Security plan and training program

Assignment Help Other Subject
Reference no: EM132528491

ICT 205 Cyber Security - Kings Own Institute

Learning Outcome 1: Analyse and evaluate the organisational adoption of security controls
Learning Outcome 2: Design solutions for concrete security problems for distributed applications
Learning Outcome 3: Formulate and evaluate security countermeasures to reduce potential security risks
Learning Outcome 4:
Analyse emerging security threats and controls.

Purpose: The purpose of this assessment is to demonstrate student awareness of current industry and research trends in the field of information security. Analyse and evaluate the organizational adoption of security controls. Design solutions for concrete security problems for distributed applications This assessment contributes to learning outcomes c, d.

Assessment topic: Security Plan and Training Program

Task Details: This assignment requires you to design a security plan based on a given case study. The learning outcomes of this assignment are to recognize the threats that exist in your current or future work place. Through your research, identify the threats, outline security guidelines and develop a robust and pragmatic training programme. You should develop a plan that you would regard as helpful to you, the information user, as well as protecting your organization's information environment. Use your imagination in combination with a wide-range of material.

You are required to complete and submit a security plan based on the following scenario:

Case Study Scenario: You are the recently appointed head of a security team responsible for protecting the information holdings of Innovations IT which is a consulting agency for IT based technologies comprising of 1500 staffs. The organization locates in the central business district of the city. The security team is responsible for administering the security of information from deliberate and accidental threats. The recent information security management team found that the security has not been properly addressed in some key areas such as incident response, disaster recovery, business continuity, social engineering attacks and lack of personnel awareness of the various threats to information, and poor password security. The above issues identified needed urgent remedy. Technical systems were found to be reasonably effective in maintaining database and document management security, and were well serviced by the IT team. As the head of the team, it becomes your responsibility to ask your team to analyze the possible threats and provide a report on the detailed security countermeasures for all the possible threats.

As a part of the security analysis, the tasks of the team are to:

a) Identify and describe the organizational holdings (assets) at risk
b) Identify and describe the potential security threats to the organization
c) Design the necessary security counter-measures to manage and address the threats
d) Develop a comprehensive information security training and awareness program for the users of the organization belonging to the different levels of the organizational hierarchy

Attachment:- Cyber Security.rar

Reference no: EM132528491

Questions Cloud

Compute the future value of a cash flow : Compute the future value of a $125 cash flow for the following combinations of rates and times. (Do not round intermediate calculations. Round your answers to 2
Find the best estimate of total variable manufacturing cost : Find The best estimate of the total variable manufacturing cost per unit is: (Round your intermediate calculations to 2 decimal places.)
How much interest will you earn in the first year : Old Time Savings Bank pays 4% interest on its savings accounts. If you deposit $2,500 in the bank and leave it there: (Do not round intermediate
Comparison of risk between two stocks : While working on portfolio selection, you have got the following information regarding 2 stocks since your firm is considering a special case of Markowitz portf
Security plan and training program : Design solutions for concrete security problems for distributed applications - Analyse emerging security threats and controls
Calculate the variances for each line item in the budget : Develop a flexible budget comparing the actual results for 2016 with the flexible budget for 2016. Calculate the variances for each line item in the budget
Calculate returns for all the portfolios : In the table below expected risk premium is calculated using risk free rate of 4%.
Expectations theory and liquidity premium theory : Differentiate between Expectations theory and Liquidity Premium theory
To what degree are red flag laws constitutional : Post a response that addresses the following: Are red flag laws sufficient for preventing violent crime? Why or why not? To what degree are red flag laws.

Reviews

Write a Review

Other Subject Questions & Answers

  Devise a program to address the needs of crime victims

Why did you select that particular source? Explain in detail - what type of data does that source contain? Describe in detail and what are the basic goals of your proposed program? Explain in detail.

  Define strategies for addressing and correcting the errors

Post Based upon the scenario. Explain if the recommendations are overstated or understated based on the results described in the scenario and explain why.

  Identify a problem or concern in your community

As you have discovered through this course, nurses are influential members of the community and the political system.

  Explain what are implications of the ppaca for public health

What are the implications of the PPACA for public health? In your opinion, do you think that the elimination of copays and deductibles will increase the number of women who have annual mammograms? Justify your answer.

  What is the primary communication problem

1. What is the primary communication problem your team is addressing? What evidence do you have that this is problematic?

  Define what other visual aids or technologies

what the ideal location would be for giving the presentation, and what other visual aids or technologies

  Calculate the standard error for a survey comparing

Calculate the standard error for a survey comparing proportions of cognition-enhancing drug use of fraternity members to non-fraternity members, where

  Business combinations can be domestic or international

In a global world, business combinations can be domestic or international. If business combination is international, U.S. parent company's foreign subsidiaries

  Advantages and disadvantages of the main funding options

Write a report to the board of directors with respect to raising an additional funding of £500 million to enable the next stage of development of international

  Write a memo to solar cos ceo explaining the arbitration

Would your recommendation be different if you were advising XYZ Media's CEO? If so, how?

  Explain social security and medicare

Social Security and Medicare" Please respond to the following. Identify at least two changes that may occur for Social Security and Medicare benefits in the next 20 years. Then, describe key policies that the U.S. government could implement in ord..

  How does credibility form a basis for persuasion

How does credibility form a basis for persuasion? Why do you think that people act as if they know what is going on when they do not

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd