Information security system in australia

Assignment Help Computer Network Security
Reference no: EM131029253

Assessment Task

You are required to analyse the scenario given on page 3 and discuss the following issues in the specified weeks in relation to the Course Learning Outcomes 4 and 7.

a) The steps that the company should take for the certification and accreditation of its information security system in Australia.

b) Would the company need the certification and accreditation of its information security system in the countries of satellite campuses as well?

c) Which professional organisations would likely to be involved in this process of certification and accreditation?

You also need to individually prepare and upload a very brief video (5 min) to Moodle in week 6. The video should clearly express the group consensus and your own views.

The Scenario for Information Security Management

Assessment Tasks

A private company in Australia plans to establish a private nursing school. The main campus of the nursing school is located in a suburb of Sydney and the satellite campuses are located in the suburbs of capital cities of three South East Asian countries. The company has made agreements with a private hospital in each of these locations to provide the internship and training to the students of the nursing school. The main and satellite campuses that are currently being constructed will have modern communication networkssuitable for the business.

The lectures, tutorials and laboratory classes conducted in the main campus will form virtual classrooms with the satellite campuses. The students can participate in the virtual classes from within the campus premises or from their homes. More than 100 students are expected to enrol in each location in the first year.

The managementof the company plans to help out the wider community by providing a telemedicine and homecare service to the needy patients at their homes.This service coversa radius of about 200km from the main and satellite campuses and will be provided with the help of a mobile team of health personnel.

The mobile team will be able toreceive medical advice directly from the medical staff of the hospital in their country as well as the private hospital in Sydney via a virtual consultation room. The hospitals should be able to locate and contact all registered homecare patients. The nursing school should know the location of all their students and staff when they are on duty.

As the company is newly established, the information security policies are yet to be developed.

Reference no: EM131029253

Questions Cloud

Suggest an appropriate dependent variable : a. Suggest an appropriate dependent variable. b. Write a model for this experimental situation and identify all terms. c. Fill out the sources and degrees of freedom for an AOV table.
Offshore financial centers facilitate money laundering : Governments dislike the fact that offshore financial centers facilitate money laundering. Do you think that electronic commerce makes it easier or harder to launder money and camouflage other illegal activities? Do you think offshore financial center..
How small would the sample percentage need to be : A manufacturer claimed that at least 20% of the public preferred her product. A sample of 100 persons is taken to check her claim. With α = .05, how small would the sample percentage need to be before the claim could legitimately be refuted? (Noti..
Variability in an analysis of variance table : a. Write an appropriate model (including an effect for weeks) and the sources of variability in an analysis of variance table. b. How would your model change if we analyze the total 2-week sales data? c. Run an analysis of variance on the 2-week sale..
Information security system in australia : Would the company need the certification and accreditation of its information security system in the countries of satellite campuses as well?
Required using the low-level coded product structure tree : Product A consists of three units of Subassembly B, three units of C, and one unit of D. B is composed of two units of E and three units of F. C is made of three units of H and four units of D. H is made of five units of E and two units of G. d. To p..
Components as taking the you attitude emphasizing positive : Components as taking the "you" attitude, emphasizing the positive, establishing credibility, being polite, using bias-free language, using visual aids, and projecting a good company image. How can I exhibit these qualities in a formal proposal?
Describe role of packaging labeling in marketing of product : Explain the purposes of each step of the new-product process. Identify ways that marketing executives manage a product's life cycle. Describe the role of packaging, labeling, and warranties in the marketing of a product
Write the equation in the slope-intercept form : Carla invested $23,000, part at 16% and part at 15%. If the total interest at the end of the year is $3,500, how much did she invest at 16%?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Computer security models

Use the Internet to research the following computer security models: Biba (Biba Integrity Model), Give a brief synopsis of each model in your own words. Please cite any references that you use to complete this assignment

  Surveillance biometrics history by cctv

Write five pages about Surveillance Biometrics History By CCTV

  Find an united states based online article regarding it risk

Find an United States based online article (or resource) regarding IT risk assessment, cyber law, OR auditing

  Bring voice over internet protocol to the entire

paper in apa format with labels for each section to include an introduction main topicbody and sub-topics and

  Fms attack and chopchop attack

[Wireless LAN Security-WEP] What is the main difference between the FMS attack and Chopchop attack? Clearly explain your answer

  Write paper about stuxnet virus

Select a research topic from the list below. After selecting your topic, research the incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from government and industry. Write paper about Stuxnet..

  Design a network for the local business

Design a network for the local business based on the information: The business has approximately fifty (50) employees, and the new office space will stretch across the third and fifth floors of a building.

  Famous financial corporation

Your submission should demonstrate thoughtful consideration of the ideas and concepts that are presented in the course and provide new thoughts and insight relating directly to the topic. Your response should reflect scholarly writing and APA stan..

  What is the value of shared secret key

You have secretly picked the value SA = 17. You begin the session by sending Bob your calculated value of TA. Bob responds by sending you the value TB = 291. What is the value of your shared secret key?

  Assignment on analyzing a social policy

Assignment on Analyzing a Social Policy

  Security and privacy in cloud computing

Prepare a report on the following scenario about security and privacy in cloud computing - Recently increased use of mobile devices and the growth of the Internet in current business practices have led to the provision of Cloud Computing

  Determine with justification the equation of the curve

Determine with justification the equation of the curve and determine with justification all values oft for which there is no point (x, y) on the curve.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd