The application of knowledge to an actual organisation

Assignment Help Basic Computer Science
Reference no: EM13915252

Background

This assignment is an exercise in the application of knowledge to an actual organisation and the compilation and presentation of the findings in the format of a sophisticated report - well edited, attractive, and professionally laid out and academically sound. 

Deliverables

This Individual assignment constitutes 70% of your module mark. It consists of a single portfolio style document. The due date for this assignment is 01-JAN-2016. Late work will be dealt with as per the university regulations. Please ensure that you:

? Complete and sign the cover sheet

? Submit the work by the due date

? Submit the work as a word document to Moodle.

Task The following headings are indicative of what should be included and provide a guideline:

You are required to assess the information security situation in a selected company and prepare a security plan that includes recommendations for improvements. Assume that the selected company plans to use mobile devices and cloud for storing important documents and utilizing virtual resources.

You are responsible for overseeing the security of information from deliberate and accidental threats. Assume some engineersreported that some of their documents experienced a security attack recently. Management has directed to undertake some security analysis and planning to improve the company's information security.

You must address at least the following in the report.

1. Identify and describe the main categories of information assets that may be at risk and have to be protected.

2. Appraise the actual and potential threats to and vulnerabilities of the Company's information assets.

3. Evaluate the challenges in information security related to the use of mobile application.

4. Discuss the factors distinguish mobile security fromtraditional computer security.

5. Reviews the recent prevention and detection techniques used to protect information at the mobile devices.

6. Analyse the threats and data privacy issues related to the use of cloud.

7. Develop a security plan that describes counter-measures that will manage the threats that put the company's information assets at risk from a risk management perspective.

8. Develop a comprehensive information security education and awareness programme for use by management, staff and contractors for the selected organisation.

9. Recommendations you can make to improve the information security situation of the company.

10. Presentations in the form of PowerPoint slides 

Note:

11. Evidence of your research into the topic (This might be a single article, or you may wish to append citations andreferences, posts, emails, web pages etc)

12. A critical evaluation of the topics - show us what you think and how you justify your argument or recommendations.

13. Just ensure that you are able to convince your marker that you have been actively researching, reading, and turning your research into decision-level knowledge.

Reference no: EM13915252

Questions Cloud

What was her approximate real rate of return on investment : Christina purchased 200 shares of stock at a price of $62.30 a share and sold them for $70.25 a share. She also received $148 in dividends. If the inflation rate was 4.2 percent, What was her approximate real rate of return on this investment? Over a..
Direct and indirect method : Prepare statement of cash flows using the direct and indirect method.
Workers at a wage : A firm can hire 10 workers at a wage of $10 but has to pay a wage of $12 to ALL workers to get the 11th worker. What is the marginal cost of adding the 11th worker.
Closed the revenue expense and dividend accounts : Inman Co. completed the following transactions in 2013, the first year of operation:
The application of knowledge to an actual organisation : This assignment is an exercise in the application of knowledge to an actual organisation and the compilation and presentation of the findings in the format of a sophisticated report - well edited, attractive, and professionally laid out and academica..
What will the operating cash flow be if output falls : At an output level of 15,400 units, you have calculated that the degree of operating leverage is 2.00. The operating cash flow is $58,000 in this case. Ignoring the effect of taxes, what are fixed costs? What will the operating cash flow be if output..
Expansion project-requires initial fixed asset investment : Quad Enterprises is considering a new three-year expansion project that requires an initial fixed asset investment of $2.49 million. The fixed asset will be depreciated straight-line to zero over its three-year tax life, after which time it will be w..
How are assets liabilities common stock retained earnings : Define debit and credit. How are assets, liabilities, common stock, retained earnings, revenues, expenses, and dividends affected (increased or decreased) by debits and by credits?
How is the balance of an account determined : How is the balance of an account determined?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Compare and contrast the loosely coupled architecture

Compare and contrast the loosely coupled architecture to a tightly coupled architecture in terms of TCO, maintenance, and implementation issues.

  Security threats and vulnerabilities of the itrust database

The length of this paper should be 5-7 pages double spaced not inclusive of the title or reference pages and include all completed Tables as appendices. Prepare your report in either Word or PDF format, as your instructor requires, and post it ..

  Design a class named fan to represent a fan

Design a class named Fan to represent a fan. The class contains: * Three constants named SLOW, MEDIUM, and FAST with values 1, 2, and 3 to denote fan speed.

  Why are you normally required to bind a service

What steps need to be taken by a network service to be ready to receive TCP/IP connections? Why are you normally required to bind a service to a specific port?

  How to motivate your employees

Describe also how to motivate your employees to accept the change and positively contribute to it and show its advantages and disadvantages. Characterise differences between the regions when appropriate.

  Explain how versatility of excel affect application support

How does versatility of Excel affect application support? As its versatility, what assumptions should be made when diagnosing and troubleshooting Excel-based problems?

  The two main forms of documentation

The two main forms of documentation of program design are flowcharts and pseudcode. Based on this week's text chapter and some relevant web resources, discuss the differences between flowcharts and pseudocode, as well as their merits and faults.

  Design a tick tac toe game

Design a Tick Tac Toe Game. You must use Arrays to represent the board You may use Pointers

  What is the expected total number of tickets receive

In an arcade, you play game A 10 times and game B 20 times. Each time you play game A, you win with probability 1/3 (independently of the other times), and if you win you get 3 tickets (redeemable for prizes), and if you lose you get 0 tickets. Game ..

  What is called a whitespace character

Given an int variable modelYear write a statement that assigns true to norecall if the value of modelYear does NOT fall within the two recall ranges and assigns false otherwise. Do not use an if statement in this exercise!

  Demonstrate ability to collaborate with peers to analyse and

Demonstrate ability to collaborate with peers to analyse and solve business problems with information technologies, and present the solution in a team report.

  Provide an implementation of the mymaximum function

Provide an implementation of the mymaximum function whose declaration is shown above. The first argument of the function is an array of int and the second argument is the number of ints that are in the array. The function returns the largest int t..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd