Develop the issp for the organisation

Assignment Help Computer Network Security
Reference no: EM131031736 , Length: word count:2000

Information Security Management-

Objectives- This assessment task can be undertaken in a group of up to 4 members or individually. Each group/student will analyse the given scenario of the organisation, and develop and document the specified Issue Specific Security Policy (ISSP) for the organisation.

Assessment criteria - The students are assessed against their ability to analyse the given scenario and develop the specified ISSP.

The marking criteria for Assessment Item 1 are provided on page 4.Students need to familiarise themselves with the marking criteria to ensure that they have addressed them when preparing the document for this assessment item.

Assessment Task - You are required to analyse the scenario on page 3 and develop the following ISSP for the organisation described in the scenario:

• Access and use of sensitive information of the organisation

The ISSP should include:

1. Statement of Purpose
2. Authorised Uses
3. Prohibited Uses
4. Systems Management
5. Violations of Policy
6. Policy Review and Modification
7. Limitations of Liability

You also need to include a section containing the justification of the contents of your policy as well as any assumptions that you have made.

Note: You need to upload the document containing the ISSP to Moodle. You must follow the Harvard citation and referencing guidelines.

Please do not include an executive summary, a table of contents, an introduction or a conclusion. Please use the ‘Template for Your Answers' Section of this document and upload only that template.

Check the course website at least once a week for further information relating to this assessment task. Please ensure that you write your answers in your own words to avoid possible plagiarism and copyright violation. You can understand the Plagiarism Procedures by following the corresponding link in the CQUniversity Policies section of the Course Profile.

The Scenario for Information Security Management Assessment Tasks

A private company in Australia plans to establish a private nursing school. The main campus of the nursing school is located in a suburb of Sydney and the satellite campuses are located in the suburbs of capital cities of three South East Asian countries. The company has made agreements with a private hospital in each of these locations to provide the internship and training to the students of the nursing school. The main and satellite campuses that are currently being constructed will have modern communication networks suitable for the business.

The lectures, tutorials and laboratory classes conducted in the main campus will form virtual classrooms with the satellite campuses. The students can participate in the virtual classes from within the campus premises or from their homes. More than 100 students are expected to enrol in each location in the first year.

The management of the company plans to help out the wider community by providing a telemedicine and homecare service to the needy patients at their homes. This service covers a radius of about 200km from the main and satellite campuses and will be provided with the help of a mobile team of health personnel.

The mobile team will be able to receive medical advice directly from the medical staff of the hospital in their country as well as the private hospital in Sydney via a virtual consultation room. The hospitals should be able to locate and contact all registered homecare patients. The nursing school should know the location of all their students and staff when they are on duty.

As the company is newly established, the information security policies are yet to be developed.

Reference no: EM131031736

Questions Cloud

Determine the constant for p required to cause the 0.5kg : The slider starts from rest at position 1 and the unstretched length of the spring of modulus k = 250 N/m is 200mm. Neglect friction.
What do you learn about the company hp inc : What do you learn about the company? What areas are changing and may be opportunities for cost control and improved profits?
How much charge is stored on each capacitor : In the figure (Figure 1), if C1=C2=2C3=26.3µF, how much charge is stored on each capacitor when V=47.0V?
Compare existential therapy and psychoanalytic therapy : The paper (6pages) will compare Existential Therapy and Psychoanalytic Therapy (Frued) as it relates to philosophy, key concepts and tenets, stragtegies and technqiues, and goals. Additionally, the paper will include a discussion of the appropriat..
Develop the issp for the organisation : Assessment Task - You are required to analyse the scenario on page 3 and develop the following ISSP for the organisation described in the scenario: Access and use of sensitive information of the organisation
Partial credit for incomplete assignment : Them tell me what future Supreme Court cases cited the Bethel case and tell me why or why not you agree or disagree. I expect at least three pages in order to get credit. I will not give partial credit for an incomplete assignment. The assignment ..
Find the minimum aperture diameter of a camera : Find the minimum aperture diameter of a camera that can resolve detail on the ground the size of a person (1.5m ) from an SR-71 Blackbird airplane flying at an altitude of 26km .
Prepare an individual tax return including all required form : Based on the information presented below, prepare an individual tax return (married filing jointly) including all required forms and schedules for Harry and HenriettaHurricane for 2015.
What is the direction of the acceleration : three forces acting on an object are given by f1=[-2.00i+2.00j]N,f2[5.00i-3.00j]N,f3[-45.0i]N.The object experiences an acceleration of magnitude 3,75 m/s to the power 2

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd