Physical resources at risk

Assignment Help Other Subject
Reference no: EM133236770

WORKSHOP THREE TITLE

Physical Resources at Risk

Get together in your assigned groups and discuss the case study as described below.

Scenario

In the previous meeting held last week, threats to critical business processes with respect to the logical (software) part of the organisation's informational store have been identified and various countermeasures have been taken to mitigate these threats. At the conclusion of that meeting, the Agenda for this week's meeting was set, which is to discuss threats to the information system directed at or through the physical infrastructure of the company. The head of each business unit was instructed to research the topic and be prepared to discuss their findings at the next meeting.

Tasks

This is the second meeting to be held to discuss the creation of the information security master plan. You will need to discuss threats to critical business processes that are directed at, or through the physical infrastructure of the company. 

The head of each Business Unit (BU) is the expert for their individual area and is responsible for guiding discussion within the scope of their BU. The rest of the team will join in the discussion on the viability of each "solution" presented, or present alternative "solution" if any. The best "solution" will be documented for the written submission. While Team consensus is preferable, the CEO may exercise his/her veto power and select one that he/she deems the best if the issue is hopelessly deadlocked. The CEO is also responsible for guiding and monitoring the discussion in general.

You will need to document the results of your discussion for submission and you may make any reasonable assumptions. All assumptions made must be justified and stated clearly in your written submission.

You may find it helpful to:

  • Define what is an information system
  • Know what are the components of an information system
  • You see evidence of physical security every day, at the bank, at the airport, shopping centre, in your place of employment. Use the examples you see daily as a guide, why are they there, what is the purpose, what are they protecting (threats), where are they placed and why.
  • Consider what needs to be protected in an information system.
  • Consider what sort of physical security measures can be used to protect the information system.
  • Know what the CIA triangle is and how it relates to information security
  • Consider using risk management in deciding on the proper treatment for a threat
  • Consider the legal implications of any threats encountered and the countermeasures taken. Document your group work and discussion as per the instructions in topic 2.

Reference no: EM133236770

Questions Cloud

Why is a threat assessment so important to an organization : 1. Why is a threat assessment so important to an organization; both for its business and security benefit.
Othello about desdemona : What is Iago's reason for continuing to follow Othello? What warning does Brabantio give to Othello about Desdemona?
Outline pci-dss compliance in an e-commerce site : This assignment provides you an opportunity to identify an organization's need for PCI-DSS compliance and to analyze the way the process is executed. For this a
Is personal enrichment in knowledge about death : Is personal enrichment in knowledge about death and dying an important aspect of the training and is it important even beyond the nursing aspects
Physical resources at risk : Get together in your assigned groups and discuss the case study as described below.
Evaluating the different forensic tools : Draft a Report Exploring and Evaluating the different Forensic Tools to acquire digital forensic data from Mobile Devices
What is cultural competence : What is cultural competence? Why is it important for healthcare professionals? How do communication skills support organizational culture
Sinners in hands of an angry god : In the application section of "Sinners in the Hands of an Angry God," Edwards provides three similes to which he describes the wrath of God.
How is software security a business issue : How is software security a business issue? Think about it this way, if you had to explain software security to an executive

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd