An information security risk assessment for the organisation

Assignment Help Computer Network Security
Reference no: EM13924395 , Length: 3500 Words

Based on the case study supplied,write a report that includes;

a) An Information Security Risk Assessment for the organisation (Wolftech). A good answer will identify threats, vulnerabilities, and impacts. It will include priorities and risk treatment options. (35).

b) Discuss whether you think that the organisation will be able to successfully implement an information security policy. Identify any potential obstacles to success. (10)

c) You have been asked by the Chief Executive to consider whether seeking

Certification for ISO 27001 would be a good idea for the company. What is

your response? (10)

d) Discuss what the organisation needs to have in place in order to try to

Maintain operation following a major incident. (15)

You should aim to write no more than 3500 words (excluding appendices).

In your answers you are expected to demonstrate knowledge of appropriate topics discussed in the module, justify your answers and demonstrate further reading (please provide a list of references and / or bibliography). Any work that you submit must be your own interpretation written in your own words (cutting and pasting from the internet will result in an automatic fail).

Opportunity will be provided during / after the Lectures and workshops to ask individual or collective questions about this assessment. These are the times when tutors are available to answer questions relating to this module. You are encouraged to ask questions. Tutors cannot provide answers to the assessment questions asked above, but it is important that you are clear on what you are being asked to do. So please ask questions at an early stage. It is recommended that you begin work on this assessment as soon as you can in order to clarify anything that you are unsure of. Waiting until the final week to say that there is something that you do not understand will mean that you will struggle to produce a good answer.

Case Study

Wolftech is based in the Energy sector and currently employees 85 people who deal with businesses that are located in the UK, Central Europe and China. They have offices in each location, but the management team and main office are located in Wolverhampton. The company is part of a group that includes power plants in developing countries that are considered by some to be harmful to the environment.

Office staff have a range of PCs with different specifications and a number of staff and managers use laptops and mobile devices. Most of the company’s computers are now running Microsoft Windows 7 operating system and Microsoft Office 2010 Professional edition, however some computers are running Windows XP. Many senior staff use a variety of mobile devices (phones, iPads) to access mail, contacts and other work related files. When asked, the MD of the company was not aware of any addition security systems or software being used with mobile devices and believes that staff use both their own and company issued devices. The company servers are located in the basement of the Wolverhampton office. Backups are taken via removable hard disks which are locked in the system administrator’s desk. There does not appear to be any plans to respond to a loss of the servers.

The company uses Microsoft exchange server and operates Outlook for e-mail. Standard applications recently introduced include Microsoft CRM (for Customer Relationship and Contact Management) and Microsoft Share Point for collaborative working and document handling. Outlook Web Access is employed for remote web access to e-mail and public folders. Some staff use their webmail accounts to forward emails to when they are working from home or overseas. Back office systems may use bespoke front end and web-based applications linked to the company Oracle 11g database housed on a database server. The company website is hosted by an external hosting company. There is an integrated sales and purchase system. Accounting is linked with these systems but the main application is Sage 50 Accounts Professional together with the Sage 50 Forecasting package.

The company has a small IT Support team based at the Wolverhampton offices. Outside of the main office, support is provided via a help-line and remote access. A third party company is used for dealing with some of the more difficult problems. The Board do not consider that the company has experienced any cyber-security issues. The company does not currently have an information security policy, any issues would be the responsibility of IT Support.

The MD says that the systems administrator is very able to deal with any security issues; when passwords have been forgotten, he has been able to get into the affected accounts and he will not allow anyone else know the administrator passwords. He also told us that the administrator had been able to reduce the costs of some of the equipment by sourcing less expensive versions from China.

The MD stated that he never had password problems as his PA is able to remind him if he forgets a password. When asked whether the company used encryption he did not seem to understand the question but said that he would talk to the system administrator about this.

Reference no: EM13924395

Questions Cloud

Compute shamrocks roe directly : Compute Shamrock's ROE directly. Confirm this using the three components. Using the ROE computed in Part a, what is the expected sustainable growth rate for Shamrock?
Explain what you interpret about the target audience : Evaluate the message that is conveyed from what you observe from this digital footprint. Explain what you interpret about the target audience/users for this site.
Fisheries and conservation department : Routine surveillance by the Agriculture, Fisheries and Conservation Department (AFCD) has detected the presence of low pathogenic avian influenza A (H7N9) in a chicken cloacal sample from the Cheung Sha Wan Temporary Wholesale Poultry Market in Ho..
Construct the variables that you need in order to estimate : ECOM094 - a. Using the data contained in the dataset, construct the variables that you need in order to estimate eq. (1). b. Estimate eq. (1), report the results and comment on them. Are the results consistent with Taylor’s theory? Explain.
An information security risk assessment for the organisation : Based on the case study supplied,write a report that includes, An Information Security Risk Assessment for the organisation (Wolftech). A good answer will identify threats, vulnerabilities, and impacts. It will include priorities and risk treatment o..
Standard deviation of the scores : The standard deviation of the scores in the frequency distribution above is (to the nearest 1/10)
Is there evidence of a difference in daily customer count : At the 0.05 level of significance, is there evidence of a difference in the daily customer count based on the price of a small coffee?
What is the air pressure in the closed chamber b : Perform a dimensional analysis to determine the dimensionless groups that would be required to define the pump performance. Arrange the groups so that the power and pump pressure each appear in only one group.
Difference in the mean waiting times in the four locations : At the 0.05 level of significance, is there evidence of a difference in the mean waiting times in the four locations?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Design a remote access control policy for richman

Design a remote access control policy for Richman using the appropriate access controls for systems, applications, and data access. Include the design and justification for using the selected access controls for systems, applications, and data acc..

  Difference between a stream cipher and a block cipher

What is your understanding of the difference between a stream cipher and a block cipher?

  Implementing information systems security policies

Describe the roles and responsibilities of those implementing information systems security policies.

  Develop a system security plan for an information system

Develop a sample System Security Plan for an information system. Select and incorporate appropriate management, technical, and operational security controls into a system security plan.

  Largest threats against network security

Research and discuss what you believe are the largest threats against network security, and what measures should be taken to protect against such intrusions.

  Internet working equipment

Discuss and explain any of the internet working equipment that you have experience with and the advantages and disadvantages of them.

  Based on your understanding of networking concepts make a

based on your understanding of networking concepts create a 2- to 3-page report in a microsoft word document with

  Describe at least three common vulnerabilities

Do these vulnerabilities disappear over time, or will they always remain once they have been introduced into an environment?

  Assess the levels of responsibility between government

write a three to fivenbsp page paper in which youdescribe the impact and the vulnerability of the scada stuxnet worm

  Data standards and data security

Data Standards and Data Security

  A business wants to share its customer account database

a business wants to share its customer account database with its trading partners and customers while at the same time

  Sample issue-specific security policy for an organization

Using the framework, draft a sample issue-specific security policy for an organization. At the beginning of your document, describe the organization for which you are creating the policy and then complete the policy using the framework

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd