ISMC Portfolio Assignment - Information Security Policy Task

Assignment Help Other Subject
Reference no: EM132444975

ISMC Portfolio Assignment -

Task 1 will assess essential facts, concepts and principles of security controls and IT security development and management and exercise critical evaluation of information sources.

Task 2 will assess your understanding on national and international information security standards, government policies, and compliance legislation. Also, it will enable you to demonstrate detailed knowledge and understanding of information risk assessment and security management as well as confidence and flexibility in security standards, managing security incidents and related IT security problems in systems development and implementation.

Task 3 will assess a range of current security management techniques and how the principles of information risk assessment, incident management and information assurance methods are embodied therein.

Task 2 - Information Security Policy

Scenario - You work for a high-tech company with approximately 550 employees. Your firm recently won a large UK Government contract, which will add 30% to the revenue of your organization. It is a high-priority, high-visibility project. You will be allowed to make your own budget, project timeline, and tollgate decisions.

You have been assigned as the group leader to develop the proper security policies required to meet UK Government standards for delivery of technology services as part of the National Cyber Security Centre (NCSC). In order to achieve this, you must develop a framework of UK Government-approved policies and standards for your IT infrastructure (see below).

Your firm's computing environment includes the following:

12 servers running Microsoft Server 2016, providing the following:

- Active Directory (AD)

- Domain Name System (DNS)

- Dynamic Host Configuration Protocol (DHCP)

- Enterprise Resource Planning (ERP) application (Oracle)

- A Research and Development (R&D) Engineering network segment for testing, separate from the production environment

- Microsoft Exchange Server for e-mail

- Symantec e-mail filter

- Websense for Internet use

Two Linux servers running Apache Server to host your Web site.

420 PCs/laptops running Microsoft Windows 10, Microsoft Office 2016, Microsoft Visio, Microsoft Project, and Adobe Reader.

Task - As part of your role you should create a framework of policies in the format of one (1) page table that are UK Government compliant for the organisation's IT infrastructure. The framework of policies you create must pass UK Government -based requirements. Currently, your organisation does not have any UK Government contracts and thus has no UK Government-compliant security policies or controls in place. You should identify 3 high-priority security controls for your organisation.

You should write an executive report of no more than two (2) pages that discusses the elements of the framework, what elements are essential, and which elements could be optional. It is imperative that the executive report should have a professional look and should be precise. After all it will be submitted to the company's executive team as the result of your work. Also, it should include your rationale behind your decisions.

In order to complete the task, you should work on and consider the following:

Any compliance laws required for UK Government contracts.

Any controls placed on domains in the IT infrastructure.

Any required standards for all your devices, based on IT domain.

A deployment plan for implementation of these polices, standards, and controls.

All applicable UK Government frameworks

Any notes of your work must be submitted as an appendix to your portfolio.

Task 3 - Business Continuity and Incident Response

You were recently employed as the CISO for the University of New and you have been contacted by a government agency to inform you they have strong indications a data breach that involves critical data has occurred.

Later that day, you met with a National Crime Agency agent along with the University's legal department to discuss the activity. The National Crime Agency has been investigating activity involving online purchases made with several stolen credit card numbers. More than 30 of the transactions during the past week had been traced to one of the University's IP addresses. The National Crime Agency agent asked for the University's assistance, and in turn, you asked for the incident response team's assistance in acquiring evidences, only to realise your team is not well prepared. You know this will cause delays in the process and important information might get lost in the meantime. It is vitally important that this matter be kept confidential.

Your next team meeting is approaching, and you decide to prepare and give a presentation to your team. Your slides should address the following items:

1. The severity level of the above-mentioned incident.

2. Who or what groups will be involved in the situation?

3. Suggest measures to contain and recover from the incident.

4. Suggest measures to prevent similar incidents from occurring in the future.

5. Suggest actions to improve the detection of similar events.

You will need approximately 12 slides for your presentation. It needs to be professional, brief and informative. Any additional material can be communicated as slide notes.

You must include a title slide in the beginning and a summary slide in the end.

You are expected to use appropriate peer reviewed sources for developing your arguments and the Harvard referencing style as per the University regulations.

The final portfolio report is an academic report and as such the following report structure is expected:

Cover Page

Task 2

Task 3

References

Appendixes.

Reference no: EM132444975

Questions Cloud

What does samuel huntington predict will be cause : What does Samuel Huntington predict will be cause of the major conflicts in the coming years? What reasons does he give to support this?
What is the marginal cost of production : In general, if the company needs X units of product, what is the total cost? What is the marginal cost of production?
Measurements of gdp in 2015 change : Comparing the United States today with the United States 200 years ago, what has happened to our production of market goods and services?
Health education-promotion strategies in poor communities : Health education and promotion strategies in poor communities One of the primary roles of health educators is to pursue new and better ways to facilitate
ISMC Portfolio Assignment - Information Security Policy Task : Create a framework of policies in the format of one (1) page table that are UK Government compliant for the organisation's IT infrastructure
Training for the cooks and probably longer work hours : The new item will call for more ingredients, training for the cooks and probably longer work hours. With variable cost these cost will change with the demand of
Problem regarding the production costs : You are the owner of a fast-food restaurant. Given a new item that you recently advertised, you experience additional demand for your business
What features of the product cycle theory : What features of the product cycle theory are at variance with the assumptions of the Heckscher-Ohlin model?
Problem regarding the perfect competition : Examine a perfectly competitive firm that you have recently purchased a product from, focusing specifically on how the firm operates relative

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd