Discuss the impact of employee on information security

Assignment Help Project Management
Reference no: EM132308856

Assessment Details:

This assessment is designed to assess your technical skills in investigation IS security, risk threats and management to an organization. The assessment is also assessing your skills to evaluate risk management techniques and IS auditing. You are required to select an organization that uses information systems to perform daily business operations. You have to identify the most valuable assets for the organisations and investigate the security threats and mitigation techniques. You have also to propose/evaluate the risk management techniques adopted by the selected organization to ensure the reliability, confidentiality, availability, and integrity. You have also to discuss audit plan and processes used by the organization and investigate the impact of human factors on security and risk management.

Task Specifications

This assessment includes two tasks as follows:

Task-1:

Each student should select an organisation. The organization must provide information systems services to the staff and customers. You have to write a report to answer the followings related to the selected organization:

1. Network devices are highly vulnerable and can be exposed. Discuss two types of threats against network routers/switches of the selected organization. Illustrate how these devices are vulnerable to destruction and abuse.

2. Propose with justification two types of network security devices can be used to control security and mitigate threats related to the web and email servers.

3. Assume the organization used Windows server 2016 to host the organization web site. Discuss how the organization can ensure the availability of the web service using windows server 2016.

4. Discuss the impact of employee on information security of the selected organization. Provide risk management recommendation to reduce the risk of employee.

5. Windows server 2016 supported with different tools for auditing. Illustrate windows server 2016 auditing tools and discuss how they can be used by the selected organization to monitor and analyzing the web server and email server problems.

You may need to make some assumptions with the required justifications.

Task-2:

Use the online encryption tool to encrypt your student ID and name using Data Encryption Standard (DEC) according to the following table:

Table 1: Encryption student details using DEC

Item

Settings/Result

Key

SBM4304

Algorithm

Data Encryption Standard

Mode

CBC

Encode the output using

Base64

Text to encrypt

{Student ID:Student name}

Encrypted with dec (Result)

{Encrypted text}

You have to replace:

• {Student ID:Student name} with your student ID and your name
• {Encrypted text} with the encrypted text In your report, you have to provide:

1. Table-1 with completed fields with a support of screenshot of encryption website.
2. Screenshot demonstrate the verification of your work by decrypting the cipher obtain in Table-1

Please note you have to use Harvard reference style and the report should be submitted as a Word file.

In completing this assessment successfully, you will be able to investigate IS security, risk threats and propose the suitable security controls, which will help in achieving ULO-1, ULO-2, ULO-3, ULO-4 , ULO- 5, ULO-6 and ULO-7, this in turn will help you in achieving CLO-1, CLO-2, CLO-3, CLO0-4 and CLO-9, which collectively with other unit learning outcomes will help in achieving GA-52, GA-10, GA-11 and GA-12.

Attachment:- Security and Risk Management.rar

Reference no: EM132308856

Questions Cloud

Developing a research problem that contributes to theory : Developing a research problem that contributes to theory in a topic area and to designing a study that addresses the problem
Describe the application of statistics in health care : Describe the application of statistics in health care. Specifically discuss its significance to quality, safety, health promotion, and leadership.
Evaluate a nursing practice environment in the clinical area : The first step of the evidence-based practice process is to evaluate a nursing practice environment to identify a nursing problem in the clinical area.
Discuss the opportunities for australian auditing profession : Auditing and Assurance Services- BUACC 5935 -Federation University Australia : Discuss the opportunities and challenges for the Australian auditing profession.
Discuss the impact of employee on information security : SBM4304 IS Security and Risk Management - Discuss the impact of employee on information security of the selected organization. Provide risk management recommend
How do bills or laws influence doctorally prepared nurse : What are two bills or laws that influence the doctorally prepared nurse? How do these bills or laws influence doctorally prepared nurses specifically.
Discuss the possible relationship between the factors : Investigate the state's policies ( Florida)on access to contraception and abortion for women with insurance and those without. Explain important points about.
Discuss research utilization and evidence-based practice : Discuss the difference between research utilization and evidence-based practice. Must answer the discussion question and address the topic in the reply post.
Define ways you engage in interdisciplinary collaboration : Evidence-based care often calls for interdisciplinary collaboration. This is especially true in the current healthcare climate as diseases often progress more.

Reviews

len2308856

5/20/2019 2:56:55 AM

Impact of employee on information security (15 mark) Excellent understanding of impact of employee on information security Windows server 2016 auditing tools (10 mark) Excellent understanding and demonstration of audit process related to the selected sector Student details encryption (Table-1 and Screenshot) (10 mark) Table -1 completed correctly with correct result.

len2308856

5/20/2019 2:56:26 AM

Availability of the web service (10 mark) Lack of evidence of understanding of availability for web service. Evidence of basic understanding of availability of the web service with limited examples. Evidence of good understanding and identification of techniques to improve the availability of the web service Very clear understanding and identification of techniques to improve the availability of the web service Has excellent understanding and identification of techniques to improve the availability of the web service

len2308856

5/20/2019 2:56:21 AM

Marking Criteria Introduction (5 marks) Excellent (85-100%) of the criterion mark Introduction is very well written, and the report outline is also discussed Threats against network routers/switches (15 marks)Excellent discussion about threats with clear specifications related to routers/switches Network security devices (15 mark) A very clear and in- depth discussion about network security devices

Write a Review

Project Management Questions & Answers

  What seasonal index is associated with each quarter

The corresponding deseasonalized values are 2320, 2362, 2205, and 2414, respectively. Based on this information, what seasonal index is associated with each quarter?

  What situational factors exist that may affect performance

What, if any, situational factors exist that may affect the project team's performance? What are some project pitfalls you will want to watch out for as you execute this project?

  Formulate a mixed integer programming model

Lauren Moore has sold her business for $500,000 and wants to invest in condominium units (which she intends to rent) and land (which she will lease to a farmer).

  List of project requirements from a work

Write a 1,050- to 1,400-word paper in which you answer the following questions: What differentiates a list of project requirements.

  How would you use reinforcement to achieve your objective

Imagine you are the lecturer on this course and that you are trying to increase student participation in class discussions. How would you use reinforcement to achieve your objective?

  What is the utilization rate for the bin area

what is the utilization rate for the bin area? what is the probability that there are more than three tucks in the system at any given time?

  Focus your research and writing on a service type project

Project Management Assignment- In this option, you will focus your research and writing on a service type project with an international component.

  Project manager and unforeseen risks - planning

Explain how should the project manager expand for the enterprise-level project and plan for these factors accordingly

  Detailed accumulation of production costs attributable

Define job order costing as the detailed accumulation of production costs attributable to specific units or group of units.

  Which quality process technique would bring biggest benefit

Now that you have defined the quality dimensions, you will need to determine which quality process improvement tools and techniques would bring the biggest benefit to your project.

  Create an executive summary of your project

Create an Executive Summary of your project in a minimum of 700 words that includes the following information regarding your chosen enterprise.

  Understanding the income tax law

Articles on tax topics are often useful in understanding the income tax law. CPA firms and other organizations publish tax articles on the Internet. Using the ‘‘Guides-Tips- Help'' section of the Tax and Accounting Sites Directory (http://www.taxs..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd