Reference no: EM133236770
WORKSHOP THREE TITLE
Physical Resources at Risk
Get together in your assigned groups and discuss the case study as described below.
Scenario
In the previous meeting held last week, threats to critical business processes with respect to the logical (software) part of the organisation's informational store have been identified and various countermeasures have been taken to mitigate these threats. At the conclusion of that meeting, the Agenda for this week's meeting was set, which is to discuss threats to the information system directed at or through the physical infrastructure of the company. The head of each business unit was instructed to research the topic and be prepared to discuss their findings at the next meeting.
Tasks
This is the second meeting to be held to discuss the creation of the information security master plan. You will need to discuss threats to critical business processes that are directed at, or through the physical infrastructure of the company.
The head of each Business Unit (BU) is the expert for their individual area and is responsible for guiding discussion within the scope of their BU. The rest of the team will join in the discussion on the viability of each "solution" presented, or present alternative "solution" if any. The best "solution" will be documented for the written submission. While Team consensus is preferable, the CEO may exercise his/her veto power and select one that he/she deems the best if the issue is hopelessly deadlocked. The CEO is also responsible for guiding and monitoring the discussion in general.
You will need to document the results of your discussion for submission and you may make any reasonable assumptions. All assumptions made must be justified and stated clearly in your written submission.
You may find it helpful to:
- Define what is an information system
- Know what are the components of an information system
- You see evidence of physical security every day, at the bank, at the airport, shopping centre, in your place of employment. Use the examples you see daily as a guide, why are they there, what is the purpose, what are they protecting (threats), where are they placed and why.
- Consider what needs to be protected in an information system.
- Consider what sort of physical security measures can be used to protect the information system.
- Know what the CIA triangle is and how it relates to information security
- Consider using risk management in deciding on the proper treatment for a threat
- Consider the legal implications of any threats encountered and the countermeasures taken. Document your group work and discussion as per the instructions in topic 2.