Why information security is important

Assignment Help Computer Network Security
Reference no: EM132506526

Business Case Scenario: Aloe Insurance AS (henceforth referred to as Aloe) is a Norwegian financial services firm listed on the Oslo Stock Exchange.

Problem Task 1: Presentation (Power point with voice recording)

Explain to the members what Information Security is Motivate why Information Security is important, considering the context of the organization and threat landscape Summarize where Information Security fits into and forms part of the larger ICT governance and corporate governance structures within the firm Highlight the results from your preliminary risk landscape analysis (Task 2)

State the risks that you identified and their severity rating
Motivate the severity of the risks by explaining how it could impact the firm
Suggest any mitigating control (not device/system/technology specific, see e.g. ISO27002 control/s that could mitigate the risk)
Briefly motivate why implementing controls in isolation won't be as effective as implementing an ISMS
Outline and briefly explain the phases that Aloe will have to undertake if they were to implement an ISMS based on the "ins2outs" 7-step approach discussed in Lecture 6

You need to outline to the executive, the phases of an ISMS implementation and briefly explain each phase to them (i.e. requirements, outputs etc.), walk them through the phases

To add value to your presentation and to solidify the importance and need for information security management within Aloe, you want to outline potential risks that already exist within Aloe, considering the context of the firm (industry, revenue, services, client data processing and storage etc.). Therefore, in preparation for this presentation to ExCo, you want to have meetings with various managers within the broader ICT function to identify obvious risks in their current processes. The point of this exercise is to emphasize to the executive, that without any extensive analysis or audit, you are able to identify major information security risks in the organization.

As such, you had meetings with various department heads, and operational ICT staff, to assess and gain a high-level overview of existing information security risks that have been overlooked in the past, and doing so without conducting an extensive risk assessment (due to 2 week time limit, and also because an extensive information security risk assessment will be conducted as part of the ISMS roll-out). Notes from your meetings are detailed below:

"...We are running monthly backups to our onsite server on our ClaimHub system, which stores and processes all insurance claims. Our data center is quite impressive, didn't even need to set up a secondary site, got all we need here..."

"...we had some issues with processing timeframes for new life insurance applications, so we resorted to just setting up a network share drive for all the guys in the life insurance department so they could copy the application and supporting docs like ID's etc. to the network for everyone to access easily, we sent an email to the department telling people they should respect privacy and only work on their own client documents..."

"...all employees have access to the ClaimHub system, we did of course lock down the Admin account, about 8 of us in the infrastructure team have access to the Admin account so we can easily implement changes to the system code and so forth when we're having issues..."

"...when an insurance claim has been processed on ClaimHub, it is sent to our client relations team in Bergen. We set up an ftp link with the AloePay system so the two systems can communicate and share data. The team in Bergen can therefore easily view newly processed claims and make any payouts to clients..."

Problem Task 2: Supporting Document

Prepare a report to hand out at the ExCo meeting, detailing the risks that you were able to identify during your meetings with ICT staff:
Summary of the organization (0.5 page). This is as explained in your own words, a summary of what Aloe does, the industry in which it operates and its value proposition.

Introduction outlining what you did
Explain in a short paragraph the process you followed to come to the conclusions in the report (extrapolate from the scenario and fill in any blanks regarding methodology you followed etc.)
Detail the identified risks:
Each risk should be contained in its own sub-section,
No longer than one page per risk

As seen in Figure 1, each risk should document the following:

Describe the risk within context of Aloe, explaining what the risk is and why it is a risk

Give the risk a risk rating (Figure 2), based on your professional judgment, considering the impact and likelihood of the risk materializing (Figure 3) in the organizational context

Summarize the potential impact this risk could have on Aloe, should it materialize

Outline potential control/s that could be implemented to mitigate this risk (reference any control from ISO27002) and explain why it could mitigate the risk

Attachment:- Assignment Case Details.rar

Reference no: EM132506526

Questions Cloud

Define what is meant by cumulative voting system : Define what is meant by cumulative voting system. Explain how a cumulative voting system allows minority shareholders to elect a board of directors
ENG200 Business Communication Assignment : ENG200 Business Communication Assignment Help and Solution, Emirates College of Technology - Assessment Writing Service
What is the the present value that expect to receive : What is the the present value of $10,000 that you expect to receive in 10 years if the interest rate is 5% from years 0 to 5 and 7% from year 5 to 10?
What are the major challenges facing the multilateral : What are the major challenges facing the multilateral trade system and how can they be addressed?
Why information security is important : Explain to the members what Information Security is Motivate why Information Security is important, considering the context of the organization
Assess culture of the organization for potential challenges : Assess the culture of the organization for potential challenges in incorporating the nursing practice intervention. Use this assessment when creating.
Which in turn caused the price of natural gas to rise : In 2007, the price of oil increased, which in turn caused the price of natural gas to rise. This can best be explained by saying that oil and natural gas
Explain the development stages of the project : A literature review analyzes how current research supports the PICOT, as well as identifies what is known and what is not known in the evidence. Students will.
Given an increase in input price : Suppose that real domestic output in an economy is 20 units, the quantity of inputs is 10, and the price of each input is $4. Given an increase in input price

Reviews

Write a Review

Computer Network Security Questions & Answers

  Benefits of having a computer security

In your report, discuss the benefits of having a computer security incident response team within your enterprise. Also discuss the major steps involved in responding to a system security incident. Support your report with real-life examples.

  Hacking occurred and the organization had the right plan

Security Computer forensics and hacking go hand in hand. Discuss in (Need 2 Reports with 2 pages each report = 4 Total Pages), two cases where hacking occurred and the organization had the right plan in place to combat the hack. Describe the proce..

  Cyber-terrorist crime and security breach

Large Commercial Corporation has witnessed a terrorist security breach of network, and has discovered one laptop on the scene belonging to victim.

  Applications of private and public key cryptography

Explain why GPG encryption and decryption are quite fast - Create a file of close to 1 MB size and encrypt and decrypt it and note the time taken. Comment on the reason why this much time has taken.

  Provide a thread describing a recent it security threat

Research your local paper or website and provide a thread describing a recent IT security threat or issue - simple as a new operating system patch, new virus

  Provide a report - an industry perspective of cyber security

Brief introduction to the topic, stating clearly the name and credentials of the presenter and brief overview of what the lecture was about and then setting out the interesting aspects that you are going to be covering in more detail  in your ..

  Define the mission statement for your business

Define the mission statement for your business. Develop a technology architecture plan. The datacenter has five servers. Each server hosts different services: HTTPS, DNS, Secure File Sharing, Email, and Collaboration Software.

  What is a vpn and what technologies are used to create one

How are authentication and authorization alike and how are they different. What is the relationship,if any,between the two? What is a VPN and what technology.

  Provide a least two examples of security knowledge

Provide a least two examples of security knowledge that would assist you in preparing for or preventing a threat. Explain the time-sensitive nature of the knowledge.

  Analyze issue using social contract and rule utilitarianism

Analyze issue using Social Contract, Kantianism, Act Utilitarianism, Social Contract Theory, Virtual Ethics and Rule Utilitarianism.

  Critical to information security in the modern day

When considering the most critical to information security in the modern day, one of the most credible is one that has seen a recent increase in occurrence over the past decade. Deliberate software attacks on company information systems have becom..

  Encryption in investigations

Encryption in Investigations-Discuss in your own words the effects that encryption can have on incident response activities, and explain how the use of encryption technologies could prove to be detrimental to an investigation

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd