Implementation of a security plan

Assignment Help Management Theories
Reference no: EM131237253 , Length: word count:3500

Assignment - Research Paper

Objectives:

  • Demonstrate reflective practice and apply learning to different contexts by critically analyzing protection mechanisms for information systems to build sound knowledge.
  • Demonstrate an understanding of the impact of interpersonal communication on specific management processes and outcomes using relevant theories and concepts by understanding the relationships between security and personnel, between security and law, between security and ethics.
  • Demonstrate an understanding of the impact of interpersonal communication on specific management processes and outcomes using relevant theories and concepts by properly applying security principles into information security project management.

In this assignment, you need to address the following specific items:

  • Controlling risk
  • Protection mechanisms
  • Personnel and security
  • Law and ethics

You need to provide the selected organisation with the necessary guidelines for implementation of a security plan based on four main components outlined above.

Your solution to the selected organization will incorporate specific aspects from all the chapters as you are building your argument for this requirement.

You are also required to review the PRT Network Monitor that you can find on this web site https://www.paessler.com/prtg. This web site provides you with the executable which you need to download. It also provides you with a lot of information on how to use it.

You are requested to try out installing and use of this software to monitor your home network. While the web site has documentation available (videos, help, explanations, etc.). After monitoring your home network you need to provide a report about any issues or limitations with your home network.

As mentioned in the previous assignments, you need to make sure NOT to divulge any sensitive information of the selected organisation. If you are working in this organisation, use the internet to determine what information is available to the public.

Your research paper should include the following sections:

Title - You are required to decide your paper's title.

Name and student number - You need to write your name and student number directly under the paper title.

Abstract - Abstract is one of the important parts of research papers. It is often the last part that you write, but the first thing people read when they want to have a quick overview of the whole paper. I suggest you leave writing the abstract to the end, because you will have a clearer picture of all of your work. A good abstract should has one well-developed paragraph that is coherent and concise, and is able to stand alone as a unit of information covers all the essential academic elements of the full length paper. You are required to write not more the 100 words.

Introduction - In your research paper the introduction should include the following:

  • Overview about strategic information security
  • What the research paper is about?
  • The structure of the rest of the paper

Body context - You could divide this section into several sub-sections such as

  • Controlling risk
  • Protection mechanisms
  • Personnel and security
  • Law and ethics
  • PRT Network Monitor report
  • Conclusion

At the end of your research paper, a reader wants to know how to benefit from the work you accomplished in this paper. To do that, you need to connect the paper's findings to a larger context, such as the wider conversation about an issue as it is presented in a course or in other published writing, or by suggest the implications of your findings or the importance of the topic to security practice in general.

References - Formatting Your Reference List. All documents cited in your assignment must be listed in a single alphabetical list at the end of the assignment.

Reference no: EM131237253

Questions Cloud

What makes a substance a conductor or an insulator : Compare the SI units of specific heat and latent heat and explain any differences. Give two examples each of good thermal conductors and good thermal insulators. In general, what makes a substance a conductor or an insulator?
Calculate the project cash outflow in initial outlay : Calculate the project cash outflow in year 0 (initial outlay). Calculate annual operating cash flows for year 1-5 (OCF). Calculate the project's terminal cash flow in year 5 (TCF). Calculate the project's NPV, IRR.
At what temperature (fahrenheit) should the oven be set : While in Europe, a tourist hears on the radio that the temperature that day will reach a high of 17°C. What is this temperature on the Fahrenheit scale? A recipe calls for a cake to be baked at 180°C. At what temperature (Fahrenheit) should the ov..
Structural unemployment something macroeconomic policymakers : Is structural unemployment something macroeconomic policymakers should be concerned about?How does it differ from cyclical unemployment?
Implementation of a security plan : You need to provide the selected organisation with the necessary guidelines for implementation of a security plan based on four main components outlined above
What is this temperature on the fahrenheit scale : Normal room temperature is about 68°F. What is the equivalent temperature on the Celsius scale? A person running a fever has a temperature of 39.4°C. What is this temperature on the Fahrenheit scale?
About an organization for which you currently work : Think about an organization for which you currently work or one that you previously worked for - Do you believe that groupthink affects or has ever affected the organization's decision-making process? Why or why not?
What is gross domestic product : 1) What is gross domestic product (GDP)? 2) What is considered a healthy growth rate? 3) What does the current growth rate mean for the U.S. economy?
What is this temperature on the celsius scale : Researchers in the Antarctic measure the temperature to be 40°F. What is this temperature on (a) the Celsius scale and (b) the Kelvin scale?

Reviews

len1237253

10/10/2016 1:44:17 AM

Total 3500 words, based on previous work, will share it with start working email. Please check to feedback for previous solution as that will help you to improve to marks and quality of this assignment. Please note that all assignment items in this course must adhere to the correct Harvard citing and referencing. For this purpose links have been provided to you on the study desk. However, you can consult the library web site for further details and clarifications. Clarity in developing one paragraph that is able to stand alone as a unit of information covers all the essential academic elements of the full length paper. Clarity of the introduction to the organisation selected for assignments in this course. This section must include (overview about strategic information security of the selected organisation, and what this research paper is about). Citing and referencing correctly the supporting literature using Harvard referencing (in-text and full reference list). Need a list of different and relevant reference sources (book, suitable article, reports, web-site, etc).

Write a Review

Management Theories Questions & Answers

  Will it change some sectors affecting public health

Will it change some sectors affecting public health and will it reduce financial barriers to equal access-My state is Texas.

  Volunteer water metering in the city of richmond

Volunteer Water Metering in the City of Richmond

  Option contract without pamela permission

Georgia purchased an option on Greenacre from Pamela for $10,000. The option contract contained a provision by which Georgia promised not to assign the option contract without Pamela's permission.

  Determine the level of responsibility management

From the second e-Activity, determine the level of responsibility management had for the business failure you researched. Provide specific examples to support your response

  Explanation definition

Explanation? Definition? Steps to social media automation in general Benefits of social media automation in general for the business

  Nonprofit organization versus a for profit business

What are some differences one might expect among stakeholder expectations for a nonprofit organization versus a for-profit business?

  The most difficult tasks of management

1. Effectively changing strategies is often one of the most difficult tasks of management. Why do you think this is the case?

  Why do the perceptions of employees vary

Why do the perceptions of employees vary?-  Identify two or three factors that might account for the differences.

  Stages of a team lifecycle of development

Which of the following is notone of the five stages of a team's lifecycle of development? Which of the following is not part of strategic human resource management planning

  A publicly owned business, such as general motors

Under what conditions could it be considered acceptable to hire a relative of an employee or executive in a public organization, such as in federal government, or a publicly owned business, such as General Motors?

  Which stage in the sequential model of rediscovering

1.which of the following correctly describes the relationship between victimology and criminology?2.in their

  Grunig and hunt model of four types of public relations prac

Write an essay in which you discuss theGrunig and Hunt model of four types of public relations practice

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd