Examine a variety and diverse type of known threats

Assignment Help Other Subject
Reference no: EM133645901 , Length: word count:1500

Security management

Learning Outcome 1: Demonstrate a comprehensive understanding of security concepts, methods and principles

Learning Outcome 2: Critically evaluate the role of a security policy for protecting information assets and be able to effectively design security policies to defend those assets

Learning Outcome 3: Demonstrate understanding of key IT Governance that relates to information security and how it influences the security policy of an organisation

Learning Outcome 4: Carry out a security risk assessment that can be used to identify, assess and implement key security controls in systems

Background:

For this assignment you will be a security consultant reviewing an organisation of your choice within an Industry ALLOCATED to you by the module leader. You will review its activities, infrastructure. resources etc. and its ability to prepare and respond to growing information security threats and vulnerabilities.

You have been requested to carry out a study on the establishment and to impress upon them that they do indeed need your support and expertise.

This will, primarily, be achieved by analysing the current business processes in the company, their products and services along with their ICT situation. You will then follow a procedure that will: review the Information Security Policy and make recommendations and evaluate risk, create a strategy that will re-assure that the company has in place the means to consider and contain viable threats.

Through research via the internet and through research through other legally accessible library resources, you should be able to find an appropriate company. Where information is limited then you can make assumptions concerning the company as you see fit, however, you are to list those assumptions and draw attention to those assumptions in your report.

When researching please find a company that has a high-level Information Security Policy that you can see or obtain.

Professional Report

Create a professional consulting report with front cover, table of content, exec summary, and each section starting on a new page for the following deliverables (b) to (f). Diagrams with supporting narratives are encouraged, examples are very useful and citation of sources are required along with any appendices, assumptions etc. A report of approx. 1500 words approx., with a tolerance of approx.

(b) Insight into establishment
Provide an insight into the establishment's background and size and industry competitor(s), market place etc. In particular describe the products and services it has to offer. It is recommended that you diagrammatically represent your Company with accompanying narratives. Also show a diagrammatical representation of the internal functions (departments) that are in the company.

From this speculate and bullet point a list of the complexities and challenges the company is faced with in regards to a) the supportive IS/IT infrastructure and b) data

Information security mind-map

Provide an overview and understanding to the company of what the subject matter Information Security entails. Through the use of a comprehensive mind map (preferred) or any visual representation, this can be an A3 size electronic document (PowerPoint, word etc) - show what Information security is, the components, topics, frameworks, entities and concepts it affects and is affected by - all the touch points that contribute to and are affected by Information security. As a suggestion consider environmental factors outside the company and then within the company itself. Topics such as big data, new technology, Social Media and others should not be ruled out

d) IT Governance
Discuss what IT Governance is and its relevance and importance to the company in terms of Information security. You can use diagrams to demonstrate your concepts. In what way does IT Governance influence the process of Information security and the policy /(s) thereof.

Critique and develop an encompassing Information Security Policy
You will need to find a ‘poor' or ‘incomplete' or ‘not up to date' Information Security Policy through research from the internet, or other routes. Provide the URL / ref for this policy and include the policy in the appendices.
Identify and list the short comings or what makes it inadequate for your company's purposes.

Now create an outline template of an ideal information Security Policy that could be used in your organisation. Do this by absorbing some of the positive aspects of the Policy you have found and critiqued as well as addressing how suitable it is for a) the current business operating environment and b) any possible foreseeable future environments that could change.

Risk Assessment

Conduct a thorough risk assessment resulting in a risk register. Examine a variety and diverse type of known threats and their likelihood of materialising and how they could impact your company -what is the degree of impact on the company and processes. Identify and list the actions and controls you would put in place for dealing with the risk. The risk register should be in a table format within the body of the report.

Reference no: EM133645901

Questions Cloud

Metastatic osteosarcoma of the brain : Metastatic osteosarcoma of the brain. Patient was admitted for treatment of the brain metastases.
Create a professional presentation on your paper : A primary requirement for this course is to analyze contemporary topic in logistics, write research paper, and create a professional presentation on your paper.
Health care policy now after completion of course : Analyze and Share: Your interest related to health care policy now after completion of the course.
Esophageal carcinoma of the middle third of the esophagus : Esophageal carcinoma of the middle third of the esophagus treated this admission with a partial open esophagectomy
Examine a variety and diverse type of known threats : 6054CEM Security management, Coventry University - Examine a variety and diverse type of known threats and their likelihood of materialising and how they could
Define term and provide a detailed analysis of cost involved : Define the term and provide a detailed analysis of the cost involved and at what point the responsibility for the shipment changes from the buyer to the seller.
Describe a possible outcome of your proposed engagement : Describe a possible outcome of your proposed engagement that might influence the societal conversations that add to critical awareness of diversity.
Do you suppose contractionary monetary policy has failed : Do you suppose contractionary monetary policy has failed to meet the objectives of stabilizing the economy to increase employment and stabilize price levels?
Demonstrating your understanding of the child : Demonstrating your understanding of the child as capable and competent. Refer to at least 2 different sources (theory and/or literature)

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd