Critically evaluate information security requirements

Assignment Help Computer Network Security
Reference no: EM131519028 , Length: word count:2500

OBJECTIVES

This assignment is designed to assess students' ability to:
- Analyze the security frameworks challenges, risk and threats. .
- Develop skills of dealing with new security trends.

And enhance:
- The student's knowledge through literature review.
- Use of CU Harvard referencing system to cite and reference academic resources

OUTCOME

Students must have an understanding of the following points
1. Critically evaluate Information Security requirements
2. Analyse risk management process.
3. Develop information security baseline(s).

Part -1:

Task 1: Submitting the assignment work proposal

Task 2:

Information Security Managers must be aware of the fact that information security controls must be developed for IT- and non-IT-related information processes. This will include secure marking, handling, transport and storage requirements for physical information. It must include considerations for handling and preventing social engineering. Environmental controls must also be taken into account, so that otherwise secure systems are not subject to simply being stolen, as has occurred in some well-publicized cases.

There are a number of standards and guides available for information security management that should be familiar to the ISM.

One of the most accepted for technical and nontechnical components of information security is the ISO/IEC 17799 Code of Practice, now ISO 27001.

a. Through a minimum of two research papers critically analyse any two ISO standards in terms of history, versions (if any), pros and cons and diagrams.

b. Through a case study, analyse the adaptation and implementation of any one of your chosen standards.

Task 3: Add your own statement on future challenges when adopting such standards.

Provide the following information in the report: TASKS DESCRIPTION AND MARKS DISTRIBUTION

Part -2:

Task 1:

Expectation: Submitting the assignment work proposal which includes the student understanding and plan on how to complete the deliverables, which resources to use and the time line.

Task 2:

b. Through a minimum of two research papers critically analyse any two ISO standards in terms of history, versions (if any), pros and cons and diagrams.

Expectation: To cover all details of the standards discussed from all aspects.

c. Through a case study, analyse the adaptation and implementation of any one of your chosen standards from in any organization.
Expectation: Analyse a case study where an organization is adopting and implementing one the ISO standards, showcasing the advantages, strengths and weaknesses.

Task 3: Add your own statement on future challenges when adopting such standards.

Expectation: add your own opinion and understanding of main gaps in provided standards and challenges which are still happening till date.

Reference no: EM131519028

Questions Cloud

Discuss about the trait model of personality : Briefly compare and contrast the basic assumptions of this model and the psychodynamic model of personality.
What does standpoint theory mean : What does standpoint theory mean in terms of the theoretical work and everyday lived realities of women and minorities
Elements of the change process visible : Describe the elements of the change process visible in this challenge. What caused problems? What were the solutions?
Considering new three-year expansion project : Quad Enterprises is considering a new three-year expansion project that requires an initial fixed asset investment of $2.88 million.
Critically evaluate information security requirements : Information Security Management (COMP 0400) Critically evaluate Information Security requirements- Analyse risk management process.
Components for the steel industry : A large diversified conglomerate with plants located in 21 countries, that that makes specialist ceramics and other components for the steel industry.
What personal standards would guide your response : Case: A Letter from Prison (critical essay)- What personal and professional standards would guide your response to the challenges?
What is the restaurant sales-total assets turnover ratio : Imagine you are head of the food and beverage department in a large Los Angeles hotel complex. One of the hotel's restaurants is currently earning an annual.
Identify the disorder and describe the main characteristics : Identify the disorder and describe the main characteristics of this disorder, including the causes and symptoms

Reviews

len1519028

6/6/2017 1:32:49 AM

Task 3 Expectation 0 1-20 Add your own statement on future challenges when adopting such standards. add your own opinion and understanding of main gaps in provided standards and challenges which are still happening till date. Plagiarized report Student’s opinion with significant evidence Task 1 Expectation 0 1-10 Proposal submission Submitting the proposal correctly No submissions Submitted

len1519028

6/6/2017 1:32:38 AM

Task 2 A Through a minimum of two research papers critically analyse any two ISO standards in terms of history, versions (if any), pros and cons and diagrams. 32-35 Analyze two research papers where they define and demonstrate two different standrards of ISO standards with student opinion and analysis Task 2 B Through a case study, analyse the adaptation and implementation of any one of your chosen standards from in any organization 32-35 Analyze a case study showcasing advantages , strengths and weaknesses of the standard implemented with adding the student opinion and analysis

len1519028

6/6/2017 1:32:11 AM

GUIDELINES • The report should have 2500 words approximately. • The document should be well presented and neatly done • Assignment should be computer typed using Calibri 12 font and the soft copy should be submitted through Moodle, duly checked by TurnItIn to check the similarity of work. Please note the time mentioned above and also go through the Middle East College plagiarism policy given below. • The report must have a Title Page, table of contents (optional), reference/ bibliography and page number. Every page must have header & footer. • At least EIGHT references are required which must be referenced by using Harvard Reference System. • Heading should be with Font Size 14, Bold, and Underline. • Each student has to do the assignment individually. Please submit one hard copy to myself (during class or office hour) and upload soft copies through Moodle in time. • You are welcome to discuss about the assignment with the lecturer in his/her office hours.

len1519028

6/6/2017 1:31:58 AM

Students will be evaluated on the following point • Originality of answer, i.e. writing in your words with some amount of referenced material • Correct information and presentation in document form • Adequate referencing and citation provided • Submitting work proposal which include student solution plan and this will carry 10% of the marks

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd