. Substantiate statements of fact made in the discussion ..

  What client characteristics for group counselling

What client characteristics (or other factors) would you consider as reasons for NOT recommending group counselling to a client

  Why banning the use of cell phones

Why banning the use of cell phones while driving should be mandatory nationwide.What I see as the biggest challenges young adults face today.

  Assumptions of behavioral versus cognitive approaches

How do the theoretical assumptions of behavioral vs. cognitive approaches compare when designing interventions to change health behaviors of families/aggregates?

  Discuss factories for a wide array of manufactured goods

Most other areas of North America depended on its factories for a wide array of manufactured goods

  Identify and explain three major long term failure issue

SEM401 Materials Performance and Durability - Identify and explain three major long term failure issues and mechanisms when SS316 is used

  How does this relationship differ for men and for women

What is the basic point the authors are making? How does marriage improve people's well-being? How does this relationship differ for men and for women

  Describe the operations of your business

Describe the operations of your business. Are you going to be an integral part of the day-to-day operations? What will your role be in the company

  Analyze ethical considerations associated with maintenance

Janice was hired by Dream Massage to be a massage therapist. She is engaged as an independent contractor and, therefore, receives no tax withholding.

  Behavioral interventions-needs of children with autism

Being that are so many different ways you can go with this topic. "Are behavioral interventions effective for addressing the comprehensive needs of children with autism?"

  Where do you see the trends going in the future

Are these trends uniquely different for ancillary services vs. inpatient services? Where do you see these trends going in the future and why?

  Describe the process you took to conduct the research

Describe the process you took to conduct the research. Discuss how you determined what sources to use. Describe the next steps to take to make the annotated bibliography a functioning literature review.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd