Physical resources at risk

Assignment Help Other Subject
Reference no: EM133236770

WORKSHOP THREE TITLE

Physical Resources at Risk

Get together in your assigned groups and discuss the case study as described below.

Scenario

In the previous meeting held last week, threats to critical business processes with respect to the logical (software) part of the organisation's informational store have been identified and various countermeasures have been taken to mitigate these threats. At the conclusion of that meeting, the Agenda for this week's meeting was set, which is to discuss threats to the information system directed at or through the physical infrastructure of the company. The head of each business unit was instructed to research the topic and be prepared to discuss their findings at the next meeting.

Tasks

This is the second meeting to be held to discuss the creation of the information security master plan. You will need to discuss threats to critical business processes that are directed at, or through the physical infrastructure of the company. 

The head of each Business Unit (BU) is the expert for their individual area and is responsible for guiding discussion within the scope of their BU. The rest of the team will join in the discussion on the viability of each "solution" presented, or present alternative "solution" if any. The best "solution" will be documented for the written submission. While Team consensus is preferable, the CEO may exercise his/her veto power and select one that he/she deems the best if the issue is hopelessly deadlocked. The CEO is also responsible for guiding and monitoring the discussion in general.

You will need to document the results of your discussion for submission and you may make any reasonable assumptions. All assumptions made must be justified and stated clearly in your written submission.

You may find it helpful to:

  • Define what is an information system
  • Know what are the components of an information system
  • You see evidence of physical security every day, at the bank, at the airport, shopping centre, in your place of employment. Use the examples you see daily as a guide, why are they there, what is the purpose, what are they protecting (threats), where are they placed and why.
  • Consider what needs to be protected in an information system.
  • Consider what sort of physical security measures can be used to protect the information system.
  • Know what the CIA triangle is and how it relates to information security
  • Consider using risk management in deciding on the proper treatment for a threat
  • Consider the legal implications of any threats encountered and the countermeasures taken. Document your group work and discussion as per the instructions in topic 2.

Reference no: EM133236770

Questions Cloud

Why is a threat assessment so important to an organization : 1. Why is a threat assessment so important to an organization; both for its business and security benefit.
Othello about desdemona : What is Iago's reason for continuing to follow Othello? What warning does Brabantio give to Othello about Desdemona?
Outline pci-dss compliance in an e-commerce site : This assignment provides you an opportunity to identify an organization's need for PCI-DSS compliance and to analyze the way the process is executed. For this a
Is personal enrichment in knowledge about death : Is personal enrichment in knowledge about death and dying an important aspect of the training and is it important even beyond the nursing aspects
Physical resources at risk : Get together in your assigned groups and discuss the case study as described below.
Evaluating the different forensic tools : Draft a Report Exploring and Evaluating the different Forensic Tools to acquire digital forensic data from Mobile Devices
What is cultural competence : What is cultural competence? Why is it important for healthcare professionals? How do communication skills support organizational culture
Sinners in hands of an angry god : In the application section of "Sinners in the Hands of an Angry God," Edwards provides three similes to which he describes the wrath of God.
How is software security a business issue : How is software security a business issue? Think about it this way, if you had to explain software security to an executive

Reviews

Write a Review

Other Subject Questions & Answers

  Explain the creative technique used to capture the attention

Explain the creative techniques used to capture the attention of the audience. Identify and explain the values and points of view that are contained within the message and those that are omitted from the message.

  Philosophies-classical or positivist

Which of the two philosophies (classical or positivist) do you believe explains criminal behavior in a much more complete manner?

  Differences between virtue theory-utilitarianism-deontologic

Write a 350- to 700-word essay comparing the similarities and differences between virtue theory, utilitarianism, and deontological ethics. Include the following in your essay:

  CHCECE007 Develop positive and respectful relationships

CHCECE007 Develop positive and respectful relationships with children Assignment Help and Solution, Job Training Institute - Assessment Writing Service

  Examples of division of labor and traditional gender roles

What are some examples of the division of labor and traditional gender roles within a family and have they changed over time? What is family satisfaction

  Fulfill our ethical obligations

In any social science research study, our main concern is to make sure that we, as researchers, fulfill our ethical obligations.

  How could your organization operate with virtual teams

How could/or does your organization operate with virtual teams now or in the future? What are some of the ethical principles that your organization operates.

  Describe the function of the baseline behavior

Describe the function of the baseline behavior

  Write summary about the videos

Watch these three videos and write summary about it. SuperheroYou - Jim Kwik Memory Part 1 (Remembering Names & Faces) (By Superhero You)

  Summarize how shaw-mckay would account for the high crime

Shaw and McKay developed their theory nearly 100 years ago. Do their arguments still apply today? What do the high crime neighborhoods look like now (versus early 1900s Chicago neighborhoods) and does this present any problems for their explanat..

  What tools would you use to gather data for the proposal

What tools would you use to gather data for the proposal to make the case for wireless laptops in clinical service lines? Why? I need this in about 200 words.

  What is your opinion of including foods that contain fat

What is your opinion of including foods that contain fat in your daily food plan? What advice would you give to a friend or relative about fat consumption and food choices?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd