Write a report on information security risk management

Assignment Help Computer Networking
Reference no: EM132372283 , Length: word count:3000

Information Security Management Assignment -

Objectives - In this assessment task, you will analyse the scenario and discuss in a report as to how you apply the principles of information security risk management as well as information security certification and accreditation to the organisation in the given scenario.

Assessment Task - You are required to analyse and write a report on

a) guidelines for information security risk management

b) guidelines for information security certification and accreditation for the organisation described in the scenario.

You should ensure that you support your discussion with references and justify the content of your discussion.

Your report should include:

1. Executive Summary

2. Table of Contents

3. Introduction

4. Discussion

5. Conclusion

6. References

Note - Length: 3000 words (±500 words) and you must follow the Harvard citation and referencing guidelines.

The Scenario for Information Security Management Assessment Tasks

FuturePlus is a newly established, independent charity organisation helping disadvantaged Australian students to continue their education, giving them a chance to a future full of possibilities. To start with, the support includes payments for tuition fees and educational supplies, as well as for student accommodations. However, the organisation plans to develop and offer more programs to help the disadvantaged students, for example, early intervention and tutoring programs. The costs are covered through public donations. FuturePlus collects one-off as well as monthly donations through their website equipped with a secure payment system. They also run special fund-raising drives twice a year by advertising about the event on national television, on their website, and via SMS and e-mails sent to donor list extracted from their donor database.

To manage the operations of the organisation, they have recruited both full-time as well as casual staff. The full-time staff consist of an Operating Manager, an Accountant, a Planning Officer, two Case Officers, and three support staff. There are three casual staff providing extra support to the Case Officers with eligibility checks and visits to the candidate students, also providing updates on students who receive help from FuturePlus. However, the organisation is planned to grow in the number of staff members, and students they support in the next few years.

FuturePlus operates from Sydney CBD, occupying one floor of a high-rise building. They have got their network designed and rolled out by your company, with all the servers located in their premise, and have employed your company to provide them ongoing network support. Their office network site is connected to the Internet via 5G cellular wireless technology. They require their database servers and the website to be up and running 24/7. FuturePlus provides their casual staff with portable devices to take on-site case notes during their site visits and send these to the office via secure communications. Since they store sensitive information about their donors, students receiving donations, as well as payment details such as bank account and credit card information, it is of utmost importance that their servers and communications over the Internet are completely secure.

FuturePlus has requested your company's service of designing a suitable information security program for their organisation.

Reference no: EM132372283

Questions Cloud

What are the alleged behaviors and characteristics : Socrates once said, "The unexamined life is not worth living". Think about that for a moment. An unexamined life. What is that? Well, it is a reflection.
How the ecological perspective of assessment influenced : Create an eco-map to represent Claudia's situation. Describe how the ecological perspective of assessment influenced how the social worker interacted.
How have the groups affected by concern changed over time : As an astute social worker and professional policy advocate, you must be adept at identifying social problems homeless in veterans that exist in your community.
Explain what you mean by this claim or statement : Does Michelangelo's sculpture, PIETA, demonstrate more Hellenic or Hellenistic qualities? Or, does it contain qualities from both sculpture periods?
Write a report on information security risk management : COIT20263 Information Security Management Assignment, Central Queensland University, Australia. Write a report on information security risk management
Write the code for the make appointment screen : Agile system development approach by working in pairs in an iterative and incremental manner to write code and conduct unit and integration tests
Prepare a bibliography of journal article : Each student will prepare a bibliography of 4 journal articles on a disorder listed in the DSM 5. The articles selected MUST be appropriate to the topic you.
Discuss the impact and relationship of the auditing standard : ACC6030–Auditing and Assurance Services-Edith Cowan University-Australia- Investigate the facts of the case study and using the risk-based auditing approach.
Describe one traumatic reaction you noticed : Post the identity of the military personnel you selected and describe one traumatic reaction you noticed. Explain how you might normalize this reaction.

Reviews

len2372283

9/18/2019 3:47:49 AM

Length: 3000 words (±500 words). This assessment task relates to the Unit Learning Outcomes 3 and 4 and can be undertaken in a group of up to 4 members or individually. Distance students can form groups with on-campus students as well. Note: You must follow the Harvard citation and referencing guidelines. Check the unit website at least once a week for further information relating to this assessment task. Please ensure that you write your report in your own words to avoid possible plagiarism and copyright violation.

len2372283

9/18/2019 3:47:43 AM

Assessment Criteria - You are assessed on your ability to apply the principles of information security risk management as well as information security certification and accreditation to the organisation in the given scenario. The marking criteria for Assessment Item 3 are provided on page 4. You need to familiarise yourself with the marking criteria to ensure that you have addressed them when preparing your report.

len2372283

9/18/2019 3:47:38 AM

Submission - Each of you in the group must upload the same written report as a Microsoft Office Word file through the COIT20263 Moodle unit website assessment block on or before the due date. A group member who fails to submit the assessment item will not be awarded any marks for the assessment. Late submissions will incur the penalty as per university’s ASSESSMENT POLICY AND PROCEDURE. Marking Criteria - Used decimal notation. Included all headings and page numbers. Used ToC auto-generation. Used Roman i for the Executive Summary page. Executive Summary was before the Introduction. Used a new page. Set the scene for the report and described the purpose clearly. Explained the research method used. Outlined the sections of the report. Started from a new page. Thorough and detailed discussion supported by in-text references and justifications.

Write a Review

Computer Networking Questions & Answers

  Identify and list all entities described in user requirement

MN405 Data and Information Management Assessment- Data model development and implementation. Melbourne Institute of technology. Determine functional dependences

  Problem solving in networked application management

MN504 - Networked Application Management - Critical Analysis and Problem Solving in Networked Application Management

  Challenge in networked information systems

Overview of Network Security - Potential threats and mitigation tools for ransomware - Analyse and discuss common emerging threats, attacks, mitigation

  Design uml and use case diagram

You have access to the resources of the College. Officially enrolled students are automatically authorized to use the library resources. A College ID card will he required to use resources for both students and staff.

  Expiration and garbage collection timersare

Router X does not receive any update for another 90s.  How many periodic, expiration and garbage collection timersare now running in router X?

  Your company produces a product that weighs 750 gramsthe

your company produces a product that weighs 750 grams.the weight specification for the packaging container is lt 50

  Different connection services in transport layer

Explain about different connection services in transport layer with suitable diagram

  Show the ipv-six loopback address

Using the CIDR notation, show the IPv6 address mapped to the IPv4 address 129.6.12.34. Using the CIDR notation, show the IPv6 loopback address.

  Mobile and data networking

In the area of wireless communications, LTE technology is used in mobile and data networking.

  What is the format of the graft message

Use netstat to find if your server supports multicast addressing. Find the format of the DVMRP prune message. What is the format of the graft message?

  Create four subnets having same number of ip addresses

Suppose it wants to create four subnets from this block, with each block having the same number of IP addresses. What are the prefixes (of form a.b.c.d/x) for the four subnets?

  Explain ways that automation can improve our sa productivity

Explain several ways that automation can improve our SA productivity. What two common SSA tasks might benefit most from automation and how can we apply it to them.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd