Impact on security frameworks in modern information systems

Assignment Help Management Information Sys
Reference no: EM133169953

Information Governance and Compliance

Learning outcome 1: Critically examine, assess, and investigate the policies, standards, methodologies and procedures, around information governance and their impact on security frameworks in modern and dynamic information systems with clear references to the value of information and organisational assets

Learning outcome 2: Assess, classify, evaluate and review current legal and regulatory requirements, record management and auditing processes and their influence upon self-preserved, dynamic and versatile information governance programmes and frameworks

You will produce an electronic portfolio based on the scenario below. The portfolio should include the following:

1. An outline information governance policy for the Luton and High Town Hospital Trust.

2. An information security incident response and disaster recovery plan for the Luton and High Town Hospital Trust

3. A risk management plan for the Luton and High Town Hospital Trust identifying the main risks associated with the given scenario and outlining mitigations for each

4. An information security roadmap for the Luton and Nigh Town Hospital Trust identifying the technical measures that need to be put in place in order to improve the security and governance for their sites

Scenario
Luton and High Town Hospital Trust have employed you as an information governance consultant to help them develop their information governance and security procedures. They currently have 20 hospitals and five walk-in clinics as well as 15 GP practices.

The Trust has an IT team of twenty people including two information security specialists, ten desktop specialists, four network specialists, one network administrator, a Chief Information Security Officer (CISO) and a Chief Information Officer (CIO).

Each of their facilities is connected via an Ethernet Local Area Network (LAN) with a variety of PCs, printers, laptop machines and a main server. Each local network is connected to a Wide Area Network for the entire Trust meaning that information can be shared across the facilities. In addition, each facility has an external connection to the Internet, and each has a staff (protected/private) Wireless network as well as an open wireless network for members of the general public.

Due to the sensitive nature of patient records, as well as the main application server there are also a local file server, email server and database server, all of which are able to serve all sites on the Wide Area Network. These are physically located on a central site and are managed by the in-house IT team.

Staffing (general)
Each hospital has:
a) A general manager
b) Doctors, nurses and lab specialists
c) Cleaning team
Each walk-in centre has:
a) Doctors
b) Two nurses
c) Reception manager and a team of four receptionists
Each GP practice has:
a) A Practice manager
b) Team of doctors who work on-site, but who also perform home visits and can manage and access patient records via a tablet device
c) Practice nurse
In addition to these staff, the Trust uses an external security firm to provide a team of:

a) 6 security guards for each hospital
b) 3 security guards of each walk-in centre
c) 1 security guard for each GP practice
Over the last twelve months there have been a number of security incidents:

a) Three phishing attacks in which there were two successful attempts to access staff details within the main Luton hospital
b) 1 unsuccessful ransomware attack
c) Five social engineering attacks on reception staff, all of which were successful and led to patient files being compromised. As a result a fine of £750,000 was issues by the Information Commissioner's Office

• Implement, evaluate and analyse an asset classification scheme for a given scenario.
• Justify information governance requirements and limitations in a given organisational context
• Undertake analysis of organisational norms, trends, and guidelines to be considered when implementing, testing, and reviewing an information governance framework

You need to ensure that for each of the elements:

1. An outline information governance policy for the Luton and High Town Hospital Trust.

2. An information security incident response and disaster recovery plan for the Luton and High Town Hospital Trust

3. A risk management plan for the Luton and High Town Hospital Trust identifying the main risks associated with the given scenario and outlining mitigations for each

4. An information security roadmap for the Luton and Nigh Town Hospital Trust identifying the technical measures that need to be put in place in order to improve the security and governance for their sites

Attachment:- Information Governance and Compliance.rar

Reference no: EM133169953

Questions Cloud

Write a review of that particular part : Write a review of that particular part of the production - This will require you to go into depth, with details and an opinion
My philosophy of classroom management : What is my definition of classroom management? What is my primary purpose of a classroom management system?
Compute cash collections from customers for each month : It is expected that 75% of the sales will be collected in the month of sale, and 25% will be collected in the following month. Compute cash collections
Trenching and excavation plans : Imagine you must approve the trenching and excavation plans for the subcontractors performing the work.
Impact on security frameworks in modern information systems : Critically examine, assess, and investigate the policies, standards, methodologies and procedures, around information governance and their impact on security
Determine the office costs allocated to each department : SodaPop Company has two operating departments: Mixing and Bottling. Determine the office costs allocated to each department
Determine the trustworthy net cash provided : Current asset accounts increased by $8,000 and current liability accounts increased by $11,000. Determine the Trustworthy net cash provided
Psychological stages of dying : Elisabeth Kübler-Ross proposed five psychological stages of dying: denial and isolation, anger, bargaining, depression, and acceptance.
Child development-thinking about retirement : Do you expect to retire at a certain age? How much preplanning will you need to do? Do you expect to retire to a life of leisure, volunteer activity,

Reviews

Write a Review

Management Information Sys Questions & Answers

  Discuss about the cloud based program management solution

Discuss about the Cloud based program management solution.The article must be engaging, informative, but short and concise. No How To or advertising/hard sell type of content. No Wikipedia style of writing either.It should be creative and entice th..

  Briefly descirbe how a k-means clustering works

In data mining, one of the fields is outlier analysis. Explain what is an outlier? Are outliers noise data?

  What social functions does the content order and preparation

In infant feeding, how do socio-cultural or economic factors affect the choice of breast feeding, the length of breast feeding or artificial feeding, the techniques of weaning, types of foods used, and maternal beliefs about the optominal size sha..

  Transform a conceptual model into a logical model

Analyze why user, security groups, and role definitions are essential to maintain the integrity of the database.

  Assessment taskyou are required to complete an academic

assessment taskyou are required to complete an academic essay which critically evaluates the application of either of

  What does it mean to map the consumption chain

What does it mean to map the consumption chain? What does it mean to "hire" a product to do a "job" for you? Is this a useful perspective? Why or why not?

  What steps might have been taken to detect davids alleged

Six months after David's departure, it is discovered that a good deal of the ABC Company's research has suddenly been duplicated by a competitor.

  Question about computer crime

Question about Computer Crime: Challenges and Security Issues and What are some suggestions as to how to track down offenders of these crimes you've identified?

  Research best company practices for the particular topic

Choose a topic in which you are interested and in which you have prior knowledge. Research best company practices for the particular topic.

  Design any two components of the required system

Design any two components of the required system. Develop required system. Identify the system requirements. Use appropriate diagrams and documentation based on the technique you use for analyzing the system.

  What are the determining factors that may lead to a decision

What are the determining factors that may lead to a decision on the types of passwords used to protect an organization's data? Why?

  The activities that need to be occur to set up the emergency

Assume that the area is suffering greatly from the hurricane's impact,and your company can not continue operations until the central data.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd