Research hot topics related to information security

Assignment Help Basic Computer Science
Reference no: EM132314006

Unit Learning Outcomes

LO3 - Research, develop, and document a basic security policy, and analyse, record, and resolve all security incidents
LO4 - Identify and assess the threats to, and vulnerabilities of networks

Assessment Description

This assessment is designed to help students to research and analyze hot topics related to information security.

Assignment

This is an individual assessment. This report gives you the opportunity to research, formulate, develop and document a basic security policy for a specific organization in Australia ECXEPT for BANKING/MORTGAGE organisation. Moreover, you are required to analyze, record resolve security incidents and identify and assess the threats to. and vulnerabilities of the organisation's networks. This report will use many of the concepts and techniques discussed in this unit throughout the semester.

Please note, you will need to either choose from the list of examples of the industries provided below or come up with your own idea for a chosen specific organisation.

• Hospital/Medical Centre
• Supermarket
• Vehicle rental
• Tourism agency
• Hotel/Motel

• School/ University
• Library
• Aviation operator
• Property Management

Please discuss your chosen organisation and or ideas with your lecturer before you start your research. You must send the organization that you have chosen to your lecturer by Week 5. Please note you might NOT be allowed to choose the same or similar specific organisation as other in your class. You should aim at research, develop, and document answers to questions (a.) and (b.) below. Do not copy the examples of information security policies used in class!

You should state clearly:
• the name of the organisation you have chosen
• the stakeholders of the organisation
• the nature of the business and
• answer questions (a) and (b).

Questions:

(a) Research, formulate, develop and document a strategic security policy for your chosen organisation based on the nature of the organisation and the stakeholders in the organisation.

(b) Based on the security policy you have researched, formulated, developed and documented in the item (a.) above, identify and assess the potential threats and vulnerabilities of the company's network and discuss how such threats and vulnerabilities can be mitigated based on your research.

Verified Expert

This study discusses the diffusion model of new product and how such diffusion can easily affect the performance of the organization. It also explains the diffusion of innovation as a process in which the products are adopted by the target audience. The main purpose of this study is to analyze the diffusion model and aims to integrate some existing theoretical analysis for the diffusion area of the innovation within the discipline of innovation, Sociology and marketing research. It also explains the informational Pathways and impacts of social network with performance metrics. The study also includes the different diffusion model of Roger's five stage process of adoption. The study also explains the domains of adoption of new products and Technological condition of such adoption.

Reference no: EM132314006

Questions Cloud

Major emotional or psychological factors that influence : Post a description of three major emotional or psychological factors that influence both patients and their families
Did the researchers act responsibly and with integrity : What are some moral principles in research that related to the film? Did the researchers act responsibly and with integrity?
What difficulties did a woman composer face : How did the opportunities for women change during the Romantic Period? What difficulties did a woman composer face during this era
Create a digital health infographic to advocate : HST6341-Maternal, Child and Youth Health-Edith Cowan University-Australia-Create a digital health infographic to advocate for the suggested recommendations.
Research hot topics related to information security : ISY3006 - Information Security - Australian Institute of Higher Education - develop and document a strategic security policy for your chosen organisation
How technology-social institutions-population-environment : Which of the following forces contributed to that social change, and how: technology, social institutions, population, environment?
Description of social problem in your community : Description of a social problem in your community. The possible social influences or agents for change to address the problem in your community.
Specifically any of three theoretical perspectives : Using Sociological perspective and Specifically any of three theoretical perspectives. discuss how the social media have changed the way people associate
Create an interactive visualisation : FIT5147 - Data Exploration and Visualisation Assignment - Visualisation Project, Monash University, Australia. Create an interactive visualisation

Reviews

len2314006

5/30/2019 2:10:00 AM

• Cover Page - your name, ID, subject, date, report title and WORD COUNT • Executive Summary • Table of Contents - listed sections (and sub-sections if required) • Introduction - Brief and clear introduction • Body • References-listing of all cited literature. A small number of high-quality references strategically used is the main aim here. Formatting Guide Font: Times New Roman 12pt for paragraph text, 14pt bold for headings, with single paragraph breaks between paragraphs. Line Spacing: 1.5, Margins: 2cm all around Alignment: left-aligned.

Write a Review

Basic Computer Science Questions & Answers

  Rest of the project activities

Please provide me of a good example that will help throughout the rest of the project activities. Please do not copy and paste from other sources to complete this assignment.

  Importance of effective interaction and liaison

Discuss, in detail the importance of effective interaction and liaison between the client and the contractor, in project management.

  Denote the shortest distance from node 1 to node i

Sequentially, for k = 2, 3,..., denote by di(k) the minimum of the lengths of paths from 1 to i that have length greater than di(k - 1) [if there is no path from 1 to i with length greater than di(k - 1), then di(k) = ∞]. We call di(k) the k-level..

  Likelihood of a threat associated with the vulnerability

Because it is not your office you tell the resident of the office to contact the maintenance person and have it fixed. After leaving, you fail to follow up on whether the windows was actually repaired. What affect will this have on the likelihood ..

  Write the definition of a method

Write the definition of a method , isReverse , whose two parameters are arrays of integers of equal size. The method returns true if and only if one array is the reverse of the other. ("Reverse" here means same elements but in reverse order.)

  Discuss the common components of class apple

Discuss inheritance from class Apple for other closely related derived classes; and Discuss the common components of class Apple.

  Design an algorithm in pseudocode to solve

Design an algorithm in pseudocode to solve this problem. Make sure to include steps to get each input and generate each output

  How many pages does a process have

A machine has a 32 bit virtual address space and a 16kb page size. It has 1gb of physical memory. How many pages does a process have? How many bytes are needed for a page table, assuming 4 control bits and that disk addresses are stored elsewhere?

  Define a class arrayset that represents a set

Define a class ArraySet that represents a set and implements the interface described in Project 1a of the previous chapter. Use the class ResizableArrayBag in your implementation. Then write a program that adequately demonstrates your implementati..

  Explain the operation of the modified register

The other input of the NAND gate provides a parallel-load control. Explain the operation of the modified register.

  Developing the project scope statement

You are a project manager for XYZ's garment company. You're heading up a project to promote a new line of souvenirs to be sold at the shows.

  Current business problem or area for improvement

Write a two-page executive summary for your boss explaining how a relational data solution can be applied to a current business problem or area for improvement.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd