Security plan and training program

Assignment Help Other Subject
Reference no: EM132528491

ICT 205 Cyber Security - Kings Own Institute

Learning Outcome 1: Analyse and evaluate the organisational adoption of security controls
Learning Outcome 2: Design solutions for concrete security problems for distributed applications
Learning Outcome 3: Formulate and evaluate security countermeasures to reduce potential security risks
Learning Outcome 4:
Analyse emerging security threats and controls.

Purpose: The purpose of this assessment is to demonstrate student awareness of current industry and research trends in the field of information security. Analyse and evaluate the organizational adoption of security controls. Design solutions for concrete security problems for distributed applications This assessment contributes to learning outcomes c, d.

Assessment topic: Security Plan and Training Program

Task Details: This assignment requires you to design a security plan based on a given case study. The learning outcomes of this assignment are to recognize the threats that exist in your current or future work place. Through your research, identify the threats, outline security guidelines and develop a robust and pragmatic training programme. You should develop a plan that you would regard as helpful to you, the information user, as well as protecting your organization's information environment. Use your imagination in combination with a wide-range of material.

You are required to complete and submit a security plan based on the following scenario:

Case Study Scenario: You are the recently appointed head of a security team responsible for protecting the information holdings of Innovations IT which is a consulting agency for IT based technologies comprising of 1500 staffs. The organization locates in the central business district of the city. The security team is responsible for administering the security of information from deliberate and accidental threats. The recent information security management team found that the security has not been properly addressed in some key areas such as incident response, disaster recovery, business continuity, social engineering attacks and lack of personnel awareness of the various threats to information, and poor password security. The above issues identified needed urgent remedy. Technical systems were found to be reasonably effective in maintaining database and document management security, and were well serviced by the IT team. As the head of the team, it becomes your responsibility to ask your team to analyze the possible threats and provide a report on the detailed security countermeasures for all the possible threats.

As a part of the security analysis, the tasks of the team are to:

a) Identify and describe the organizational holdings (assets) at risk
b) Identify and describe the potential security threats to the organization
c) Design the necessary security counter-measures to manage and address the threats
d) Develop a comprehensive information security training and awareness program for the users of the organization belonging to the different levels of the organizational hierarchy

Attachment:- Cyber Security.rar

Reference no: EM132528491

Questions Cloud

Compute the future value of a cash flow : Compute the future value of a $125 cash flow for the following combinations of rates and times. (Do not round intermediate calculations. Round your answers to 2
Find the best estimate of total variable manufacturing cost : Find The best estimate of the total variable manufacturing cost per unit is: (Round your intermediate calculations to 2 decimal places.)
How much interest will you earn in the first year : Old Time Savings Bank pays 4% interest on its savings accounts. If you deposit $2,500 in the bank and leave it there: (Do not round intermediate
Comparison of risk between two stocks : While working on portfolio selection, you have got the following information regarding 2 stocks since your firm is considering a special case of Markowitz portf
Security plan and training program : Design solutions for concrete security problems for distributed applications - Analyse emerging security threats and controls
Calculate the variances for each line item in the budget : Develop a flexible budget comparing the actual results for 2016 with the flexible budget for 2016. Calculate the variances for each line item in the budget
Calculate returns for all the portfolios : In the table below expected risk premium is calculated using risk free rate of 4%.
Expectations theory and liquidity premium theory : Differentiate between Expectations theory and Liquidity Premium theory
To what degree are red flag laws constitutional : Post a response that addresses the following: Are red flag laws sufficient for preventing violent crime? Why or why not? To what degree are red flag laws.

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd