ISY3006 Information Security Assignment

Assignment Help Computer Network Security
Reference no: EM132632480

ISY3006 Information Security - Australian Institute of Higher Education

Learning Outcome 1: Research, develop, and document a basic security policy, and analyse, record, and resolve all security incidents

Learning Outcome 2: Identify and assess the threats to, and vulnerabilities of networks

Assignment

This is an individual assessment. This report gives you the opportunity to research, formulate, develop and document a basic security policy for a specific organization in Australia ECXEPT for BANKING/MORTGAGE organisation. Moreover, you are required to analyze, record, resolve security incidents and identify and assess the threats to, and vulnerabilities of the organisation's networks. This report will use many of the concepts and techniques discussed in this unit throughout the semester.

Please note, you will need to either choose from the list of examples of the industries provided below or come up with your own idea for a chosen specific organisation.

Hospital/Medical Centre Supermarket
Vehicle rental Tourism agency Hotel/Motel

School/University Library
Aviation operator Property Management

Please discuss your chosen organisation and or ideas with your lecturer before you start your research. You must send the organization that you have chosen to your lecturer by Week 5. Please note you might NOT be allowed to choose the same or similar specific organisation as other in your class. You should aim at research, develop, and document answers to questions (a.) and (b.) below. Do not copy the examples of information security policies used in class!

You should state clearly:
the name of the organisation you have chosen the stakeholders of the organisation
the nature of the business and answer questions (a) and (b).

Questions:
(a.) Research, formulate, develop and document a strategic security policy for your chosen organisation based on the nature of the organisation and the stakeholders in the organisation.

(b.) Based on the security policy you have researched, formulated, developed and documented in the item (a.) above, identify and assess the potential threats and vulnerabilities of the company's network and discuss how such threats and vulnerabilities can be mitigated based on your research.

Attachment:- Information Security.rar

Reference no: EM132632480

Questions Cloud

Assess the need to adjust interpersonal style : How do you assess the need to adjust your interpersonal style to effectively communicate with different types of clients?
What was the variable overhead rate variance for the month : What was the variable overhead efficiency variance for the month? What was the variable overhead rate variance for the month?
What is the predetermined overhead rate for the denominator : Kingdon Corporation manufacturing overhead includes $7.10, What is the predetermined overhead rate for the denominator level of activity of 4,600 machine-hours?
Deoxyribonucleic acid profiling is laboratory method : Deoxyribonucleic acid profiling is laboratory method used by forensic scientists to determine identification of individuals by their unique DNA signature
ISY3006 Information Security Assignment : ISY3006 Information Security Assignment Help and Solution, Australian Institute of Higher Education - Assessment Writing Service
Calculate the present value : Question - Calculate the present value of R1 000 to be received at the end of 8 years. Assume an interest rate of 7%p.a.
How show journal entry to record incurrence of direct labour : Show the journal entry to record the incurrence of direct labor costs. Standard wage rate $12.20 per DLH. Standard hours 5.3 DLHs per unit
Explain development of unrealistic relational expectations : For the quantitative resource to support this topic, I chose The Journal of Korean Academy of Nursing, which states, "To achieve the aim, a quantitative.
Question - prepare journal entries : Prepare journal entries for the following - Office supplies on hand $1,510, charged to Supplies Expense when purchased

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd