Information security system in australia

Assignment Help Computer Network Security
Reference no: EM131029253

Assessment Task

You are required to analyse the scenario given on page 3 and discuss the following issues in the specified weeks in relation to the Course Learning Outcomes 4 and 7.

a) The steps that the company should take for the certification and accreditation of its information security system in Australia.

b) Would the company need the certification and accreditation of its information security system in the countries of satellite campuses as well?

c) Which professional organisations would likely to be involved in this process of certification and accreditation?

You also need to individually prepare and upload a very brief video (5 min) to Moodle in week 6. The video should clearly express the group consensus and your own views.

The Scenario for Information Security Management

Assessment Tasks

A private company in Australia plans to establish a private nursing school. The main campus of the nursing school is located in a suburb of Sydney and the satellite campuses are located in the suburbs of capital cities of three South East Asian countries. The company has made agreements with a private hospital in each of these locations to provide the internship and training to the students of the nursing school. The main and satellite campuses that are currently being constructed will have modern communication networkssuitable for the business.

The lectures, tutorials and laboratory classes conducted in the main campus will form virtual classrooms with the satellite campuses. The students can participate in the virtual classes from within the campus premises or from their homes. More than 100 students are expected to enrol in each location in the first year.

The managementof the company plans to help out the wider community by providing a telemedicine and homecare service to the needy patients at their homes.This service coversa radius of about 200km from the main and satellite campuses and will be provided with the help of a mobile team of health personnel.

The mobile team will be able toreceive medical advice directly from the medical staff of the hospital in their country as well as the private hospital in Sydney via a virtual consultation room. The hospitals should be able to locate and contact all registered homecare patients. The nursing school should know the location of all their students and staff when they are on duty.

As the company is newly established, the information security policies are yet to be developed.

Reference no: EM131029253

Questions Cloud

Suggest an appropriate dependent variable : a. Suggest an appropriate dependent variable. b. Write a model for this experimental situation and identify all terms. c. Fill out the sources and degrees of freedom for an AOV table.
Offshore financial centers facilitate money laundering : Governments dislike the fact that offshore financial centers facilitate money laundering. Do you think that electronic commerce makes it easier or harder to launder money and camouflage other illegal activities? Do you think offshore financial center..
How small would the sample percentage need to be : A manufacturer claimed that at least 20% of the public preferred her product. A sample of 100 persons is taken to check her claim. With α = .05, how small would the sample percentage need to be before the claim could legitimately be refuted? (Noti..
Variability in an analysis of variance table : a. Write an appropriate model (including an effect for weeks) and the sources of variability in an analysis of variance table. b. How would your model change if we analyze the total 2-week sales data? c. Run an analysis of variance on the 2-week sale..
Information security system in australia : Would the company need the certification and accreditation of its information security system in the countries of satellite campuses as well?
Required using the low-level coded product structure tree : Product A consists of three units of Subassembly B, three units of C, and one unit of D. B is composed of two units of E and three units of F. C is made of three units of H and four units of D. H is made of five units of E and two units of G. d. To p..
Components as taking the you attitude emphasizing positive : Components as taking the "you" attitude, emphasizing the positive, establishing credibility, being polite, using bias-free language, using visual aids, and projecting a good company image. How can I exhibit these qualities in a formal proposal?
Describe role of packaging labeling in marketing of product : Explain the purposes of each step of the new-product process. Identify ways that marketing executives manage a product's life cycle. Describe the role of packaging, labeling, and warranties in the marketing of a product
Write the equation in the slope-intercept form : Carla invested $23,000, part at 16% and part at 15%. If the total interest at the end of the year is $3,500, how much did she invest at 16%?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Illustrate three security services-confidentiality-integrity

Illustrate that three security services: Confidentiality, Integrity, and Availability are enough to deal with threats of: (a) Disclosure, (b) Disruption, (c) Deception (deceive = to cause to accept as true.

  Select a research topic from the list below after selecting

cybersecurity research paperselect a research topic from the list below. after selecting your topic research the

  Compute the entry in the rijndaels-box

Compute the entry in the RijndaelS-box

  Ethics associated with future global cyber security issues

Interconnectedness Cybersecurity Poses to Society and the Pursuit of Commerce - What three policy points should be included in a proposed model for a GLOBAL cybersecurity policy that will help mitigate the effects of cyber-warfare, cyber-crime, and..

  Determine the impact of five potential logical threats

Identify at least five (5) potential physical threats that require attention. Determine the impact of at least five (5) potential logical threats that require attention.

  Briefly identify the compliance

Pick an organization from either the eCommerce sector (anyone trading in products or services using the Internet) or the Banking/Finance sector

  What purpose does a firewall play in an organization

What are some things we need to evaluate when protecting our network?

  Present a short summary of the arguments for and against

you have been asked to help decide whether to outsource security or keep the security function within the firm. search

  Discuss some of the problems nats create for ipsec security.

Why deployment of IPv6 has been slow to date

  Termination of a project

As a assignment manager, you are asked to facilitate a lessons learned session as part of the assignment termination process.

  Security solutions model module in skillport

Complete the Security Solutions Model module in Skillport.  Attach a copy (screen shot) of the final test page to your assignment below. Scenario: Your boss wants to know how to detect an intrusion into or an attack on the ecommerce network. Your b..

  Analyze the impact of security breaches

1. you need to select a particular security breach that happened in the recent past. You need to search the Internet to find a security breach that you can analyze. Once you select a particular security breach to work on, other students cannot ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd