Reference no: EM132636204
ISY3006 Information Security - Australian Institute of Higher Education
Learning Outcome 1: Research, develop, and document a basic security policy, and analyse, record, and resolve all security incidents
Learning Outcome 2: Identify and assess the threats to, and vulnerabilities of networks
Assignment
This is an individual assessment. This report gives you the opportunity to research, formulate, develop and document a basic security policy for a specific organization in Australia ECXEPT for BANKING/MORTGAGE organisation. Moreover, you are required to analyze, record, resolve security incidents and identify and assess the threats to, and vulnerabilities of the organisation's networks. This report will use many of the concepts and techniques discussed in this unit throughout the semester.
Please note, you will need to either choose from the list of examples of the industries provided below or come up with your own idea for a chosen specific organisation.
Hospital/Medical Centre
Supermarket
Vehicle rental
Tourism agency
Hotel/Motel
School/University
Library
Aviation operator
Property Management
Please discuss your chosen organisation and or ideas with your lecturer before you start your research. You must send the organization that you have chosen to your lecturer by Week 5. Please note you might NOT be allowed to choose the same or similar specific organisation as other in your class. You should aim at research, develop, and document answers to questions (a.) and (b.) below. Do not copy the examples of information security policies used in class!
You should state clearly:
the name of the organisation you have chosen the stakeholders of the organisation
the nature of the business and answer questions (a) and (b).
Questions:
(a.) Research, formulate, develop and document a strategic security policy for your chosen organisation based on the nature of the organisation and the stakeholders in the organisation.
(b.) Based on the security policy you have researched, formulated, developed and documented in the item (a.) above, identify and assess the potential threats and vulnerabilities of the company's network and discuss how such threats and vulnerabilities can be mitigated based on your research.
Attachment:- Information Security.rar
Agenda comparison grid
: Using the information, you recorded in Part 1: Agenda Comparison Grid, complete the following to document
|
Policies enacted under the clinton administration
: Please identify and describe two policies enacted under the Clinton administration.
|
What is the first-past-the-post system
: What is the first-past-the-post system and how does it operate in Canada?
|
Why the article will be useful in addressing your problem
: Use articles that will help you explain and describe cultural and/or ethical, legal or regulatory issues related to your topic. You will analyze and evaluate.
|
Strategic security policy
: Research, develop, and document a basic security policy, and analyse, record, and resolve all security incidents and Identify and assess the threats to
|
Prepare the balance sheet tiffany for the year
: Prepare the balance sheet Tiffany's for the year ended December 31. (Be sure to list the assets and liabilities in order of their liquidity.)
|
War on poverty lbj and the war on poverty
: Policy tends to follow particular patterns. One such pattern is that the passage of major social welfare policy changes
|
What is an empirical theory and testable hypothesis
: What is an empirical theory and testable hypothesis for the research question
|
Find what is the ending balance of allowance for doubtful
: Find What is the ending balance of Allowance for Doubtful Accounts at December 31, 2018, after all entries and adjusting entries are posted?
|