Explain, what main functions under an infosec program

Assignment Help Computer Networking
Reference no: EM132550197 , Length: 2 pages

Question Q1:
a) Explain, what main functions under an InfoSec program would you recommend a smaller organisation with three full time staff and two or three part-time roles from other parts of the business.? Specify for InfoSec department and other departments. Specify the functions that would be performed by the different departments and indicate if any functions could be outsourced. Justify your allocation of functions.

b) The New Zealand Privacy Act 1993 focuses on the storage and security of personal information. It requires agencies to ensure that the personal information is protected by reasonable security safeguards. Discuss how the New Zealand COVID tracing app adheres to all the relevant principles of the New Zealand Privacy Act and ensures that there will be no personal data compromise? information in consideration of each of the specific principles of New Zealand Privacy Act?.

Question Q2:
a) Consider a data classification scheme that contains the categories "confidential", "sensitive", and "unclassified" . Define these categories first, and then apply them to categorise five information assets contained in your personal computer. Explain the reason for the classification of each of the assets.

b) Consider a home office that comprises a laptop running the latest Windows OS, a monitor, a wireless keyboard and a wireless mouse ( one dongle), a backup device (external hard disk), an external DVD drive, and a fibre optic based Internet connection managed by an ISP that connects the home office Wi-Fi to the Internet. Perform a TVA (threat -vulnerability-asset) assessment of the home office IT infrastructure based on your general knowledge about the hardware described. Include all assets and identify at least three threats (see Table 6-8 on page 341).

Question Q3:
a) What risk treatment strategies would you recommend to banking industry as part of their information security program? Explain these in the context of the various business processes and resources.

b) Consider the case of ABC Software Company which is facing a number of major information security threats (as listed in the table below). The information security team has estimated the cost per incident which the company will bear if the threat is materialised. Calculate the Single Loss Expectancy (SLE), Annualized Rate of Occurrence (ARO), and Annualized Loss Expectancy (ALE) for each threat.

ABC Software Cost per             Frequency of             SLE ARO ALE

Company major incident         Occurrence

threats

Programmer      $4,500.00     2 per week

mistakes

Flood            $250,000.00     1 per 10 years

Virus, Worms, $1,500.00        1 per week

Trojan

Denial-of-                   $6,500.00     1 per quarter

service attacks

Theft of            $6,000.00     1 per 6 months

information

Question Q4:
a) Consider a tertiary education organization (e.g., a university). Consider applying mandatory access controls vs non-discretionary access controls with respect to student records. (Assume that student records include these four categories: (i) personal details,( H) external documents supplied by the student, (Hi) records about study progress, e.g., enrolment and grades , and (iv) internal documents generated administratively such as letters sent to the student). Which approach would you recommend, mandatory access controls or nondiscretionary access controls? Justify your recommendation, referring specifically to the four categories above.

b) Why is it a good security practice to collect and report near-miss event in which major incidents were only narrowly averted (such as spam messages that were not filtered out ) need to be collected and reported? Explain your answer providing five examples of hypothetical near-miss events. and what weaknesses they may indicate.

Reference no: EM132550197

Questions Cloud

What amount of loss should dike report as extraordinary : Ignoring income taxes, what amount of loss should Dike report as extraordinary on its annual income statement
Demonstrate how to use the cpi : Demonstrate how to use the CPI (CPI given) to compare dollar figures from different times (for example compare the cost of a cup of coffee in 2004 to 2020).
Make the adjusting general journal entry for the six-months : Use this information to make the adjusting General Journal entry (without explanation) for the six-months ended December 31, 2019
Describe the different methods of sewage treatment : Describe the different methods of sewage treatment? How doe they lower the costs of environmental damages, and the cost of clean available drinking water?
Explain, what main functions under an infosec program : Why is it a good security practice to collect and report near-miss event in which major incidents were only narrowly averted
Draw a graph that shows the inflation rate : Draw a graph that shows the inflation rate, the unemployment rate, and different short run Phillips curve based on different inflation expectations
What are the types of food systems : Describe the various "innovations" illustrated in the agricultural projects highlighted, the types of food systems are included, and explain
Combination of capital and labor : Economy X would like to use a certain combination of capital and labor with the demand variables to determine the quantity output.
Explain why recycling programs started : Explain how much of recyclable plastics are being recycled, and where. How has this effort changed over the past several decades?

Reviews

len2550197

6/19/2020 10:29:20 PM

I just want you to answer this questions within 5 hours I’ve to submit it after 5 hours and the book we are using is (Management of information security)

Write a Review

Computer Networking Questions & Answers

  You are called in by a small business which is experiencing

you are called in by a small business that is experiencing performance problems with one of its network computers. the

  Cost and quality create a work breakdown structure wbs and

create a work breakdown structure wbs and assign resources and cost by using a project management tool. as the it

  Network design with configuration

Configure networking devices for a given business case study and understand limitations of a network design-Discuss an appropriate network design and solution

  Design a network and recommend security features

Design a network to connect the three buildings and recommend security features for this network. You will plan your solution step by step, and then present your overall design to your client

  Research the vpn solution of two it solutions vendors

There are both commercial and open source types of Virtual Private Networks (VPNs) available. Research the VPN solution of two IT solutions vendors.

  Which has access to the raw message

Please answer this post like discussion if you agree or disagree, and why? Please explain it. This post is the answer from somebody else about question

  Explore network application management of Blockchain

MN504 Networked Application Management Assignment - Explore network application management of Blockchain by reviewing the literature

  How many atm cells are required to send a datagram

A typical remote login session using TCP generates datagrams of 41 octets: 20 octets of IP header, 20 octets of TCP header, and 1 octet of data.

  How can network segmentation protect cardholder data

When you arrive at work one morning, your Inbox is full of messages complaining of a network slowdown. You collect a capture from your network monitor.

  Build a simple ethernet network using routers and switches

Build a simple Ethernet network using routers and switches. Use Cisco command-line interface (CLI) commands to perform basic router and switch configurations.

  Connecting your personal device with the internet network

Internet is full of unwanted people who tries to intercept messages and useful information. If you connect your personal device with the internet network then you are automatically in the line of risk.

  What network connectivity do propose between the sites

what network connectivity do you propose between the sites? How will this support the disaster-recovery vision and the need to replicate data between the sites?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd