Develop the issp for the organisation

Assignment Help Computer Network Security
Reference no: EM131031736 , Length: word count:2000

Information Security Management-

Objectives- This assessment task can be undertaken in a group of up to 4 members or individually. Each group/student will analyse the given scenario of the organisation, and develop and document the specified Issue Specific Security Policy (ISSP) for the organisation.

Assessment criteria - The students are assessed against their ability to analyse the given scenario and develop the specified ISSP.

The marking criteria for Assessment Item 1 are provided on page 4.Students need to familiarise themselves with the marking criteria to ensure that they have addressed them when preparing the document for this assessment item.

Assessment Task - You are required to analyse the scenario on page 3 and develop the following ISSP for the organisation described in the scenario:

• Access and use of sensitive information of the organisation

The ISSP should include:

1. Statement of Purpose
2. Authorised Uses
3. Prohibited Uses
4. Systems Management
5. Violations of Policy
6. Policy Review and Modification
7. Limitations of Liability

You also need to include a section containing the justification of the contents of your policy as well as any assumptions that you have made.

Note: You need to upload the document containing the ISSP to Moodle. You must follow the Harvard citation and referencing guidelines.

Please do not include an executive summary, a table of contents, an introduction or a conclusion. Please use the ‘Template for Your Answers' Section of this document and upload only that template.

Check the course website at least once a week for further information relating to this assessment task. Please ensure that you write your answers in your own words to avoid possible plagiarism and copyright violation. You can understand the Plagiarism Procedures by following the corresponding link in the CQUniversity Policies section of the Course Profile.

The Scenario for Information Security Management Assessment Tasks

A private company in Australia plans to establish a private nursing school. The main campus of the nursing school is located in a suburb of Sydney and the satellite campuses are located in the suburbs of capital cities of three South East Asian countries. The company has made agreements with a private hospital in each of these locations to provide the internship and training to the students of the nursing school. The main and satellite campuses that are currently being constructed will have modern communication networks suitable for the business.

The lectures, tutorials and laboratory classes conducted in the main campus will form virtual classrooms with the satellite campuses. The students can participate in the virtual classes from within the campus premises or from their homes. More than 100 students are expected to enrol in each location in the first year.

The management of the company plans to help out the wider community by providing a telemedicine and homecare service to the needy patients at their homes. This service covers a radius of about 200km from the main and satellite campuses and will be provided with the help of a mobile team of health personnel.

The mobile team will be able to receive medical advice directly from the medical staff of the hospital in their country as well as the private hospital in Sydney via a virtual consultation room. The hospitals should be able to locate and contact all registered homecare patients. The nursing school should know the location of all their students and staff when they are on duty.

As the company is newly established, the information security policies are yet to be developed.

Reference no: EM131031736

Questions Cloud

Determine the constant for p required to cause the 0.5kg : The slider starts from rest at position 1 and the unstretched length of the spring of modulus k = 250 N/m is 200mm. Neglect friction.
What do you learn about the company hp inc : What do you learn about the company? What areas are changing and may be opportunities for cost control and improved profits?
How much charge is stored on each capacitor : In the figure (Figure 1), if C1=C2=2C3=26.3µF, how much charge is stored on each capacitor when V=47.0V?
Compare existential therapy and psychoanalytic therapy : The paper (6pages) will compare Existential Therapy and Psychoanalytic Therapy (Frued) as it relates to philosophy, key concepts and tenets, stragtegies and technqiues, and goals. Additionally, the paper will include a discussion of the appropriat..
Develop the issp for the organisation : Assessment Task - You are required to analyse the scenario on page 3 and develop the following ISSP for the organisation described in the scenario: Access and use of sensitive information of the organisation
Partial credit for incomplete assignment : Them tell me what future Supreme Court cases cited the Bethel case and tell me why or why not you agree or disagree. I expect at least three pages in order to get credit. I will not give partial credit for an incomplete assignment. The assignment ..
Find the minimum aperture diameter of a camera : Find the minimum aperture diameter of a camera that can resolve detail on the ground the size of a person (1.5m ) from an SR-71 Blackbird airplane flying at an altitude of 26km .
Prepare an individual tax return including all required form : Based on the information presented below, prepare an individual tax return (married filing jointly) including all required forms and schedules for Harry and HenriettaHurricane for 2015.
What is the direction of the acceleration : three forces acting on an object are given by f1=[-2.00i+2.00j]N,f2[5.00i-3.00j]N,f3[-45.0i]N.The object experiences an acceleration of magnitude 3,75 m/s to the power 2

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  Questions on cyber security

Question 1: Submit a list of five cybersecurity breach case studies. Question 2: For each breach, write a brief statement covering the following points: a\ When did the incident take place (dates)? b\ What went wrong? c\ What was the outcome?

  Explain how you came up with your encoding and decoding

Show your work here and explain how you came up with your encoding and decoding. If you want to reverse engineer an instruction the MARS assembler shows you the encoding of all assembled instructions.

  Describe how the mix of state and non-state actors

Describe how the mix of state and non-state actors you identified should affect policy maker decision-making and policy development for critical infrastructure protection.

  Develop a system security plan for an information system

Develop a sample System Security Plan for an information system. Select and incorporate appropriate management, technical, and operational security controls into a system security plan.

  Organization security plan

Organization Security Plan

  Difference between perception and reputation

Discuss the difference between perception and reputation and explain how can organizational perception affect IT reputation?

  Why change the default administrator login and password

what are some of the important measures you can take to ensure that your home wireless network is safe and secure. Change the default administrator login and password. Use something only you will remember.

  Private and public cloud storage and security concerns

You need to do the literature review on private and public cloud storage and Security concerns - Review the given document and minimize the similarity.

  Develop detailed plan to approach and secure incident scene

Discuss the initial steps you would take for the investigation, depending on whether or not the attack is still in progress. Include how your actions would differ based on the current status of the incident.

  Relationship between technical or it staff

Determine what your relationship would be like with the technical or IT staff at your corporation if you were working side by side on a project or training exercise?

  Explain what scalability means in kerberos

One of the strengths of Kerberos is its scalability. Explain what scalability means in Kerberos and how the Kerberos system facilitates scalability.

  Mobile wireless networks

3G Safekeeping model, safekeeping architecture standards ITU-T X.805 and ISO/IEC 18028-2, access points (AP), network admission controller (NAC) and authentication server (AS)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd