Develop the cybersecurity policy and procedures

Assignment Help Computer Engineering
Reference no: EM133855975 , Length: word count:1500

Assessment - Case Study Report

Introduction
In this individual assessment, you will develop the cybersecurity policy, procedures, or guidelines for an organisation. Your findings should be delivered in a written report. For the given case study (below) write the Data Security and Privacy Policy for the case study presented below. Use an appropriate template to complete the report as shown in the report structure section.

Report Structure
Use an appropriate policy template. For Example:
CONTENTS
PURPOSE
SCOPE
POLICY STATEMENT
<Sub-headings are not numbered>
PROCEDURE
<Sub-headings are not numbered>
RESPONSIBILITIES

Compliance, monitoring and review Reporting
Records management
DEFINITIONS
Terms and definitions <delete if not required>
RELATED LEGISLATION AND DOCUMENTS
FEEDBACK
APPROVAL AND REVIEW DETAILS
APPENDIX <or APPENDICES> <delete if not required>

Case Study
Young Minds Secondary College (YMSC) is a private Australian secondary school that has been operating for several years, developing innovative programs for its students. Its staff has grown from 15 to 120 and the school enrols 700 students across level 7 to 12. YMSC has been growing steadily over the past 10 years. They have built strong relationships with the community and parents tend to send all their children to the school as well as recommending it to other parents. The owners anticipate continued growth and are planning to purchase another school to set up another campus.

YMSC is owned and operated by a group of parents who originally wanted to create an alternative education for their children. Their children have since finished school but the school was so successful in growth and is now managed by Joline Schack. The school's IT facilities have grown along with the school, and it now employs 2 full time staff (Tim and Abishek to keep the system running, as along with a program coordinator, Carol, who assists teachers to incorporate computing within their programs).
Joline can foresee a time in the near future where they employ over 300 people across two campuses. Their staff are mostly teachers, though the school does have a Human Resources manager, and Accounts Manager, several administrative assistants (receptionist, office manager, secretary), and grounds staff. Get Professional Assignment Help Service Now!

You have very recently been contracted to solve an area of concern to the owners - information security. The school's security measures have been developed in a largely uncoordinated fashion and it has been suggested by Joline that information security could threaten the survival of the school. You have been given access to all staff for assistance in determining the security needs for YMSC.

In fact, it is Joline that has initiated your hiring. She encountered a little resistance from current ICT staff, arguing that continuing with the current approach is satisfactory. That approach has been one without a formal policy where security has been built in an ad-hoc, piecewise manner.

They would both say that the current policy has worked well enough up to now, thanks to the knowledge and expertise within the team.

Joline would like to have Tim more onside with the structured and formal approach that you will bring. In an attempt to get that support, Joline has asked you to begin your role with YMSC by developing a report that discusses how information security could be better managed by YMSC.

While this report will largely be about general principles, she would also like you to go into detail on one specific issue as a means of further demonstrating the usefulness of your formal approach. She would like you to go into detail about a development that both she and Tim are very concerned about, problems that will be introduced by opening a second campus. You have decided that you will choose one aspect of that development and draw up a Risk Management Plan for it and include a recommendation based on a Cost-Benefit Analysis.

The Young Minds Secondary College Mission Statement
YMSC believes in providing students with an innovative educational program in a secure and modern educational environment. Hardware and Software

The school currently uses commercial applications products for its processes. This includes a learning management system (Moodle), MSOffice, accounts and finance (Business One), a VOIP telephone system internally and several mobile phones for staff use. The school has a LAN infrastructure and it uses Wi-Fi throughout the campus. All employees that require regular access to school systems are supplied with a desktop laptop - depending on their needs. Students must have their own laptop or notebook and can access the school's network through the Wi-Fi system. Some of the school's systems need to be accessed from off campus. The school does have a print and file servers. All data for school management is backed up to cloud services provided by a local ICT provider. Email has been contracted to Microsoft.

You can envision other hardware, software, and information/data management procedures as you deem appropriate.

Reference no: EM133855975

Questions Cloud

Explain your rationale for applying accounting principle : Apply the most relevant accounting principle from GAAP to each business transaction. Explain your rationale for applying each accounting principle.
Design and implement a relational database management : MBIS403 Data Modelling and Database Development, Canterbury Institute of Management (CIM) - design and implement a relational database management system (RDBMS)
How does this difference advance the field of psychology : Which epoch do you believe to be the most significantly different from the one immediately prior? Why? How does this difference advance the field of psychology?
Analyze the effect on trade balance and employment growth : Analyze the effect on the trade balance, employment, and economic growth. What are the arguments for and against trade barriers in your chosen country?
Develop the cybersecurity policy and procedures : Developing a report that discusses how information security could be better managed by YMSC - determining the security needs for YMSC
What steps will you take to improve leadership competencies : What steps will you take to improve your leadership competencies? What steps will you take to improve your leadership competencies?
Identify the specific reasons why a problem is a problem : The point of this is force you to see both sides of an issue, help you identify the specific reasons why a problem is a problem for others.
What do you think was single biggest mistake made by aseel : What do you think was the single biggest mistake made by Aseel? Could Aseel or Defendant have done anything to have avoided the problem, if there was one?
Describe the Idaho Code of Ethics : Describe the Idaho Code of Ethics, its importance to law enforcement personnel, and where it can be accessed.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd