Reference no: EM131237253 , Length: word count:3500
Assignment - Research Paper
Objectives:
- Demonstrate reflective practice and apply learning to different contexts by critically analyzing protection mechanisms for information systems to build sound knowledge.
- Demonstrate an understanding of the impact of interpersonal communication on specific management processes and outcomes using relevant theories and concepts by understanding the relationships between security and personnel, between security and law, between security and ethics.
- Demonstrate an understanding of the impact of interpersonal communication on specific management processes and outcomes using relevant theories and concepts by properly applying security principles into information security project management.
In this assignment, you need to address the following specific items:
- Controlling risk
- Protection mechanisms
- Personnel and security
- Law and ethics
You need to provide the selected organisation with the necessary guidelines for implementation of a security plan based on four main components outlined above.
Your solution to the selected organization will incorporate specific aspects from all the chapters as you are building your argument for this requirement.
You are also required to review the PRT Network Monitor that you can find on this web site https://www.paessler.com/prtg. This web site provides you with the executable which you need to download. It also provides you with a lot of information on how to use it.
You are requested to try out installing and use of this software to monitor your home network. While the web site has documentation available (videos, help, explanations, etc.). After monitoring your home network you need to provide a report about any issues or limitations with your home network.
As mentioned in the previous assignments, you need to make sure NOT to divulge any sensitive information of the selected organisation. If you are working in this organisation, use the internet to determine what information is available to the public.
Your research paper should include the following sections:
Title - You are required to decide your paper's title.
Name and student number - You need to write your name and student number directly under the paper title.
Abstract - Abstract is one of the important parts of research papers. It is often the last part that you write, but the first thing people read when they want to have a quick overview of the whole paper. I suggest you leave writing the abstract to the end, because you will have a clearer picture of all of your work. A good abstract should has one well-developed paragraph that is coherent and concise, and is able to stand alone as a unit of information covers all the essential academic elements of the full length paper. You are required to write not more the 100 words.
Introduction - In your research paper the introduction should include the following:
- Overview about strategic information security
- What the research paper is about?
- The structure of the rest of the paper
Body context - You could divide this section into several sub-sections such as
- Controlling risk
- Protection mechanisms
- Personnel and security
- Law and ethics
- PRT Network Monitor report
- Conclusion
At the end of your research paper, a reader wants to know how to benefit from the work you accomplished in this paper. To do that, you need to connect the paper's findings to a larger context, such as the wider conversation about an issue as it is presented in a course or in other published writing, or by suggest the implications of your findings or the importance of the topic to security practice in general.
References - Formatting Your Reference List. All documents cited in your assignment must be listed in a single alphabetical list at the end of the assignment.
What makes a substance a conductor or an insulator
: Compare the SI units of specific heat and latent heat and explain any differences. Give two examples each of good thermal conductors and good thermal insulators. In general, what makes a substance a conductor or an insulator?
|
Calculate the project cash outflow in initial outlay
: Calculate the project cash outflow in year 0 (initial outlay). Calculate annual operating cash flows for year 1-5 (OCF). Calculate the project's terminal cash flow in year 5 (TCF). Calculate the project's NPV, IRR.
|
At what temperature (fahrenheit) should the oven be set
: While in Europe, a tourist hears on the radio that the temperature that day will reach a high of 17°C. What is this temperature on the Fahrenheit scale? A recipe calls for a cake to be baked at 180°C. At what temperature (Fahrenheit) should the ov..
|
Structural unemployment something macroeconomic policymakers
: Is structural unemployment something macroeconomic policymakers should be concerned about?How does it differ from cyclical unemployment?
|
Implementation of a security plan
: You need to provide the selected organisation with the necessary guidelines for implementation of a security plan based on four main components outlined above
|
What is this temperature on the fahrenheit scale
: Normal room temperature is about 68°F. What is the equivalent temperature on the Celsius scale? A person running a fever has a temperature of 39.4°C. What is this temperature on the Fahrenheit scale?
|
About an organization for which you currently work
: Think about an organization for which you currently work or one that you previously worked for - Do you believe that groupthink affects or has ever affected the organization's decision-making process? Why or why not?
|
What is gross domestic product
: 1) What is gross domestic product (GDP)? 2) What is considered a healthy growth rate? 3) What does the current growth rate mean for the U.S. economy?
|
What is this temperature on the celsius scale
: Researchers in the Antarctic measure the temperature to be 40°F. What is this temperature on (a) the Celsius scale and (b) the Kelvin scale?
|