Develop contingency plans to complement the risk assessment

Assignment Help Management Information Sys
Reference no: EM131952389

Enterprise Information Security Assignment: Contingency Planning

Length: Maximum of 2000 words (excluding cover page and references).

Purpose of this assignment:

The purpose of this assignment is to support the following Learning Outcomes (LO) for this topic:

1: Understand the purpose and context of a range of typical business information systems.

2: Understand the importance of securing the information of an organisation.

3: Recognise the security issues associated with the integration of various information systems within an enterprise.

4: Understand the principles of computer security.

5: Analyse security risks and prepare information and computer security plans. LO6: Prepare and present consultant's reports on aspects of computer security. LO7: Critically analyse publications in the area of computer security.

Case Study:

Megacorp, a subsidiary of Generico Inc., have hired you to undertake a full risk assessment of their current security posture as they prepare to move to operating on a multinational scale. Megacorp currently processes and stores financial and client data in-house, with cloud services for operational usage and productivity.

Staff work on Windows desktops, with an ad hoc patching cycle. There is also a backup system for the legacy in-house Windows servers, although the details of how this is configured is unknown as the System Administrator responsible for this process has recently left the company and did not leave any documentation on this. Megacorp use an old storage room as their server room, as the legacy software sometimes requires easy physical access to the servers running them for maintenance. The office is open-plan, and staff are encouraged to get up and move around during the day. The cloud system is used mainly for document collection, although there is not a mandated service specified by the company.

Task:

Based upon your risk assessment and risk register from Assessment, you must now develop contingency plans to complement the risk assessment. This assessment is designed to demonstrate your ability to assess the potential impact of security incidents on a business and to develop suitable contingency plans for managing the risks to the business.

The contingency planning document, based upon your risk assessment and risk register from Assessment 1 should include:

- Impact Analysis of major threats
- Continuity Planning Measures, with respect to operations at the three organisational levels:

o Strategic
o Tactical
o Operational

Remember that this second assessment forms the basis for the Assessment 3 and therefore should be as complete as possible.

Report Requirements:

Must Contain Cover/Title Page

This must contain the topic code and title, assignment title, your name and student identification, due date.

Table of Contents

This must accurately reflect the content of your report and must be generated automatically in Microsoft Word with page numbers.

Introduction

A brief outline of what the document includes, how it is structured, and how you approached the contingency plan development.
Main content - Impact analysis and broad contingency plan areas

You should structure this under appropriate headings.

References

A list of end-text references formatted according to the Flinders APA Referencing (2017) (PDF 95KB) requirements. It is recommended that Endnote is used to manage references. Your references should comprise of books, journal articles, and conference papers.

Format

This report should be no more than 2,000 words (excluding cover page, references and diagrams) and labelled as <COMP9721_your studentid_your studentlastname_studentfirstname>.docx and should be in a single file. Your assignments must be word-processed and the diagrams be developed using graphics software (most word-processors provide this facility). The text must be no smaller than 12pt and font Times New Roman.

Reference no: EM131952389

Questions Cloud

What are some reasons for and against contracting out : What are some reasons for and against contracting out? Additionally, what are reasonable items to contract out? Please please help
Identify the implied premise in the enthymeme example : Use the internet to search an example of an enthymeme in the media (e.g., Internet, television, radio, newspapers, etc.).
Difference between neuroplasticity and learning : What is the difference between neuroplasticity and learning and what changes in the nervous system are typically associated with activation
What are the most important aspects of apple program : In your opinion, what are the most important aspects of Apple's program? Would you make any changes or modifications?
Develop contingency plans to complement the risk assessment : Based upon your risk assessment and risk register from Assessment, you must now develop contingency plans to complement the risk assessment.
How did the regulators behave throughout the event : WCAS - Economics of Banking and Insurance Assignment - Insurance Companies and Regulatory Environment. How did the regulators behave throughout the event
Was the complaint resolved to your satisfaction : Reflect on the last time that you complained to the manager of a store, restaurant, or other business about something that dissatisfied you.
How can firms best ensure that their code of business : How can firms best ensure that their code of business ethics is read, understood, believed, remembered, and acted on, rather than ignored?
Describe the basic concept behind strategic alliances : Describe the basic concept behind strategic alliances. In what ways can strategic alliances facilitate a firm's quest for quality?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Create a use case graphic rendering that shows all actors

Create a use case graphic rendering that shows all actors and all use cases for the RMO CSMS marketing subsystem.

  Describe what items the it department should be prepared

Need a IT/Business professional to provide a Strawman document The strawman document should identify the tasks needed for the IT department to support the rollout of a new system. IT should Outline and describe what items the IT department should ..

  Create a brochure advertising

Brochure In this writing assignment, you will create a brochure advertising your services as a data repository. Research commercial data repositories

  Explain what is meant by information technology

Explain what is meant by information technology (IT). Explain what is meant by information systems (IS). Why is it important to understand the differences between information technology (IT) and information systems (IS)?

  How has social media empowered individuals

For this assignment You want to write an original two to four page essay (1000 to 1500 words) on the following topic:

  Explain about the sdlc steps

First part of the paper explain about the SDLC steps and explain whether it is system development life cycle or software development life cycle.

  What factors contributed to linking these stakeholders

What factors contributed to linking these stakeholders with the city of Kelsey through information technology?What factors are taken into consideration when determining needs for software?What are the benefits and risks of implementing information te..

  How can ehr systems reduce cost and increase quality of care

How can EHR systems reduce cost and increase quality of care and Why has EHR adoption been so slow? Why did the early systems fail

  Introduction to programming for mobile applications

Introduction to Programming for Mobile Applications

  Discuss the evolution of information systems

Discuss the evolution of information systems in an organization. How can the use of ERP systems remove information or functional silos in organizations?

  Major goals for the information technology strategic plan

Develop at least five (5) major goals for the information technology strategic plan. Justify your response. Speculate on three (3) positive organizational impacts of implementing the strategic plan. Justify your response

  How the enigma machine has changed the world of security

Explain how the Enigma machine has changed the world of security to this day. choose one other scholarly reference to support your discussion.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd