Design a security plan that describes counter-measures

Assignment Help Computer Network Security
Reference no: EM13155894

The learning objectives of the Security Plan Assignment are for you to recognise the threats to information assets that exist in your current or future work place. The complacent and lackadaisical approach many organisations have towards the security of their information holdings is common. You have, through your research essay and ongoing inquiry, the opportunity to identify the threats, outline security guidelines and develop a robust and pragmatic training programme. You should develop a plan that you would regard as helpful to you, the information user, as well as protecting your organisation's information environment.

You are required to complete and submit a security plan based on the following scenario:

a) You are the recently appointed head of a security team responsible for protecting the information holdings of a business organisation of some 60 staff. The organisation is housed in a detached, multi-storeyed building located in the central business district of an Australian city.

b) The security team is responsible for overseeing the security of information from deliberate and accidental threats. A recent audit of the information security management system found it to be deficient in some key areas, notably incident response, disaster recovery and business continuity, social engineering exploitation of personnel, an apparent lack of personnel awareness of the various threats to information, and poor password security. These issues were identified as needing urgent remedy.

c) Technical systems were found to be reasonably effective in maintaining database and document management security, and were well serviced by the IT team.

Management has directed you to undertake some security analysis and planning to improve the organisation's security of information. You are tasked to:

a) Identify and describe the organisation's physical, human, and electronic information holdings that may be at risk.

b) Identify and describe the actual and potential physical, human, and electronic threats to the organisation's information holdings.

c) Design a security plan that describes counter-measures that will manage the threats that put the organisation's information holdings at risk and disaster recovery processes.

d) Develop a comprehensive information security education and awareness programme for use by management, staff members and contractors).

5. Use the marking sheet as a possible template to prepare your security plan.

6. The assignment must include the following to enhance your grade:

a) Include a title page containing the topic, number of words, unit name, student name, student number and trimester/semester year or study period, complete, and attach a coversheet as part of the same assignment document.

b) Identify and describe what is at risk and the potential threats that may exploit the vulnerability of the organisation's physical, human and electronic information assets - you should read the topic notes AND from the recommended readings and URLs provided in the Unit Learning Guide AND from your OWN research in order to define these threats.

c) Design a security plan that describes counter-measures that will manage the threats that put the organisation's information assets at risk. The security plan should cover a full range of protection measures - please refer to your topic notes for leads and the marking guide and then undertake your own research.

d) Detail the steps you consider necessary to enhance information security through a security education, training awareness (SEATA) programme and include a description of the specific objectives you hope to achieve and the measures you would use to test the efficacy of your plan, i.e., to monitor and sample staff awareness of the SEATA programme.

The quality and breadth of references used will be taken into account and credit will be given for evidence of wide reading on the topic and use of material from a variety of sources (i.e., books, journals, websites, newspapers, etc).

You will also be assessed on the presentation of your Security Plan, as well as the contents. Marks will not be awarded where correct referencing is not used. Marks will not be awarded where the above instructions are not followed.

If you are presently working for an organisation, please do NOT include any information or reference to its security plans or policies in your assignment, if this contravenes or potentially jeopardises the organisation's interests.

Verified Expert

Reference no: EM13155894

Questions Cloud

Find out the mean of regarding question : What does it mean if I have a standard error of estimate figure as 25.571?
Probability that no native americans are selected to jury : Suppose that 25 people are called in for jury duty, two of whom are Native American. If 12 of the 25 people are randomly selected to the jury. What is the probability that no Native Americans are selected to the jury?
Fishermen have suffered financial hardship : In recent years, fishermen have suffered financial hardship because of shortened fishing seasons, reduced catches and lower market prices. Moreover, fishermen have complained about price fluctuations and have called for a system of minimum prices.
Explain four-digit accuracy to minimize roundoff error : In a titration of HNO3, you add a few drops of phenolphthalein indicator to 50.00 mL of acid in a flask. You quickly add 26.50 mL of 0.0502 M NaOH but overshoot the end point, and the solution turns deep pink.
Design a security plan that describes counter-measures : Design a security plan that describes counter-measures that will manage the threats that put the organisation's information holdings at risk and disaster recovery processes.
Which represents a more dovish fed : Which leads to higher interest rates, which leads to higher output? Which leads to higher inflation? Which represents a more hawkish Fed? Which represents a more dovish Fed?
Find probability that six application forms have falsified : What is the probability that exactly six application forms have been falsified? Would you expect this probability to be small or large? Explain.
Explain the mechanism for each of andrea symptoms : Two women have benign pituitary tumors. Andrea has lost weight and complains of being hot all the time; she presents as thin and nervous, with tachycardia and exophthalmos.
Use the normal distribution : Use the normal distribution of women's total cholesterol levels in Exercise 9 for which the mean is 186 milligrams per deciliter and the standard deviation is 37.2 milligrams per deciliter.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain security strategy for a corporate wan

Prescribe a security strategy for a corporate WAN. Be sure to include methods to combat both technical and nontechnical attacks. C

  Calculate an rsa signature on a long message

Would it be reasonable to compute an RSA signature on a long message by ?rst computing what the message equals mod n, for some ?xed n and then signing this computed value only. Why or why not?

  Write the different techniques use in detecting intrusion

Explain in detail about system security and write down the different techniques use in detecting intrusion. Explain the answer must be accompanied by algorithm.

  Ideas for energizing a project team

Assume you are introduced to a assignment manager, who does not have authority to give a pay raise or promote a project team member.

  Investigating case in employee allegedly sending photos

You are investigating a case involving an employee who is allegedly sending inappropriate photos via e-mail in attachments that have been compressed with a zip utility.

  Using vigene table to find key used to encrypt message

You were given the following plaintext and cipertext, and you are needed to find key used by them. plaintext: Using Vigene table, find key used by them to encrypt the message.

  Write vulnerabilities and methods of securing rpc

TCO C states "Given a computer network for data transmission, identify and analyze possibilities for loss or modification of data. Write down the vulnerabilities of RPC? What are the present methods of securing RPC?

  Encrypt the plaintext by using vigenere cipher

Encrypt the following Plaintext using Vigenere cipher: Plaintext: stocks market is falling Key : one. Is Vigenere cipher monoalphabetic or polyalphabetic? Why?

  Security risk to acknowledge using macros

Write down 200- to 300-word response which answers the following question: Based on article by Lenning (2005), what is main security risk which users must acknowledge when using macros?

  New technologies using sophisticated anti-copying measures

Which is more probably to be effective in protecting intellectual property in digital media like CDs and DVDs: tougher copyright laws or new technologies incorporating more sophisticated anti-copying measures?

  Termination of a project

As a assignment manager, you are asked to facilitate a lessons learned session as part of the assignment termination process.

  Dos and ddos attack

Denial of Service attack (DoS) and Distributed Denial of service (DDoS) attack, two-factor authentication system, password ageing, biometric devic,  cryptographic attack made Double DES (2DES), Demilitarized Zone (DMZ), SSL protocols

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd