Information security system in australia

Assignment Help Computer Network Security
Reference no: EM131029253

Assessment Task

You are required to analyse the scenario given on page 3 and discuss the following issues in the specified weeks in relation to the Course Learning Outcomes 4 and 7.

a) The steps that the company should take for the certification and accreditation of its information security system in Australia.

b) Would the company need the certification and accreditation of its information security system in the countries of satellite campuses as well?

c) Which professional organisations would likely to be involved in this process of certification and accreditation?

You also need to individually prepare and upload a very brief video (5 min) to Moodle in week 6. The video should clearly express the group consensus and your own views.

The Scenario for Information Security Management

Assessment Tasks

A private company in Australia plans to establish a private nursing school. The main campus of the nursing school is located in a suburb of Sydney and the satellite campuses are located in the suburbs of capital cities of three South East Asian countries. The company has made agreements with a private hospital in each of these locations to provide the internship and training to the students of the nursing school. The main and satellite campuses that are currently being constructed will have modern communication networkssuitable for the business.

The lectures, tutorials and laboratory classes conducted in the main campus will form virtual classrooms with the satellite campuses. The students can participate in the virtual classes from within the campus premises or from their homes. More than 100 students are expected to enrol in each location in the first year.

The managementof the company plans to help out the wider community by providing a telemedicine and homecare service to the needy patients at their homes.This service coversa radius of about 200km from the main and satellite campuses and will be provided with the help of a mobile team of health personnel.

The mobile team will be able toreceive medical advice directly from the medical staff of the hospital in their country as well as the private hospital in Sydney via a virtual consultation room. The hospitals should be able to locate and contact all registered homecare patients. The nursing school should know the location of all their students and staff when they are on duty.

As the company is newly established, the information security policies are yet to be developed.

Reference no: EM131029253

Questions Cloud

Suggest an appropriate dependent variable : a. Suggest an appropriate dependent variable. b. Write a model for this experimental situation and identify all terms. c. Fill out the sources and degrees of freedom for an AOV table.
Offshore financial centers facilitate money laundering : Governments dislike the fact that offshore financial centers facilitate money laundering. Do you think that electronic commerce makes it easier or harder to launder money and camouflage other illegal activities? Do you think offshore financial center..
How small would the sample percentage need to be : A manufacturer claimed that at least 20% of the public preferred her product. A sample of 100 persons is taken to check her claim. With α = .05, how small would the sample percentage need to be before the claim could legitimately be refuted? (Noti..
Variability in an analysis of variance table : a. Write an appropriate model (including an effect for weeks) and the sources of variability in an analysis of variance table. b. How would your model change if we analyze the total 2-week sales data? c. Run an analysis of variance on the 2-week sale..
Information security system in australia : Would the company need the certification and accreditation of its information security system in the countries of satellite campuses as well?
Required using the low-level coded product structure tree : Product A consists of three units of Subassembly B, three units of C, and one unit of D. B is composed of two units of E and three units of F. C is made of three units of H and four units of D. H is made of five units of E and two units of G. d. To p..
Components as taking the you attitude emphasizing positive : Components as taking the "you" attitude, emphasizing the positive, establishing credibility, being polite, using bias-free language, using visual aids, and projecting a good company image. How can I exhibit these qualities in a formal proposal?
Describe role of packaging labeling in marketing of product : Explain the purposes of each step of the new-product process. Identify ways that marketing executives manage a product's life cycle. Describe the role of packaging, labeling, and warranties in the marketing of a product
Write the equation in the slope-intercept form : Carla invested $23,000, part at 16% and part at 15%. If the total interest at the end of the year is $3,500, how much did she invest at 16%?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd