Write a report on information security risk management

Assignment Help Computer Networking
Reference no: EM132372283 , Length: word count:3000

Information Security Management Assignment -

Objectives - In this assessment task, you will analyse the scenario and discuss in a report as to how you apply the principles of information security risk management as well as information security certification and accreditation to the organisation in the given scenario.

Assessment Task - You are required to analyse and write a report on

a) guidelines for information security risk management

b) guidelines for information security certification and accreditation for the organisation described in the scenario.

You should ensure that you support your discussion with references and justify the content of your discussion.

Your report should include:

1. Executive Summary

2. Table of Contents

3. Introduction

4. Discussion

5. Conclusion

6. References

Note - Length: 3000 words (±500 words) and you must follow the Harvard citation and referencing guidelines.

The Scenario for Information Security Management Assessment Tasks

FuturePlus is a newly established, independent charity organisation helping disadvantaged Australian students to continue their education, giving them a chance to a future full of possibilities. To start with, the support includes payments for tuition fees and educational supplies, as well as for student accommodations. However, the organisation plans to develop and offer more programs to help the disadvantaged students, for example, early intervention and tutoring programs. The costs are covered through public donations. FuturePlus collects one-off as well as monthly donations through their website equipped with a secure payment system. They also run special fund-raising drives twice a year by advertising about the event on national television, on their website, and via SMS and e-mails sent to donor list extracted from their donor database.

To manage the operations of the organisation, they have recruited both full-time as well as casual staff. The full-time staff consist of an Operating Manager, an Accountant, a Planning Officer, two Case Officers, and three support staff. There are three casual staff providing extra support to the Case Officers with eligibility checks and visits to the candidate students, also providing updates on students who receive help from FuturePlus. However, the organisation is planned to grow in the number of staff members, and students they support in the next few years.

FuturePlus operates from Sydney CBD, occupying one floor of a high-rise building. They have got their network designed and rolled out by your company, with all the servers located in their premise, and have employed your company to provide them ongoing network support. Their office network site is connected to the Internet via 5G cellular wireless technology. They require their database servers and the website to be up and running 24/7. FuturePlus provides their casual staff with portable devices to take on-site case notes during their site visits and send these to the office via secure communications. Since they store sensitive information about their donors, students receiving donations, as well as payment details such as bank account and credit card information, it is of utmost importance that their servers and communications over the Internet are completely secure.

FuturePlus has requested your company's service of designing a suitable information security program for their organisation.

Reference no: EM132372283

Questions Cloud

What are the alleged behaviors and characteristics : Socrates once said, "The unexamined life is not worth living". Think about that for a moment. An unexamined life. What is that? Well, it is a reflection.
How the ecological perspective of assessment influenced : Create an eco-map to represent Claudia's situation. Describe how the ecological perspective of assessment influenced how the social worker interacted.
How have the groups affected by concern changed over time : As an astute social worker and professional policy advocate, you must be adept at identifying social problems homeless in veterans that exist in your community.
Explain what you mean by this claim or statement : Does Michelangelo's sculpture, PIETA, demonstrate more Hellenic or Hellenistic qualities? Or, does it contain qualities from both sculpture periods?
Write a report on information security risk management : COIT20263 Information Security Management Assignment, Central Queensland University, Australia. Write a report on information security risk management
Write the code for the make appointment screen : Agile system development approach by working in pairs in an iterative and incremental manner to write code and conduct unit and integration tests
Prepare a bibliography of journal article : Each student will prepare a bibliography of 4 journal articles on a disorder listed in the DSM 5. The articles selected MUST be appropriate to the topic you.
Discuss the impact and relationship of the auditing standard : ACC6030–Auditing and Assurance Services-Edith Cowan University-Australia- Investigate the facts of the case study and using the risk-based auditing approach.
Describe one traumatic reaction you noticed : Post the identity of the military personnel you selected and describe one traumatic reaction you noticed. Explain how you might normalize this reaction.

Reviews

len2372283

9/18/2019 3:47:49 AM

Length: 3000 words (±500 words). This assessment task relates to the Unit Learning Outcomes 3 and 4 and can be undertaken in a group of up to 4 members or individually. Distance students can form groups with on-campus students as well. Note: You must follow the Harvard citation and referencing guidelines. Check the unit website at least once a week for further information relating to this assessment task. Please ensure that you write your report in your own words to avoid possible plagiarism and copyright violation.

len2372283

9/18/2019 3:47:43 AM

Assessment Criteria - You are assessed on your ability to apply the principles of information security risk management as well as information security certification and accreditation to the organisation in the given scenario. The marking criteria for Assessment Item 3 are provided on page 4. You need to familiarise yourself with the marking criteria to ensure that you have addressed them when preparing your report.

len2372283

9/18/2019 3:47:38 AM

Submission - Each of you in the group must upload the same written report as a Microsoft Office Word file through the COIT20263 Moodle unit website assessment block on or before the due date. A group member who fails to submit the assessment item will not be awarded any marks for the assessment. Late submissions will incur the penalty as per university’s ASSESSMENT POLICY AND PROCEDURE. Marking Criteria - Used decimal notation. Included all headings and page numbers. Used ToC auto-generation. Used Roman i for the Executive Summary page. Executive Summary was before the Introduction. Used a new page. Set the scene for the report and described the purpose clearly. Explained the research method used. Outlined the sections of the report. Started from a new page. Thorough and detailed discussion supported by in-text references and justifications.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd