An information security risk assessment for the organisation

Assignment Help Computer Network Security
Reference no: EM13924395 , Length: 3500 Words

Based on the case study supplied,write a report that includes;

a) An Information Security Risk Assessment for the organisation (Wolftech). A good answer will identify threats, vulnerabilities, and impacts. It will include priorities and risk treatment options. (35).

b) Discuss whether you think that the organisation will be able to successfully implement an information security policy. Identify any potential obstacles to success. (10)

c) You have been asked by the Chief Executive to consider whether seeking

Certification for ISO 27001 would be a good idea for the company. What is

your response? (10)

d) Discuss what the organisation needs to have in place in order to try to

Maintain operation following a major incident. (15)

You should aim to write no more than 3500 words (excluding appendices).

In your answers you are expected to demonstrate knowledge of appropriate topics discussed in the module, justify your answers and demonstrate further reading (please provide a list of references and / or bibliography). Any work that you submit must be your own interpretation written in your own words (cutting and pasting from the internet will result in an automatic fail).

Opportunity will be provided during / after the Lectures and workshops to ask individual or collective questions about this assessment. These are the times when tutors are available to answer questions relating to this module. You are encouraged to ask questions. Tutors cannot provide answers to the assessment questions asked above, but it is important that you are clear on what you are being asked to do. So please ask questions at an early stage. It is recommended that you begin work on this assessment as soon as you can in order to clarify anything that you are unsure of. Waiting until the final week to say that there is something that you do not understand will mean that you will struggle to produce a good answer.

Case Study

Wolftech is based in the Energy sector and currently employees 85 people who deal with businesses that are located in the UK, Central Europe and China. They have offices in each location, but the management team and main office are located in Wolverhampton. The company is part of a group that includes power plants in developing countries that are considered by some to be harmful to the environment.

Office staff have a range of PCs with different specifications and a number of staff and managers use laptops and mobile devices. Most of the company’s computers are now running Microsoft Windows 7 operating system and Microsoft Office 2010 Professional edition, however some computers are running Windows XP. Many senior staff use a variety of mobile devices (phones, iPads) to access mail, contacts and other work related files. When asked, the MD of the company was not aware of any addition security systems or software being used with mobile devices and believes that staff use both their own and company issued devices. The company servers are located in the basement of the Wolverhampton office. Backups are taken via removable hard disks which are locked in the system administrator’s desk. There does not appear to be any plans to respond to a loss of the servers.

The company uses Microsoft exchange server and operates Outlook for e-mail. Standard applications recently introduced include Microsoft CRM (for Customer Relationship and Contact Management) and Microsoft Share Point for collaborative working and document handling. Outlook Web Access is employed for remote web access to e-mail and public folders. Some staff use their webmail accounts to forward emails to when they are working from home or overseas. Back office systems may use bespoke front end and web-based applications linked to the company Oracle 11g database housed on a database server. The company website is hosted by an external hosting company. There is an integrated sales and purchase system. Accounting is linked with these systems but the main application is Sage 50 Accounts Professional together with the Sage 50 Forecasting package.

The company has a small IT Support team based at the Wolverhampton offices. Outside of the main office, support is provided via a help-line and remote access. A third party company is used for dealing with some of the more difficult problems. The Board do not consider that the company has experienced any cyber-security issues. The company does not currently have an information security policy, any issues would be the responsibility of IT Support.

The MD says that the systems administrator is very able to deal with any security issues; when passwords have been forgotten, he has been able to get into the affected accounts and he will not allow anyone else know the administrator passwords. He also told us that the administrator had been able to reduce the costs of some of the equipment by sourcing less expensive versions from China.

The MD stated that he never had password problems as his PA is able to remind him if he forgets a password. When asked whether the company used encryption he did not seem to understand the question but said that he would talk to the system administrator about this.

Reference no: EM13924395

Questions Cloud

Compute shamrocks roe directly : Compute Shamrock's ROE directly. Confirm this using the three components. Using the ROE computed in Part a, what is the expected sustainable growth rate for Shamrock?
Explain what you interpret about the target audience : Evaluate the message that is conveyed from what you observe from this digital footprint. Explain what you interpret about the target audience/users for this site.
Fisheries and conservation department : Routine surveillance by the Agriculture, Fisheries and Conservation Department (AFCD) has detected the presence of low pathogenic avian influenza A (H7N9) in a chicken cloacal sample from the Cheung Sha Wan Temporary Wholesale Poultry Market in Ho..
Construct the variables that you need in order to estimate : ECOM094 - a. Using the data contained in the dataset, construct the variables that you need in order to estimate eq. (1). b. Estimate eq. (1), report the results and comment on them. Are the results consistent with Taylor’s theory? Explain.
An information security risk assessment for the organisation : Based on the case study supplied,write a report that includes, An Information Security Risk Assessment for the organisation (Wolftech). A good answer will identify threats, vulnerabilities, and impacts. It will include priorities and risk treatment o..
Standard deviation of the scores : The standard deviation of the scores in the frequency distribution above is (to the nearest 1/10)
Is there evidence of a difference in daily customer count : At the 0.05 level of significance, is there evidence of a difference in the daily customer count based on the price of a small coffee?
What is the air pressure in the closed chamber b : Perform a dimensional analysis to determine the dimensionless groups that would be required to define the pump performance. Arrange the groups so that the power and pump pressure each appear in only one group.
Difference in the mean waiting times in the four locations : At the 0.05 level of significance, is there evidence of a difference in the mean waiting times in the four locations?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Critique the transition process performed by the dms in

write a three to four page paper in which youanalyze the security mechanisms needed to protect the dms systems from

  What is the difference between ethics and morality

In United States vs. Davis, the U.S. Court of Appeals for the 11th Circuit ruled that a warrant was needed to access cell tower data. Who (what court(s)) must follow this ruling and why?

  You work as a network administrator for a college located

you work as a network administrator for a college located in your local city. next door to the college is a new gated

  Differences between terms security class and security level

Explain the differences between the terms security class, security level, security clearance, and security classification and What are two rules that a reference monitor enforces?

  Describe the relevant technologies

Provide information about the topic (discuss the topic, describe the relevant technologies, applications of the technologies, clarify vague areas of other students postings, etc.)

  Describe what is your domain or area of research

Describe what is your domain or area of research, start from general then focus on the area of research - describe the significant/important of your research, why you need to solve this problem?

  Define the concepts of symmetric key encryption

Define the concepts of symmetric key encryption, public key encryption, and hashing and explain which of these techniques are used for confidentiality and authentication.

  Extract the password hashes from a machine

Extract the password hashes from a machine

  The set of laws rules directives and practices that

1.the set of laws rules directives and practices that regulate how an organization manages protects and distributes

  Identity information of customers and employees

In 300- to 400-words, explain why security professionals must be aware of the requirements for protecting personal identification information (PII) that may be stored on organizational information systems. Also, describe phishing and how it can be ..

  Discuss the requirements for remote administration

Discuss the requirements for remote administration, resource management, SLA management and billing management of your chosen provider. It may be useful to consider Morad and Dalbhanjan's operational checklists here.

  What tools chris used to take pictures of kayak prototypes

This project will have you validating forensic images, processing the data forensically by conducting key word searches and locating graphic files, as well as, finding EXIF data in the photos to determine what tools Chris used to take pictures of ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd