Develop specified issue specific security policy

Assignment Help Management Information Sys
Reference no: EM131021823 , Length: word count:2000

Information Security Management - Australia

Objectives

This assessment task can be undertaken in a group of up to 4 members or individually. Each group/student will analyse the given scenario of the organisation, and develop and document the specified Issue Specific Security Policy (ISSP) for the organisation.

Assessment Task

You are required to analyse the scenario on page 3 and develop the following ISSP for the organisation described in the scenario:

- Access and use of sensitive information of the organisation

The ISSP should include:
1. Statement of Purpose
2. Authorised Uses
3. Prohibited Uses
4. Systems Management
5. Violations of Policy
6. Policy Review and Modification
7. Limitations of Liability

You also need to include a section containing the justification of the contents of your policy as well as any assumptions that you have made.

The Scenario for Information Security Management

Assessment Tasks

A private company in Australia plans to establish a private nursing school. The main campus of the nursing school is located in a suburb of Sydney and the satellite campuses are located in the suburbs of capital cities of three South East Asian countries. The company has made agreements with a private hospital in each of these locations to provide the internship and training to the students of the nursing school. The main and satellite campuses that are currently being constructed will have modern communication networks suitable for the business.

The lectures, tutorials and laboratory classes conducted in the main campus will form virtual classrooms with the satellite campuses. The students can participate in the virtual classes from within the campus premises or from their homes. More than 100 students are expected to enrol in each location in the first year.

The management of the company plans to help out the wider community by providing a telemedicine and homecare service to the needy patients at their homes. This service covers a radius of about 200km from the main and satellite campuses and will be provided with the help of a mobile team of health personnel.

The mobile team will be able to receive medical advice directly from the medical staff of the hospital in their country as well as the private hospital in Sydney via a virtual consultation room. The hospitals should be able to locate and contact all registered homecare patients. The nursing school should know the location of all their students and staff when they are on duty.
As the company is newly established, the information security policies are yet to be developed.

Word count - 2000

Reference no: EM131021823

Questions Cloud

How does the decision in this case impact the validity : Cite and include on the reference page at least 3 peer-reviewed sources. Use sources from this course (text, readings), Library, or appropriate articles from the internet.
What is the encryption algorithm : What is the encryption algorithm? How secure is it?
Loss of revenue due to employee theft : Erosion can be explained as the: A. additional income generated from the sales of a newly added product. B. loss of current sales due to a new project being implemented. C. loss of revenue due to employee theft. D. loss of revenue due to customer the..
Following transactions have not been journalized for july : In addition, the following transactions have not been journalized for July. The cost of all merchandise sold was 65% of the sales price.
Develop specified issue specific security policy : Analyse the given scenario of the organisation, and develop and document the specified Issue Specific Security Policy (ISSP) for the organisation.
Modify movebug so that if the bug can not move : Write a method named moveBug that takes a bug as aparameter and invokes move. Test your method by calling it from main. Modify moveBug so that it invokes canMove and moves the bug only ifit can.
Explain the functionality of a firewall and give an example : Explain the functionality of a firewall and give an example of a firewall. 200 word response. Describe a Network Address Translation (NAT). Provide an example of NAT.200 word response.
Defining the rights of management and unions : Use at least three references from outside the course material, one reference must be from EBSCOhost. Text book, lectures, and other materials in the course may be used, but are not counted toward the three reference requirement.
How many of these people are unemployed : Suppose that in a hypothetical economy there are 400 people who have jobs and 100 people who are at least 16 years old that do not have jobs. Given this information, how many of these people are unemployed

Reviews

Write a Review

Management Information Sys Questions & Answers

  Differences of blackberry wireless pda and raid

differences of blackberry wireless pda and raid echnologydescribe some of the features of the blackberry and what sets

  Non-it managers inputs on technology

Non-IT Managers' Inputs on Technology - identify technology that will help the business meets its goals

  Case study analysisi need help answering the following

case study analysisi need help answering the following questions to this scenarioscenario the missing data data

  Risk management of a large pharmaceutical company

ERP and the 9-step model as VP of a pharmaceutical company - I need your opinion on this: You are the Vice President of Enterprise Risk Management of a large pharmaceutical company. You are in Bermuda on vacation.

  Question about information systems managementexplain the

question about information systems managementexplain the concept of web services. how will they effect businesses in

  Explain the purpose and the makeup

Explain the purpose and the makeup (which type of employees) that make up each sub team

  Outline the id3 algorithm for constructing a decision tree

How the clusters are represented - how the probabilities are used to construct the local models and draw the decision tree after this initial split, and include at each node of the tree the new subset of examples that need to be split, or if the no..

  Computer information systems and management

computer information systems and management metricsquestions on computer information system. write a paper on with

  What happened to the great artists of the 18th century

Sample Question: Technology - What ever happened to the great artists of the 18th and 19th century or the early 20th century for that matter.

  Technology advancements and written business

technology advancements and written business correspondencetechnology has made the process of communication both easier

  Mobile devices and outsourcing

Mobile devices and Outsourcing

  Two-dimensional table

What requirements must a two-dimensional table satisfy in order to be a relation? Provide an example of a table that is a relation

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd