Develop skills of dealing with new security trends

Assignment Help Management Information Sys
Reference no: EM131327086 , Length:

OBJECTIVES

This assignment is designed to assess students' ability to:

- Analyze the security frameworks challenges, risk and threats.

- Develop skills of dealing with new security trends.

And enhance:

- The student's knowledge through literature review.

- Use of CU Harvard referencing system to cite and reference academic resources

OUTCOME

Students must have an understanding of the following points

1. Critically evaluate Information Security requirements

2. Analyse risk management process.

3. Develop information security baseline(s).

Task 1: Submitting the assignment work proposal

Task 2:

Most organizations these days are moving towards a more technology based environment. Applying risk management frameworks will help to address the incremental risks associated with adopting these developing technologies such as BYOD, Cloud computing and virtualizations. Therefore, as an information security manager choose one of these technologies and:

a. Through two research papers analyse two frame works of Risk Management that can be used for your chosen technology/environment.

b. Through a case study show case the implementation process of risk management in any one of the environments.

Task 3:

Raising awareness is a critical part of the whole risk management process. In your opinion, as an information security officer discuss the different methods and techniques to raise security awareness.

Provide the following information in the report:

TASKS DESCRIPTION AND MARKS DISTRIBUTION

The marks allocation scheme for the assignment is as follows:

Task 1:

Expectation: Submitting the assignment work proposal which includes the student understanding and plan on how to complete the deliverables, which resources to use and the time line.

Task 2:

a. Through two research papers analyse two frame works of Risk Management that can be used for your choosen technology/environment.

Expectation: To define BYOD, cloud or virtualization and discuss two Risk Management frameworks that can be applied to these technologies to avoid risk and threats.

b. Through a case study show case the implementation process of risk management in any one of the environments.

Expectation: Analyse a case study where an organization that is adopting one the technologies has implemented risk management, showcasing the advantages , strengths and weaknesses.

Task 3:

Raising awareness is a critical part of the whole risk management process. In your opinion, as an information security officer discuss the different methods and techniques to raise security awareness.

Expectations: add your own opinion on various techniques and methedolgies to help raise staff awareness of the importance of information security.

- Originality of answer, i.e. writing in your words with some amount of referenced material

- Correct information and presentation in document form

- Adequate referencing and citation provided

- Submitting work proposal which include student solution plan and this will carry 10% of the marks

- Oral Examination/VIVA: Assignment marks are based on the VIVA which will be conducted upon submission of assignment. The VIVA will be based on the tasks given in the assignment. ZERO marks will be awarded to the student if he/she is absent for VIVA.

GUIDELINES

- The report should have 2500 words approximately.

- The document should be well presented and neatly done

- Assignment should be computer typed using Calibri 12 font and the soft copy should be submitted through Moodle, duly checked by TurnItIn to check the similarity of work. Please note the time mentioned above and also go through the Middle East College plagiarism policy given below.

- The report must have a Title Page, table of contents (optional), reference/ bibliography and page number. Every page must have header & footer.

- At least EIGHT references are required which must be referenced by using Harvard Reference System.

- Heading should be with Font Size 14, Bold, and Underline.

- Each student has to do the assignment individually. Please submit one hard copy to myself (during class or office hour) and upload soft copies through Moodle in time.

- You are welcome to discuss about the assignment with the lecturer in his/her office hours.

Verified Expert

The work is in 2500 word in Harvard in MS word where the focus has been on cloud computing and the risks management. it is important to work on the different methods which will improve the security and lead towards the development of the organization.

Reference no: EM131327086

Questions Cloud

Receive contributions to the profit sharing plan : Seth owns 50 percent of SM LLC, where he is the CEO. He turned 70 on May 3rd of this year. He continues to participate in the SM LLC 401(k) plan and receive contributions to the profit sharing plan. Seth must satisfy the minimum distribution rules by..
What drives them as individuals and for what purpose : Does our contemporary landscape reinforce, reject, and/or encourage these characters' relationships/ideas/interactions? In what specific ways? For what purpose?
Prepare analysis of financing strategies you would propose : Based on the company which is Ford Motor Co. that has been selected for your client's investment, prepare an analysis of financing strategies you would propose to pursue your recommendation.
What is a positive feedback mechanism : Explain homeostasis in a way your audience will understand it and why this concept is so crucial to A&P. What is a feedback mechanism and what are its components? What is a positive feedback mechanism? What is a negative feedback mechanism
Develop skills of dealing with new security trends : Information Security Management (COMP 0400) Analyze the security frameworks challenges, risk and threats and develop skills of dealing with new security trends.
Write an essay about the global warming : You have the opportunity to break away from the purely objective stance you were asked to take in your Exploratory Essay and present your own position about your topic.In order to successfully present your position, you must make your stance very ..
What is the economic rationale for the cost approach : What is the economic rationale for the cost approach? Under what conditions would the cost approach tend to give the best value estimate?
Funds at napa sunrise prior to full retirement age for plan : Jerry, who is age 56, was just called into the President’s office at Napa Sunrise, Inc. He just learned that his position has been eliminated in the recent reorganization. While he is devastated, he thinks he may attempt to retire and work on his gol..
Shows an evaluation hsbc relative to a peer bank chosen : Wrtie 2500 words report shows an evaluation HSBC relative to a peer bank chosen as BARCLAYS In london. Down below is a smaple of a similiar project i need it to be done in the SAME WAY.

Reviews

inf1327086

12/27/2016 4:47:08 AM

If two assignments/essays are similar in all aspects then marks will be deducted from both assignments. Your source of information should be mentioned in the reference page clearly. (For example: If it's from book, you have to mention the full details of the book with title, author name, and edition and publisher's name. or if it is from internet you have to mention the correct complete URL) Note: If you have any questions, please ask {during class timings or office hours).

len1327086

12/26/2016 12:35:52 AM

Task 2 A Through two research papers analyse two frame works of Risk Management that can be used for your chosen technology/environm ent. Analyze two research papers where it demonstrates different risk management frameworks with adding the student opinion and analysis Task 2 B Through a case study show case the implementation process of risk management in any one of the environments. 32-35 Analyze a case study showcasing advantages , strengths and weaknesses of the risk mngt implementation . with adding the student opinion and analysis Task 3 In your opinion, as an information security officer discuss the different methods and techniques to raise security awareness.

len1327086

12/26/2016 12:30:21 AM

• The report should have 2500 words approximately. • The document should be well presented and neatly done • Assignment should be computer typed using Calibri 12 font and the soft copy should be submitted through Moodle, duly checked by TurnItIn to check the similarity of work. Please note the time mentioned above and also go through the Middle East College plagiarism policy given below. • The report must have a Title Page, table of contents (optional), reference/ bibliography and page number. Every page must have header & footer. • At least EIGHT references are required which must be referenced by using Harvard Reference System. • Heading should be with Font Size 14, Bold, and Underline. • Each student has to do the assignment individually. Please submit one hard copy to myself (during class or office hour) and upload soft copies through Moodle in time. • You are welcome to discuss about the assignment with the lecturer in his/her office hours.

Write a Review

Management Information Sys Questions & Answers

  Describe the delphi technique used to identify risks

Examine the four (4) types of risk response (i.e., avoidance, acceptance, transference, and mitigation) and determine the appropriate situation where each should be used.

  Impact of using a wiki for teaching an information system

What is a specific impact of using a WIKI for teaching an Information System? What problems do you see happening if a WIKI is used for this

  Piracy and software

Most computer software carries a warning against copying, yet many people feel the warning is unreasonable.

  Strategic role of logistics and supply chain

strategic role of logistics and supply chain analysisprepare a paper defining logistics and discussing its strategic

  Analyze potential concerns for data loss

Analyze three (3) potential concerns for data loss and data theft that may exist in the documented network. Explicate the potential impact of the three (3) selected concerns for data loss and data theft

  Definition of portable input device

Your hospital system has decided to purchase portable input devices for use by clinical personnel to document care at the bedside or diagnostic areas. Definition of portable input device

  It may be more helpful to think of all media in terms of a

it may be more helpful to think of all media in terms of a mix of attributes. what does this mean? how does this

  Who is ultimately responsible for managing a technology

What are the differences between a policy, a standard, and a practice? What are the three types of security policies? Where would each be used? What type of policy would be needed to guide use of the Web? E-mail? Office equipment for personal use?

  What is the eoq for given item

What is the EOQ for this item? -  What is the total inventory management cost for this item?-  What is the investment cost for the item?

  Erp systemhow do you adapt a corporate-wide system such as

erp systemhow do you adapt a corporate-wide system such as erp for your department leaders?do you feel a department is

  Definition of procurement and contract management

A research paper about the field of project management and how it relates to purchasing and supply management

  Compute the amounts cash collected from clients

Compute the amounts Cash collected from clients during the year and cash paid for advertising expense

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd