Design a security plan that describes counter-measures

Assignment Help Computer Network Security
Reference no: EM13307592

1. The learning objectives of the Security Plan Assignment are for you to recognise the threats to information assets that exist in your current or future work place. The complacent and lackadaisical approach many organisations have towards the security of their information holdings is common. You have, through your research essay and ongoing inquiry, the opportunity to identify the threats, outline security guidelines and develop a robust and pragmatic training programme. You should develop a plan that you would regard as helpful to you, the information user, as well as protecting your organisation's information environment. Use your imagination in combination with a wide-range of material you glean from your research - have fun!

2. You are required to complete and submit a security plan based on the following scenario:

a) You are the recently appointed head of a security team responsible for protecting the information holdings of a business organisation of some 60 staff. The organisation is housed in a detached, multi-storeyed building located in the central business district of an Australian city.

b) The security team is responsible for overseeing the security of information from deliberate and accidental threats. A recent audit of the information security management system found it to be deficient in some key areas, notably incident response, disaster recovery and business continuity, social engineering exploitation of personnel, an apparent lack of personnel awareness of the various threats to information, and poor password security. These issues were identified as needing urgent remedy.

c) Technical systems were found to be reasonably effective in maintaining database and document management security, and were well serviced by the IT team.

3. Management has directed you to undertake some security analysis and planning to improve the organisation's security of information. You are tasked to:
a) Identify and describe the organisation's physical, human, and electronic information holdings that may be at risk.
b) Identify and describe the actual and potential physical, human, and electronic threats to the organisation's information holdings.
c) Design a security plan that describes counter-measures that will manage the threats that put the organisation's information holdings at risk and disaster recovery processes.
d) Develop a comprehensive information security education and awareness programme for use by management, staff members and contractors).

4. Use the marking sheet as a possible template to prepare your security plan.

5. The assignment must include the following to enhance your grade:

a) Include a title page containing the topic, number of words, unit name, student name, student number and trimester/semester year or study period, complete, and attach a coversheet as part of the same assignment document.

b) Identify and describe what is at risk and the potential threats that may exploit the vulnerability of the organisation's physical, human and electronic information assets - you should read the topic notes AND from the recommended readings and URLs provided in the Unit Learning Guide AND from your OWN research in order to define these threats.

c) Design a security plan that describes counter-measures that will manage the threats that put the organisation's information assets at risk. The security plan should cover a full range of protection measures - please refer to your topic notes for leads and the marking guide and then undertake your own research.

d) Detail the steps you consider necessary to enhance information security through a security education, training awareness (SEATA) programme and include a description of the specific objectives you hope to achieve and the measures you would use to test the efficacy of your plan, i.e., to monitor and sample staff awareness of the SEATA programme.

e) INCLUDE REFERENCES OF ALL THE WORK OF OTHER AUTHORS YOU HAVE USED IN THE BODY OF THE ASSIGNMENT. WHILE YOU HAVE SOME LICENCE TO BE IMAGINATIVE IN DESCRIBING THE ORGANISATION'S ENVIRONMENT, MUCH OF YOUR ASSIGNMENT WILL CONTAIN WORKS YOU HAVE RESEARCHED OR ARE AWARE OF. CONSEQUENTLY, MARKS WILL ONLY BE AWARDED WHERE IT IS CLEARLY INDICATED (REFERENCED) THAT YOUR TEXTS ARE BASED ON CREDITDABLE SOURCES. PLEASE AVOID PLAGIARISING THE WORKS OF OTHERS!!!

f) Include appropriate headings and sub-headings.

6. The quality and breadth of references used will be taken into account and credit will be given for evidence of wide reading on the topic and use of material from a variety of sources (i.e., books, journals, websites, newspapers, etc).

7. You will also be assessed on the presentation of your Security Plan, as well as the contents. Marks will not be awarded where correct referencing is not used. Marks will not be awarded where the above instructions are not followed.

8. If you are presently working for an organisation, please do NOT include any information or reference to its security plans or policies in your assignment, if this contravenes or potentially jeopardises the organisation's interests. IF IN DOUBT - LEAVE IT OUT. If you are uncertain about this issue, please consult the Unit Coordinator for further advice.

Verified Expert

Reference no: EM13307592

Questions Cloud

The immigration reform and control act : The Immigration Reform and Control Act
Jobs requiring comparable levels of knowledge-skill : According to the concept of ____, the pay for jobs requiring comparable levels of knowledge, skill, and ability should be similar even if actual duties differ significantly.
Vandalism and defacement of public property caused : For decades, new york city has had to deal with the vandalism and defacement of public property caused by unauthorized graffiti. Among other attempts to stop the damage, in December 2005 the city banned the sale of aerosol spray-paing cans and bro..
Explain how the method represents knowledge : Select a method for knowledge representation and reasoning that we have not covered in lectures and write 1{2 pages addressing the following: briefly describe how the method represents knowledge and include an example; briefly describe the inferenc..
Design a security plan that describes counter-measures : Design a security plan that describes counter-measures that will manage the threats that put the organisation's information assets at risk. The security plan should cover a full range of protection measures
Calculate the heat rejected by the steam : steam at 18mpa and 600 c is contained in a cylinder of volume 0.5m3 , calculate the heat rejected by the steam
What is the energy dissipated in the resistor : what is the energy dissipated in the resistor for a battery with an emf of 12 volts connected to a 545-ohms resistor
Assuming a sandstone grain density : Assuming a sandstone grain density of 2.65 g/cm3, calculate the porosity of a 3 in. long sandstone core sample of 1.5 in. width and breadth, respectively, if the grains weigh 275.0 g?
Minoans went barefoot inside of their houses comes from : The conclusion that the Minoans went barefoot inside of their houses comes from

Reviews

Write a Review

Computer Network Security Questions & Answers

  Strategies and recommendations to the cio

Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization and draft a one page Executive Summary that details your strategies and recommendations to t..

  Desktop publishing system

Consider a desktop publishing system used to produce documents for various organizations. a. Give an example of a type of publication for which confidentiality of the stored data is the most important requirement

  Intrusion detection system (ids)

concept of Data, information and knowledge in information warfare, politically motivated computer misdeeds, McClintock Manufacturing, Percentage of Windows systems that run antivirus software that is updated each day, network traffic that is evaluate..

  Recall that a computer virus is malware

Recall that a computer virus is malware that relies on someone or something (other than itself) to propagate from one system to another. Write a computer virus that can be written to other empty text documents by running the batch program.

  Describe malicious things over a computer network

Suppose Ali and Jim are sending packets to each other over a computer network. Suppose Thomas positions himself in the network so he can capture all packets sent by Ali and send whatever he wants to Jim; he can also capture all the packets sent by..

  Understanding project priorities and scheduling issues

hat general suggestions would you give for helping to promote common understanding of project priorities and critical scheduling issues,

  Desktop publishing system used to produce documents

Consider a desktop publishing system used to produce documents for various organizations. Give an example in which system availability is the most impotent requirement. Please be very brief.

  Discuss any threats to priva

Companies would share. sign-on Information for any Weh user Mb 0 agree to participate. They would also share personal Information such as call card dela, billing addresses, and personal preferences.

  Cyber terrorism

competitive intelligenc, information safekeeping governance, administration, ISO/IEC 27002, Conceptual Framework

  What password protection measures taken system administrator

What password protection measures are normally implemented by system administrators, operating systems, and security services? Describe the pros and cons of enabling audits of resource accesse

  Create random secret one-time pad key ka and xors

Creates random secret one-time pad key KA and XORs it with K. She sends M1 = KA K to Bob. Bob creates random secret one-time pad key KB, XORs what he gets with it to compute M2 = M1 KB.

  New technologies using sophisticated anti-copying measures

Which is more probably to be effective in protecting intellectual property in digital media like CDs and DVDs: tougher copyright laws or new technologies incorporating more sophisticated anti-copying measures?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd