Develop skills of dealing with new security trends

Assignment Help Management Information Sys
Reference no: EM131327086 , Length:

OBJECTIVES

This assignment is designed to assess students' ability to:

- Analyze the security frameworks challenges, risk and threats.

- Develop skills of dealing with new security trends.

And enhance:

- The student's knowledge through literature review.

- Use of CU Harvard referencing system to cite and reference academic resources

OUTCOME

Students must have an understanding of the following points

1. Critically evaluate Information Security requirements

2. Analyse risk management process.

3. Develop information security baseline(s).

Task 1: Submitting the assignment work proposal

Task 2:

Most organizations these days are moving towards a more technology based environment. Applying risk management frameworks will help to address the incremental risks associated with adopting these developing technologies such as BYOD, Cloud computing and virtualizations. Therefore, as an information security manager choose one of these technologies and:

a. Through two research papers analyse two frame works of Risk Management that can be used for your chosen technology/environment.

b. Through a case study show case the implementation process of risk management in any one of the environments.

Task 3:

Raising awareness is a critical part of the whole risk management process. In your opinion, as an information security officer discuss the different methods and techniques to raise security awareness.

Provide the following information in the report:

TASKS DESCRIPTION AND MARKS DISTRIBUTION

The marks allocation scheme for the assignment is as follows:

Task 1:

Expectation: Submitting the assignment work proposal which includes the student understanding and plan on how to complete the deliverables, which resources to use and the time line.

Task 2:

a. Through two research papers analyse two frame works of Risk Management that can be used for your choosen technology/environment.

Expectation: To define BYOD, cloud or virtualization and discuss two Risk Management frameworks that can be applied to these technologies to avoid risk and threats.

b. Through a case study show case the implementation process of risk management in any one of the environments.

Expectation: Analyse a case study where an organization that is adopting one the technologies has implemented risk management, showcasing the advantages , strengths and weaknesses.

Task 3:

Raising awareness is a critical part of the whole risk management process. In your opinion, as an information security officer discuss the different methods and techniques to raise security awareness.

Expectations: add your own opinion on various techniques and methedolgies to help raise staff awareness of the importance of information security.

- Originality of answer, i.e. writing in your words with some amount of referenced material

- Correct information and presentation in document form

- Adequate referencing and citation provided

- Submitting work proposal which include student solution plan and this will carry 10% of the marks

- Oral Examination/VIVA: Assignment marks are based on the VIVA which will be conducted upon submission of assignment. The VIVA will be based on the tasks given in the assignment. ZERO marks will be awarded to the student if he/she is absent for VIVA.

GUIDELINES

- The report should have 2500 words approximately.

- The document should be well presented and neatly done

- Assignment should be computer typed using Calibri 12 font and the soft copy should be submitted through Moodle, duly checked by TurnItIn to check the similarity of work. Please note the time mentioned above and also go through the Middle East College plagiarism policy given below.

- The report must have a Title Page, table of contents (optional), reference/ bibliography and page number. Every page must have header & footer.

- At least EIGHT references are required which must be referenced by using Harvard Reference System.

- Heading should be with Font Size 14, Bold, and Underline.

- Each student has to do the assignment individually. Please submit one hard copy to myself (during class or office hour) and upload soft copies through Moodle in time.

- You are welcome to discuss about the assignment with the lecturer in his/her office hours.

Verified Expert

The work is in 2500 word in Harvard in MS word where the focus has been on cloud computing and the risks management. it is important to work on the different methods which will improve the security and lead towards the development of the organization.

Reference no: EM131327086

Questions Cloud

Receive contributions to the profit sharing plan : Seth owns 50 percent of SM LLC, where he is the CEO. He turned 70 on May 3rd of this year. He continues to participate in the SM LLC 401(k) plan and receive contributions to the profit sharing plan. Seth must satisfy the minimum distribution rules by..
What drives them as individuals and for what purpose : Does our contemporary landscape reinforce, reject, and/or encourage these characters' relationships/ideas/interactions? In what specific ways? For what purpose?
Prepare analysis of financing strategies you would propose : Based on the company which is Ford Motor Co. that has been selected for your client's investment, prepare an analysis of financing strategies you would propose to pursue your recommendation.
What is a positive feedback mechanism : Explain homeostasis in a way your audience will understand it and why this concept is so crucial to A&P. What is a feedback mechanism and what are its components? What is a positive feedback mechanism? What is a negative feedback mechanism
Develop skills of dealing with new security trends : Information Security Management (COMP 0400) Analyze the security frameworks challenges, risk and threats and develop skills of dealing with new security trends.
Write an essay about the global warming : You have the opportunity to break away from the purely objective stance you were asked to take in your Exploratory Essay and present your own position about your topic.In order to successfully present your position, you must make your stance very ..
What is the economic rationale for the cost approach : What is the economic rationale for the cost approach? Under what conditions would the cost approach tend to give the best value estimate?
Funds at napa sunrise prior to full retirement age for plan : Jerry, who is age 56, was just called into the President’s office at Napa Sunrise, Inc. He just learned that his position has been eliminated in the recent reorganization. While he is devastated, he thinks he may attempt to retire and work on his gol..
Shows an evaluation hsbc relative to a peer bank chosen : Wrtie 2500 words report shows an evaluation HSBC relative to a peer bank chosen as BARCLAYS In london. Down below is a smaple of a similiar project i need it to be done in the SAME WAY.

Reviews

inf1327086

12/27/2016 4:47:08 AM

If two assignments/essays are similar in all aspects then marks will be deducted from both assignments. Your source of information should be mentioned in the reference page clearly. (For example: If it's from book, you have to mention the full details of the book with title, author name, and edition and publisher's name. or if it is from internet you have to mention the correct complete URL) Note: If you have any questions, please ask {during class timings or office hours).

len1327086

12/26/2016 12:35:52 AM

Task 2 A Through two research papers analyse two frame works of Risk Management that can be used for your chosen technology/environm ent. Analyze two research papers where it demonstrates different risk management frameworks with adding the student opinion and analysis Task 2 B Through a case study show case the implementation process of risk management in any one of the environments. 32-35 Analyze a case study showcasing advantages , strengths and weaknesses of the risk mngt implementation . with adding the student opinion and analysis Task 3 In your opinion, as an information security officer discuss the different methods and techniques to raise security awareness.

len1327086

12/26/2016 12:30:21 AM

• The report should have 2500 words approximately. • The document should be well presented and neatly done • Assignment should be computer typed using Calibri 12 font and the soft copy should be submitted through Moodle, duly checked by TurnItIn to check the similarity of work. Please note the time mentioned above and also go through the Middle East College plagiarism policy given below. • The report must have a Title Page, table of contents (optional), reference/ bibliography and page number. Every page must have header & footer. • At least EIGHT references are required which must be referenced by using Harvard Reference System. • Heading should be with Font Size 14, Bold, and Underline. • Each student has to do the assignment individually. Please submit one hard copy to myself (during class or office hour) and upload soft copies through Moodle in time. • You are welcome to discuss about the assignment with the lecturer in his/her office hours.

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd