Potential vulnerabilities and risks the unitc system

Assignment Help Management Information Sys
Reference no: EM13985219 , Length: word count:3000

Learning Outcomes:

After completing the module you should be able to:

1. Critically evaluate concepts, principals and practice in the area of information systems security.

2. Demonstrate an in-depth understanding of a comprehensive risk management practice for ensuring secure information systems

3. Demonstrate the ability to consider relevant ethical and legal issues involved in the information systems security

4. Demonstrate the ability to perform information systems security audit based on industry specific standard and summarize the audit results

5. Critically evaluate and develop security policy and assess for the effectiveness and improvement of information systems security

6. Demonstrate the ability to document and explain in a professional manner their work

Your assignment should include a title page containing your personal details, the module name, the submission deadline and a word count; the appendices if relevant; and a full bibliography in Bournemouth University (BU) Harvard format. You should address all the elements of the assignment task listed below. Additional marks are awarded for the good use of theory and the supply of additional information from academic research and journalistic sources.

Word Limit: 3000 words (maximum)

Assignment Task

You have been placed in charge of Security for a new integrated IT system called UNITC (UN IT Cloud) system for handling United Nations communications between various regional offices across the world. The new strategy is to migrate to cloud to reduce operation and capital costs related to IT and communications by moving to a full paperless environment. The mandate has been published to all UN regional offices.

The regional offices have different level of activities in various divisions (departments) and agencies including human rights, financial affairs (banking), drug and criminal, culture, health, etc. as well as organizational charts for C-level management, human resource, finance, legal, IT, research departments, security, etc.

The new IT strategy requires a systematic paperless communication systems with different privileges upon the confidentiality and roles of users in the network.

The regional sites now should migrate to the paperless system with secure data stores for official documents, also emails and recordings related to the telephones calls.

The web presence is aiming to become more centralised with options to navigate to the regional sites. The cross domain communications are still required as most of the regional offices have autonomy to maintain and update their own presence in the Internet. However, they must follow the security guidelines and adapt a proper IT and security governance set by the UN IT department. The aim is to shift the responsibilities to regional offices to maintain their systems according to the IT Security Guidelines set as part of the UNITC system.

Question 1

Discuss the potential vulnerabilities and risks the UNITC system may be exposed to from the cloud and sub-systems. Rank the vulnerabilities in order of severity (from UN central office viewpoint) and justify the ranking with suitable academic argument and referencing.

Question 2

During the initial migration phase of tier-1 UN regional offices to UNITC, you discovered from the security logs that a virus was detected in the research reports related to UN Human Right division and dealt with automatically with no harm being done.

The UN Technology Director has mandated that all security flaws and virus attacks within the first year of operation must be reported with a statement as to how the system would be modified and governed to deal with a future attempt.

Consider the issues involved and determine whether or not you would report it. You need to explain the rational for each issue. Justify your decision with reference to standard practices. Reference the standard practices.

Question 3

The UN Technology Director has difficulty determining whether or not the system should go live without a paper system being used to shadow all functions during the first year of operation. They ask for a report from you on the issues from a security point of view. With suitable referencing and argument discuss your choice of approach.

Reference no: EM13985219

Questions Cloud

How far does ball fall before being brought momentary stop : A 350 g ball is attached to a vertical spring. The spring constant is 41 When released from rest, how far does the ball fall before being brought momentary stop by the spring?
Is there any downside to this for the homeowner : Residential mortgage terms (mortgage notes) have become increasingly uniform as the mortgage market has become more national and efficient. Is there any downside to this for the homeowner?
What is the shear modulus of jell-o : You push tangentially across the top surface of Jell-O with a force of 0.37 N. The top surface moves a distance of 10.5 mm relative to the bottom surface. The height of Jell-O is 2.5 cm, area is 3.5cm by 4.5 cm. What is the shear modulus of Jell-..
Calculate the unlevered net present value : Calculate the unlevered internal rate of return (IRR). Calculate the unlevered net present value (NPV).
Potential vulnerabilities and risks the unitc system : Discuss the potential vulnerabilities and risks the UNITC system may be exposed to from the cloud and sub-systems - explain the rational for each issue. Justify your decision with reference to standard practices. Reference the standard practices.
Find the height of its image : Suppose you are in a partially darkened room holding a flat piece of white cardboard in one hand and a converging lens of focal distance 6.6 x 10-2 m in your other hand. You want to form an image of the window in front of you, which is at a distan..
Calculate the fixed cost per unit : Selected financial data for Spark Enterprises follows for a production level of 120,000 units: Total fixed costs $300,000 Total costs (fixed and variable) $450,000
What are the magnitude and the direction of the current : A circular loop has radius R and carries current I2 in a clockwise direction (see figure). The center of the loop is a distance D above a long, straight wire. What are the magnitude and the direction of the current I1 in the wire if the magnetic f..
Write a letter of application to an advertised position : Application letter: Write a letter of application to an advertised position. It should highlight your background and experience to explain precisely how you fit your reader's needs. You have to convince the prospective employer to interview you. You ..

Reviews

Write a Review

 

Management Information Sys Questions & Answers

  Standpoint of a leader in a global organization

Unethical Organizational Behaviors - This solution discusses ethics from the standpoint of a leader in a global organization.

  Minis sales department use crm technologyhow can minis

minis sales department use crm technologyhow can minis sales department use crm technology to improve the

  What opportunities might exist for an organization

What opportunities might exist for an organization to expand its primary Web site to better support the e-commerce efforts

  Method of evaluating a product or service

Compare and contrast crowdsourcing and user studies as a method of evaluating a product or service. Which method is more effective, and why

  Strategic planning helpcomplete the strategic toolkit as it

strategic planning helpcomplete the strategic toolkit as it relate specifically to strategy implementation of the

  What is the real exchange rate and what is stagflation

On a correctly labeled graph, show AD, SRAS, LRAS, actual GDP, potential GDP and the equilibrium price level -  government increases its spending by making three new Star Trek movies - On a graph, show the effect on AD, SRAS, LRAS, actual GDP, potent..

  Aspects of creating and conducting an online questionnaire

Describe the easy and difficult aspects of creating and conducting an online questionnaire. Assess the reliability of the collected data and include the survey report

  Existing personnel could increase the value of this busines

existing personnel could increase the value of this business process.

  Describe an information systemplease provide a description

describe an information systemplease provide a description of an information system that you have encountered such as

  Management information system

Explain the planning, execution, manage/control and closing phases involved with this project.

  Risk management and business continuity issues

Data within an enterprise is complex at best. To better deal with a wide range of data, each type of which has unique access and security requirements, enterprise information architects often create data domains. Risk management and business conti..

  Compare various ways expert systems can be used in business

Compare various ways expert systems can be used in business decision-making situations. Introduction: Almost everything we do today involves some type of expert system; a simple and common example is the diagnostic system that mechanics use to dia..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd