Reference no: EM133181669
Vulnerability Audit and Assessment
Learning Outcome 1: Gather and synthesise information from multiple sources (including internet security alerts and warning sites) to aid in the systematic analysis of security breaches and issues.
Learning Outcome 2: Articulate the legal, social, ethical and professional issues faced by information security and risk professionals.
Assignment Topic
Following your analysis document that you submitted in Unit 3, you should now produce an executive summary that pulls together your findings, recommendations and conclusions in a clear and unambiguous format. It should consist of:
• A brief summary of the work carried out.
• Summary findings - presented in an easy to understand, non-technical manner (supported by graphics and charts as appropriate).
• A section that evaluates the website against two security standards - one of which must be the GDPR directive.
• Conclusions - with justifications.
• Recommendations - with justifications, ordered by business priority.
Note: the executive summary should organise any recommendations in order of the priority to the business' commercial needs. The organisation is particularly interested in how well they meet current security standards (including the new GDPR directive) and expect to see any mitigations required to meet such standards clearly called out as important business requirements.
Please note: appendices should not be used to extend the core report as reports should stand alone, complete and concise, without the appendices. They should only be used if required, and only for supplementary and/ or supporting information. One key part of the exercises in this module is the need to be to be able to express ideas succinctly, concisely and with necessary brevity.
Assignment Checklist
1. List of security issues found and comparison with baseline.
2. Methodology used, (with limitations encountered).
3. Summary of data (graphical where possible).
4. Comparison against a security standard, plus an evaluation of how well the business meets its GDPR requirements.
5. Summary of conclusions (based on/linked back to data).
6. Summary of recommendations (in descending order, based on risk).
7. Applicable citations and references.
Discuss the competitiveness of the uk market
: Social, Technological, Economical, Environmental, Political, Legal and Ethical (STEEPLE) analysis to analyse the external business environment
|
Calculation of business income
: Calculation of business income, etc. Ignore all GST/HST aspects. You must submit the completed tax return for James through the Case Study
|
Complete the tax return
: Complete the tax return (Form T1) for Mr. James Doode for the 2021 taxation year, including all relevant schedules, forms and worksheets
|
Creating appropriate goals for that child
: What was never discussed is how there is little explanation done for parents to understand the process - Creating appropriate goals for that child
|
Ethical and professional issues faced by risk professionals
: Articulate the legal, social, ethical and professional issues faced by information security and risk professionals - systematic analysis of security breaches
|
Describe eight exceptions to severance pay requirements
: Identify and describe eight exceptions to the severance pay requirements. Make any 3 changes in the law according to you and explain the reason behind these cha
|
Promote economies of scale
: An organization where all specific skills and knowledge are consolidated into similar areas (like HR, Operations, Finance and IT), promotes economies of scale a
|
Management role at an organisation in australia
: You have recently started new management role at an organisation in Australia
|
How crucial the team work is in preventing serious illness
: As production manager at Reliable Pharmaceuticals, you chair the quality assurance team. The team's purpose is to find and correct production shortcomings.
|