Security plan and training program

Assignment Help Other Subject
Reference no: EM132774639

Assessment

Purpose: The purpose of this assessment is to demonstrate student awareness of current industry and research trends in the field of information security. Analyse and evaluate the organizational adoption of security controls. Design solutions for concrete security problems for distributed applications This assessment contributes to learning outcomes c, d.

Assessment topic: Security Plan and Training Program

Task Details: The assignment requires you to design a security plan based on a given case study. The learning outcomes of this assignment are to recognize the threats that exists in your current or future work place. Through your research, identify the threats, outline security guidelines and develop a robust and pragmatic training programme. You are required to complete and submit a security plan based on the following scenario.

Case Study Scenario: No computer or workstation is immune to compromise. University information and network assets are of significant value and protecting them is the responsibility of everyone handling these assets. Every department is expected to develop a security plan.

The security team is responsible for administering the security of information from deliberate and accidental threats. The security management team is responsible to address security in some key areas such as social engineering attacks, password security and other possible threats to the organization. The IT Security Plan and process is the first step to eliminating the bulk of vulnerabilities which cause compromises:

Prepare a report to address the following:
1. Take an inventory of your physical and information assets (what are you protecting)
2. Perform a risk assessment to determine what level of security is needed to protect your information assets.
3. Evaluate your findings and discuss recommendations to correct deficiencies and/or improve security with departmental and IT staff
4. Develop a security plan and security policy
5. Develop a training program to create awareness of the policy among the users of the organization

Harvard Anglia referencing style.

Reference no: EM132774639

Questions Cloud

Compute the amount of borrowing cost to be capitalized : Grumpy Company borrowed P2,000,000 specifically to finance the cost of constructing a regional office. Compute the amount of borrowing cost to be capitalized
Calculate the additional paid-in-capital that be recorded : Direct and indirect costs of issuing common shares, Calculate the additional paid-in-capital that should be recorded by PT Pratama Tbk from the transaction.
Which of the statements is true concerning working capital : Which of the statements is true concerning working capital? When working capital is negative, the company has a liquidity problem.
What is the purpose of the staffing component : What is the purpose of the staffing component in an informal proposal? To call for action and to present am offer prior to signing a binding contract.
Security plan and training program : Perform a risk assessment to determine what level of security is needed to protect your information assets - Develop a security plan and security policy
What type of proposal of george : What type of proposal of George? George's boss would like him to send a proposal to upper management requesting additional services for leadership
Choose a publicly-traded stock that has not been chosen : Choose a publicly-traded stock that has not been chosen by other students, assume you bought that stock 6 months ago
How is a proposal similar to a feasibility report : How is a proposal similar to a feasibility report? It researches a problem and present a recommended action. / It explains an issue.
How much would it be willing to lend the business owner : If the bank is charging customers 7.5 percent APR, how much would it be willing to lend the business owner?

Reviews

Write a Review

Other Subject Questions & Answers

  Purpose of computer controls and auditing in digital economy

Describe the processes use in the development of computer-based systems/ERP and the ways in which processes are managed

  Discuss about a particular culture or generational group

Choose a particular culture/ subculture or Generational Group (GENXers, Millennial, Baby Boomers, etc.) in the United States or choose your own culture.

  Analyze any two types of qualitative research methods

Analyze and describe any two types of qualitative research methods. Explain the advantages and disadvantages of qualitative as well as quantitative research.

  When looking at risks in the project environment

a) When looking at risks in the project environment, why are we concerned with the impact and probability of a potential risk event? b) How could you sort through a long list of risks in a project so that focus is placed on the most important o..

  Review the book - amusing ourselves to death

Summary and review of ONE of the following books: "Amusing Ourselves to Death" by Neil Postman.

  What are the training objectives

When designing the training program for your organization, consider the following questions: Why is the training needed? How does the training support the organization's strategic plan (mission, vision, goals)? Who will be trained? What are the train..

  Conduct a one-factor fixed effects anova using spss

Using the survey 1 dataset from the website, use SPSS to conduct a one-factor fixedeffects ANOVA, including effect size, where political view is the grouping.

  Create a list of best practices to follow in field of health

Create a list of three best practices to follow in field of health services administration. Rank best practices in order of importance and provide a rationale.

  Discuss about the use of smart phones and technology

The use of smart phones and technology has become even more important to marketers. What are your thoughts on Social Media in terms of influencing consumer.

  Describe educational and long term goals

Describe your educational and long term goals; what part your college education plays in achieving them; and any supporting evidence that indicates

  Discuss your feelings about bounded awareness

How has bounded awareness prevented you from making a good decision in your life or business?

  Discuss the cultural environment of one country

developed country in which an office or subsidiary of a U.S.-based global organization or MNE exists. for a list of global organizations and discuss the cultural environment of one country in which a U.S.-based MNE exists.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd