Managing the information security risks of the organisation

Assignment Help Business Management
Reference no: EM131231162 , Length: word count:3000

Information Security Management Assignment-

Objectives

This assessment task can be undertaken in a group of up to 4 members or individually. Each student/group will analyse the given scenario of an organisation, and write a report. The report should discuss the guidelines for managing the information security risks of the organisation.

Assessment Task

You are required to analyse the scenario given on page 2 and produce a report that discusses the guidelines for managing the information security risks of the organisation. Your report should have the Executive Summary, Table of Contents, Introduction, Discussion (the guidelines), Assumptions and References sections.

Check the course website at least once a week for further information relating to this assessment task. Please ensure that you write your answers in your own words to avoid possible plagiarism and copyright violation. You can understand the Plagiarism Procedures by following the corresponding link in the CQ University Policies section of the Course Profile. Late assessments will be penalised as per the university policies and guidelines.

The Scenario for Information Security Management Assessment Tasks

Farmers for Farmers (3F) is a cooperative society of crop farmers in Queensland founded one year ago. Established to increase the yield of its member farmers and reduce the wastage due to rotting of crops, the society sells the crops to the customers at a lower price than that of the few giant supermarket chains in the state. 3F competes with these supermarket chains by directly supplying the produce from the farmers to the consumers without an intermediary. To this end, 3F has its own trucks, five distribution centres in the state and six distribution vehicles at each distribution centre.

3F operates from a small office in Rockhampton and the customers can place their orders using the web interface of 3F or over the phone. The orders are processed using a proprietary software algorithm of 3F. By using this software, 3F not only collect the optimum quantities of crops from the farmers and deliver them on time to the distribution centres, but also deliver the order to the customers in a minimum time. This whole process is automated with the help of on-board computers on the trucks as well as on the distribution vehicles connected to the office of 3F and the farmers.

This software algorithm is also used by the farmers to order and add fertilizer to their farmlands, to water the plants, spray pesticides and collect the yield in an optimum fashion while saving energy costs, resources and money. For this purpose, the algorithm collects real-time information from the farms, such as air and soil temperature, humidity, soil moisture content, information about pests, rain fall figures and the intensity of sunlight, without human intervention. The farmers also connect to the Internet via the network of 3F and post questions to the online forums. 3F also includes an online banking society that provides most of the banking facilities of other banks to its member farmers. 3F needs the guarantee that their proprietary algorithm, and various data and information in their information system are secured.

After the success in Queensland, 3F expanded its services this year to the New South Wales farmers and customers as well.

As the society was established last year, the information security policies have not yet been developed. The society is now in the process of developing a comprehensive set of information security policies for its information system.

3000 words

6 Harvard references.

Reference no: EM131231162

Questions Cloud

State your opinion about whether or not airport security : Conduct research on the Internet and back up your discussion with some of the latest government, newspaper, or magazine articles about airport security. You might also locate and use statistics on hiring, training, or turnover of TSA security scr..
Determine the sidelighting workplace illuminances : Determine the sidelighting workplace illuminances for a 20 ft long, 15 ft wide (deep), 8 ft high light-colored room with a 15 ft long by 5 ft high window. Assume that the direct sun plus clear sky illuminance is 3000 fc and the ground-reflected il..
Determine the clear sky day and the cloudy day work-plane : A 20 ft long by 7 ft high window with ¼-in clear glass faces 10°E of south, the building is at 32°N latitude, and it is January 15 at 2 p.m. solar. The ground outside is covered by dead grass.
Determine the clear day and cloudy day illuminances : Determine the clear day and cloudy day illuminances on a horizontal skylight at noon on June 21 and December 21
Managing the information security risks of the organisation : COIT20263 Information Security Management Assignment. You are required to analyse the scenario given on page 2 and produce a report that discusses the guidelines for managing the information security risks of the organisation
Define how justification and excuse play a role in the case : Explain the nature and types of defenses used in the cases and what evidence was used to demonstrate the defense. Describe how justification and excuse play a role in the cases.
The new york times article conspicuous by their presence : Read the New York Times article "Conspicuous by Their Presence." - Explore how she breaks the textbook rules of journalism.
Calculate the net transmittance of the skylight : A 3 ft × 5 ft double-domed skylight has outer and inner fat-plate plastic transmittances of 0.8 and 0.7, respectively; a 2 ft deep well with 80% reflectance walls; and a 90% net skylight area. Calculate the net transmittance of the skylight.
Describe the biological evidence obtained at the crime scene : Describe the biological evidence obtained at the crime scene. Identify the preservation and collection of the various types of biological evidence.

Reviews

len1231162

10/5/2016 1:43:23 AM

Creating security policies by assessing risk assessment and after finding vulnerabilities on giving scenario can use is guideline to create policies. Students are assessed against their ability to analyse the given scenario and discuss the guidelines for managing the information security risks of the organisation. The marking criteria for Assessment Item 2 are provided on page 3.Students need to familiarise themselves with the marking criteria to ensure that they have addressed them when preparing this assessment item.

Write a Review

Business Management Questions & Answers

  Impact performance and commitment in the workplace

Examine how job satisfaction, stress, and motivation impact performance and commitment in the workplace.

  Explain several characteristics of successful team leaders

Explain several characteristics of successful team leaders and the effect the absence of these skills has on team performance

  Opposing negotiating strategies meet to negotiate a deal

What techniques need to be employed by both parties when these two opposing negotiating strategies meet to negotiate a deal?

  Emotional intelligence and organizational behaviour

How might emotional intelligence play a role in responding to abusive customers and what facets of emotional intelligence might employees posses who are able to handle abusive customers?

  Implement the following lp model in a spreadsheetimplement

implement the following lp model in a spreadsheet.implement the following lp model in a spreadsheet. use solver to

  Industries and parts of sectors of our economies

Many rich developed countries (like countries of the EU or the US have suffered from inexpensive imports coming from Asia and other emerging countries. As a result, many industries and parts of sectors of our economies have disappeard since the on..

  Explain an unidentified principal

Explain an unidentified principal and Ulani indicates that she is acting as an agent on behalf of an unnamed client

  Elucidate how does ball use operations management stay

Elucidate how does Ball use operations management to stay competitive in the metal beverage containers industry?

  Expected growth rate of the company dividends

Arts and Crafts, Inc., will pay a dividend of $2 per share in 1 year. It sells at $40 a share, and firms in the same industry provide an expected rate of return of 13%. What must be the expected growth rate of the company's dividends?

  Conflict of interest

Because arbitrators are selected by a negotiation between the two parties in the arbitration, this story indicates they are more likely to find for these repeat players. Discuss the ethics of this conflict of interest and what might be done to ove..

  Gap between knowledge and skills of healthcare workerssome

gap between knowledge and skills of healthcare workerssome of the key skills integral to the job of public health

  Describe the best possible merger or agreement to grow

With the same small business from the first discussion in mind, describe the best possible merger or agreement to grow your corporation and maximize profits.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd