Develop the issp for the organisation

Assignment Help Computer Network Security
Reference no: EM131031736 , Length: word count:2000

Information Security Management-

Objectives- This assessment task can be undertaken in a group of up to 4 members or individually. Each group/student will analyse the given scenario of the organisation, and develop and document the specified Issue Specific Security Policy (ISSP) for the organisation.

Assessment criteria - The students are assessed against their ability to analyse the given scenario and develop the specified ISSP.

The marking criteria for Assessment Item 1 are provided on page 4.Students need to familiarise themselves with the marking criteria to ensure that they have addressed them when preparing the document for this assessment item.

Assessment Task - You are required to analyse the scenario on page 3 and develop the following ISSP for the organisation described in the scenario:

• Access and use of sensitive information of the organisation

The ISSP should include:

1. Statement of Purpose
2. Authorised Uses
3. Prohibited Uses
4. Systems Management
5. Violations of Policy
6. Policy Review and Modification
7. Limitations of Liability

You also need to include a section containing the justification of the contents of your policy as well as any assumptions that you have made.

Note: You need to upload the document containing the ISSP to Moodle. You must follow the Harvard citation and referencing guidelines.

Please do not include an executive summary, a table of contents, an introduction or a conclusion. Please use the ‘Template for Your Answers' Section of this document and upload only that template.

Check the course website at least once a week for further information relating to this assessment task. Please ensure that you write your answers in your own words to avoid possible plagiarism and copyright violation. You can understand the Plagiarism Procedures by following the corresponding link in the CQUniversity Policies section of the Course Profile.

The Scenario for Information Security Management Assessment Tasks

A private company in Australia plans to establish a private nursing school. The main campus of the nursing school is located in a suburb of Sydney and the satellite campuses are located in the suburbs of capital cities of three South East Asian countries. The company has made agreements with a private hospital in each of these locations to provide the internship and training to the students of the nursing school. The main and satellite campuses that are currently being constructed will have modern communication networks suitable for the business.

The lectures, tutorials and laboratory classes conducted in the main campus will form virtual classrooms with the satellite campuses. The students can participate in the virtual classes from within the campus premises or from their homes. More than 100 students are expected to enrol in each location in the first year.

The management of the company plans to help out the wider community by providing a telemedicine and homecare service to the needy patients at their homes. This service covers a radius of about 200km from the main and satellite campuses and will be provided with the help of a mobile team of health personnel.

The mobile team will be able to receive medical advice directly from the medical staff of the hospital in their country as well as the private hospital in Sydney via a virtual consultation room. The hospitals should be able to locate and contact all registered homecare patients. The nursing school should know the location of all their students and staff when they are on duty.

As the company is newly established, the information security policies are yet to be developed.

Reference no: EM131031736

Questions Cloud

Determine the constant for p required to cause the 0.5kg : The slider starts from rest at position 1 and the unstretched length of the spring of modulus k = 250 N/m is 200mm. Neglect friction.
What do you learn about the company hp inc : What do you learn about the company? What areas are changing and may be opportunities for cost control and improved profits?
How much charge is stored on each capacitor : In the figure (Figure 1), if C1=C2=2C3=26.3µF, how much charge is stored on each capacitor when V=47.0V?
Compare existential therapy and psychoanalytic therapy : The paper (6pages) will compare Existential Therapy and Psychoanalytic Therapy (Frued) as it relates to philosophy, key concepts and tenets, stragtegies and technqiues, and goals. Additionally, the paper will include a discussion of the appropriat..
Develop the issp for the organisation : Assessment Task - You are required to analyse the scenario on page 3 and develop the following ISSP for the organisation described in the scenario: Access and use of sensitive information of the organisation
Partial credit for incomplete assignment : Them tell me what future Supreme Court cases cited the Bethel case and tell me why or why not you agree or disagree. I expect at least three pages in order to get credit. I will not give partial credit for an incomplete assignment. The assignment ..
Find the minimum aperture diameter of a camera : Find the minimum aperture diameter of a camera that can resolve detail on the ground the size of a person (1.5m ) from an SR-71 Blackbird airplane flying at an altitude of 26km .
Prepare an individual tax return including all required form : Based on the information presented below, prepare an individual tax return (married filing jointly) including all required forms and schedules for Harry and HenriettaHurricane for 2015.
What is the direction of the acceleration : three forces acting on an object are given by f1=[-2.00i+2.00j]N,f2[5.00i-3.00j]N,f3[-45.0i]N.The object experiences an acceleration of magnitude 3,75 m/s to the power 2

Reviews

Write a Review

Computer Network Security Questions & Answers

  Difference between a private key and a secret key

Explain the difference between a private key and a secret key and describe and explain, at least, seven different physical characteristics

  Users in your organization are concerned about performance

users in your organization are concerned about performance and network security. after a meeting with your

  Evaluate the effect of this ruling on forensic investigation

Evaluate the effect of this ruling on forensic investigations from a forensics standpoint and determine whether or not you would consider this an "open door" for criminal activity. Justify your answer

  Explain the role of intelligence in cyber security

explain the role of intelligence and counterintelligence in cyber security. Your explanation should include both the defensive and offensive aspect; policies that support or interfere; and suggestions, based upon what you have learned in class, t..

  Identify a recently announced security vulnerability

Your task is to identify a recently announced security vulnerability and write a profile of the threat. The profile should contain the name of the threat, the systems it attacks, how it performs its attack and the mitigation strategies.

  Case study incident-response policy-gem infosys

Case Study Incident-Response Policy; Gem Infosys, Gem Infosys, a small software company, has decided to better secure its computer systems after a malware attack shut down its network operations for 2 full days

  Explore traffic behavior when designing a network

Why is it important to explore traffic behavior when designing a network? What problems could arise if you do not understand traffic behavior when you build a new network or upgrade a network?

  What is 128-bit encryption

Most Web browsers now use "128-bit encryption" to exchange data with secure Web sites. But what does this mean. What is "128-bit encryption". In terms of software available to the general public, is "128-bit encryption" the strongest

  How can we determine sle if there no percentage given

How can we determine SLE if there no percentage given? Which method is easier for determining the SLE: - a percentage of value lost or cost per incident

  Time the client issued the initial syn

How long from the time the client issued the initial SYN did it take the server to answer with the SYN-ACK

  Analyze ing solution for providing security

Read the case study titled "ING Life". Analyze ING's solution for providing security to determine if the solution is adequate or inadequate

  An isp has received a block

An ISP has received a block of addresses in which the prefix length (n = 24). The ISP needs to make 8 sub-nets (sub-blocks) of equal sizes from this block. What is the prefix of each sub-block?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd