Ethical and professional issues faced by risk professionals

Assignment Help Computer Engineering
Reference no: EM133181669

Vulnerability Audit and Assessment

Learning Outcome 1: Gather and synthesise information from multiple sources (including internet security alerts and warning sites) to aid in the systematic analysis of security breaches and issues.

Learning Outcome 2: Articulate the legal, social, ethical and professional issues faced by information security and risk professionals.

Assignment Topic

Following your analysis document that you submitted in Unit 3, you should now produce an executive summary that pulls together your findings, recommendations and conclusions in a clear and unambiguous format. It should consist of:
• A brief summary of the work carried out.
• Summary findings - presented in an easy to understand, non-technical manner (supported by graphics and charts as appropriate).
• A section that evaluates the website against two security standards - one of which must be the GDPR directive.
• Conclusions - with justifications.
• Recommendations - with justifications, ordered by business priority.

Note: the executive summary should organise any recommendations in order of the priority to the business' commercial needs. The organisation is particularly interested in how well they meet current security standards (including the new GDPR directive) and expect to see any mitigations required to meet such standards clearly called out as important business requirements.

Please note: appendices should not be used to extend the core report as reports should stand alone, complete and concise, without the appendices. They should only be used if required, and only for supplementary and/ or supporting information. One key part of the exercises in this module is the need to be to be able to express ideas succinctly, concisely and with necessary brevity.

Assignment Checklist
1. List of security issues found and comparison with baseline.
2. Methodology used, (with limitations encountered).
3. Summary of data (graphical where possible).
4. Comparison against a security standard, plus an evaluation of how well the business meets its GDPR requirements.
5. Summary of conclusions (based on/linked back to data).
6. Summary of recommendations (in descending order, based on risk).
7. Applicable citations and references.

Reference no: EM133181669

Questions Cloud

Discuss the competitiveness of the uk market : Social, Technological, Economical, Environmental, Political, Legal and Ethical (STEEPLE) analysis to analyse the external business environment
Calculation of business income : Calculation of business income, etc. Ignore all GST/HST aspects. You must submit the completed tax return for James through the Case Study
Complete the tax return : Complete the tax return (Form T1) for Mr. James Doode for the 2021 taxation year, including all relevant schedules, forms and worksheets
Creating appropriate goals for that child : What was never discussed is how there is little explanation done for parents to understand the process - Creating appropriate goals for that child
Ethical and professional issues faced by risk professionals : Articulate the legal, social, ethical and professional issues faced by information security and risk professionals - systematic analysis of security breaches
Describe eight exceptions to severance pay requirements : Identify and describe eight exceptions to the severance pay requirements. Make any 3 changes in the law according to you and explain the reason behind these cha
Promote economies of scale : An organization where all specific skills and knowledge are consolidated into similar areas (like HR, Operations, Finance and IT), promotes economies of scale a
Management role at an organisation in australia : You have recently started new management role at an organisation in Australia
How crucial the team work is in preventing serious illness : As production manager at Reliable Pharmaceuticals, you chair the quality assurance team. The team's purpose is to find and correct production shortcomings.

Reviews

Write a Review

Computer Engineering Questions & Answers

  How can a company use change management to minimize

how can a company use change management to minimize resistance and maximize the acceptance of change in business and

  Compare the time for a query and response

Compare the time for a query and response for a complete DNS query and response (to all required nameservers) if M=1, M=2, and M=3.

  Explain the challenges the organization had

Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud.

  What is the time complexity of the algorithm

Suppose instead that wibble always returns False. What is the time complexity of the algorithm?

  Determine the price per ticket and the total price

Clicking the CalcPrice button should determine the price per ticket and the total price based on the user's input and display in txtEach and txtTotal.

  Which truck will cause more pavement damage

On a flexible pavement with a 3-inch hot-mix asphalt (HMA) wearing surface, a 6-inch soil-cement base, and an 8-inch crushed stone sub base, which truck will cause more pavement damage?

  How did the artifact first come to your attention

What is it about the artifact that interests you? What is your personal connection to the artifact? What about the artifact connects you to it?

  Write program that will take information from two data files

Write a program that will take the information from two data files and produce an output file. Use a Bourne shell for script processing.

  Write an ada code fragment that uses the operations

Write an Ada code fragment that uses the operations in the package declared in the previous question to read and echo print vectors.

  Discuss hypothetical situation to promote product or service

Describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive manner to promote a product or service.

  Why the skills and training of project managers have changed

CIS498 Speculate on the main reasons why the skills and training of project managers have changed over time. Give your opinion as to whether these changes have.

  Describe two cryptocurrencies with applicable examples

The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd