Develop the issp for the organisation

Assignment Help Computer Network Security
Reference no: EM131021397

Its an Information security management Subject a branch for Network security.

Please do read the all the requirements before start the work.

Please do follow those rules and at the end their is Answer file, you need to use that file for the solutions.

Assessment Task

You are required to analyse the scenario on page 3 and develop the following ISSP for the organisation described in the scenario:

- Access and use of sensitive information of the organisation

The ISSP should include:

1. Statement of Purpose
2. Authorised Uses
3. Prohibited Uses
4. Systems Management
5. Violations of Policy
6. Policy Review and Modification
7. Limitations of Liability

You also need to include a section containing the justification of the contents of your policy as well as any assumptions that you have made.

The Scenario for Information Security Management Assessment Tasks

A private company in Australia plans to establish a private nursing school. The main campus of the nursing school is located in a suburb of Sydney and the satellite campuses are located in the suburbs of capital cities of three South East Asian countries. The company has made agreements with a private hospital in each of these locations to provide the internship and training to the students of the nursing school. The main and satellite campuses that are currently being constructed will have modern communication networks suitable for the business.

The lectures, tutorials and laboratory classes conducted in the main campus will form virtual classrooms with the satellite campuses. The students can participate in the virtual classes from within the campus premises or from their homes. More than 100 students are expected to enrol in each location in the first year.

The management of the company plans to help out the wider community by providing a telemedicine and homecare service to the needy patients at their homes. This service covers a radius of about 200km from the main and satellite campuses and will be provided with the help of a mobile team of health personnel.

The mobile team will be able to receive medical advice directly from the medical staff of the hospital in their country as well as the private hospital in Sydney via a virtual consultation room. The hospitals should be able to locate and contact all registered homecare patients. The nursing school should know the location of all their students and staff when they are on duty.

As the company is newly established, the information security policies are yet to be developed.

TEMPLATE

Access and Use of Sensitive Information of the Organisation

Mark

allocated

Mark earned

Assumptions

6

 

1 Statement of Purpose

 

3

 

2 Authorised Uses

 

3

 

3 Prohibited Uses

 

3

 

4 Systems Management

 

3

 

5 Violations of Policy

 

3

 

6 Policy Review and Modification

 

3

 

7 Limitations of Liability

 

3

 

Justification

6

 

References

2

 

Late submission penalty

 

 

Plagiarism penalty

 

 

Total

35

 

Verified Expert

The solution file contain 2300 words and discussed about the issues specific security policy for nursing school. It is explained ISSP and it should include Statement of Purpose Authorized Uses Prohibited Uses Systems Management,Violations of Policy Policy Review and Modification, Limitations of Liability. The references are included as apa format.

Reference no: EM131021397

Questions Cloud

Why might additional reductions in air pollution come : According to an article in the Economist magazine, however, recently some policymakers "worry that the EPA is constantly tightening restrictions on pollution, at ever higher cost to business but with diminishing returns in terms of public health."..
What trade-offs would be involved in cleaning up the final : To do 90 percent of the work only costs 10 percent of the money. It's the last 10 percent of the cleanup that costs 90 percent of the money." Why should it be any more costly to clean up the last 10 percent of polluted air than to clean up the fir..
Calculate the value of nominal gdp in grantland : Given the above information, calculate the value of nominal GDP in Grantland for 2010, 2011 and 2012. Provide any general formula you use to calculate these values and identify any abbreviations in that formula
Develop contingency plans for the possibility of sheltering : Formulate plans for sheltering the population in the immediate aftermath. Where could this population be safely sheltered in the short term?
Develop the issp for the organisation : You are required to analyse the scenario on page 3 and develop the following ISSP for the organisation - You also need to include a section containing the justification of the contents of your policy as well as any assumptions that you have made.
Find the y-intercept of this graph and explain what it means : Find the y-intercept of this graph and explain what it means in the context of the problem. Show all work to receive full credit. Explain the slope of the line.
Explained what advice you would give to frank and sarah : They wonder, Is a feeding tube equivalent to a breathing machine? Would it be possible to allow Ann to lie there and die of starvation? Is that murder? What would she want? What is the right thing to do? (Burkhardt & Nathaniel, 2008).
Determining the demand-supply analysis : An industry's supply and demand curves are given by the following equations: QD = 2000 - 4P and QS = 6P
Find the optimal risky portfolio : Find the optimal risky portfolio and its expected return and standard deviation - How much an investor with A = 5 will invest in the optimal risky portfolio

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  Describe the four types of network testing

Describe the four types of network testing typically performed. What is regression testing? Why is regression testing usually an important part of network testing

  Evaluate the challenges and security risk

What methodology will you be following to realise your artefact? Describe approach that will be employed to develop your project artefact

  Explain why we should not choose primes p and q that are

1 find the primes p and q if n pq 4386607 and phin 4382136.2 explain why we should not choose primes p and q that are

  Define the cybercrime paper

The papers should be comprised of a INTRODUCTION, REVIEW OF LITERATURE, DISCUSSION, CONCLUSIONS, and REFERENCES.

  Implement encryption and decryption of the vigenere cipher

Implement both encryption AND decryption of the Vigenere cipher with 26 English letters and 1 space character

  Assignment on secure encrypted communications

Transmitting personal and business data and information over secure communication channels is critical. In some cases it is required, especially when personally identifiable information is being transmitted.

  Relationships between a trusted and an untrusted network

Discuss biometrics. Identify the most widely used technology and why this is the case. What are the relationships between a trusted and an untrusted network

  Analyse and evaluate risks and security concerns

Analyse and evaluate risks and security concerns with cloud computing discuss strategies for addressing them

  Specify the vlan assignment

Specify the commands that you would use to set up the routers to use EIGRP. Outline the requirements to set up a VLAN and VPN access for the accountants. Specify the VLAN assignment, and incorporate a Spanning Tree protocol into your design to elimin..

  Illustrate that signature verification will succeed

If Bob receives M and S, describe process Bob will use to verify signature. Illustrate that in this case signature verification will succeed.

  Cryptography methods to protect organizational information

Research and detail the cryptography methods to protect organizational information using techniques that ensure its integrity, confidentiality, authenticity and non-repudiation, and the recovery of encrypted information in its original form

  Boot process for a windows machine

What is the boot process for a Windows machine switches through several different modes. What are they, and how do they impact security?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd