Develop information security baseline

Assignment Help Other Engineering
Reference no: EM132628361 , Length: word count:1500

COMP 0400 Information Security management - Middle East College

Learning Outcome 1: Develop information security baseline(s).
Learning Outcome 2: Manage reviews to identify events and corrective actions

Task 1 :

Submit a work proposal for this assignment or before 30/08/2020 (23:59) which must include:

• Understanding of deliverables - a detail description of deliverables.
• General overview of proposed plan - initial understanding of solution to task2.
• Timeline for completion of the given tasks.
• references

Task 2

SALT (Smart And Living Technologies) is a medium sized Software Development company in South Australia which was established in 2004. It is present in two premises, both of which have their offices. Additionally, they have hosted their information systems in a hosted data center facility with a service provider. That is the only instance of their IT infrastructure. SALT is providing software solutions and consulting services to clients all over the world, who fall under small to medium sized businesses. The departmental heads are mostly the people who were there since first day of the business, except the CISO that is a new role introduced recently. This explains why heads of department in SALT have a good knowledge about their business processes but did not make much effort towards formal documentation. Alex Smith is the CEO of SALT. He started the company in partnership with a friend Brett. Brett is an investor in the company but has a dormant role as far as the business operations are concerned. Mr. Smith is an engineer but he has no modern technical understanding of IT security issues. Alex has had no problems with IT Security until very recently when the Company's network was subject to a series of attacks. In the period of 3 days, the company's website was defaced, a serious virus infected the company e-mail and large quantities of data were corrupted. Smith is worried about cyberterrorism and is concerned about becoming a victim of e-crime. After discussing with the Executive committee, he appoints you as a Chief Information Security Officer (CISO). As a first step, you will review the current threats analyse the impacts, and create necessary management plans. The CEO has shared a recent audit report to start with and the shocking results are listed below:

a. General
Improper operating procedures used by employees. Lack of security awareness and general security laziness. Nil acceptance of security responsibility.
In-adequate standard operating procedures. Unattended machines.
Failure to take care of media. Printing sensitive material.
Failure to turn off computers at the end of the working day. Failure to backup information.

b. Hardware problems
Failure to adequately secure the hardware (eg laptops unsecured). Effects from the physical environment causing damage.
c. Software concerns
some application software is of inferior quality and untested in the field and therefore not able to be trusted in the office environment.
Nil audit logs.
Lack of adequate access control.
Lack of secure identification and authentication techniques. Limited antivirus software.
Lack of restrictions to specific files when certain applications are operating. Lack of security awareness and general security laziness.

1. Discuss the information security impacts of the current situation in SALT with appropriate examples.
(Hint: Give a minimum of two appropriate examples)

2. Using literature, recommend and discuss one cyber security incident response standard that would help SALT to manage the security incidents Smith is worried about.
(Hint: your discussion should be defended by literature)

3. Develop a baseline to protect SALT from being attacked again.

(Hint: your baseline should include at least 10 technical/ non-technical requirements with appropriate explanation.)

4. Most of cyber security crimes could be avoided by enhancing the users' security awareness. With appropriate security guidelines, design an appropriate cyber security awareness campaign to help SALT limit the impact of cybercrimes.

Task 3: Proper referencing, literature review, conclusion and report format

Attachment:- Information Security management.rar

Reference no: EM132628361

Questions Cloud

What is the descriptive bit of bentham theory : What is the descriptive bit of bentham theory? What is the prescriptive bit of benrhams theory?
What amount of share options outstanding smiley corporation : What amount of share options outstanding should Smiley Corporation should recognize as a result of this plan for the year ended December 31, 2018?
Examine the hernandez family in brief : Assessment is as essential to family therapy as it is to individual therapy. Although families often present with one person identified as the "problem,".
Promote the development of better critical-thinking skills : Discuss ways in which greater cultural, racial, and age diversity in the student population might enrich the college experience and promote the development
Develop information security baseline : Develop information security baseline(s) and Manage reviews to identify events and corrective actions - Discuss the information security impacts of the current
What should be the balance of the notes payable account : What should be the balance of the Notes Payable account on the books of Leary at December 31, 2016 after adjusting entries are made
Prepare a statement of stockholders equity : Question - Link the income statement to the statement of stockholders' equity. Prepare a statement of stockholders' equity
Provide the journal entries with a revaluation : Provide the journal entries, both without and with a revaluation, for years 1 to 3. MR Ltd acquires an asset for a consideration of $250 000 on 1 July 2019.
Describe the quality improvement organization : Describe the Quality Improvement Organization (QIO) and explain how the QIO improves policies and healthcare for Medicare beneficiaries.

Reviews

Write a Review

Other Engineering Questions & Answers

  Based on verifiable and substantiated position

In 125 to 200 words each, respond to at least two classmates. In each response, address your classmate's questions and concerns with information from class and your own research or web search. Then, analyze your classmate's description of argument..

  Design a box section to be used as a cantilever beam

Design a box section to be used as a cantilever beam of length L = 2 m subject to a tip load P = 1000 N. Limit the tip deflection δ to 1/300 of the span L of the beam.

  Contrast each of the eight classes of mechanical hazards

Compare and contrast each of the eight classes of mechanical hazards. Describe the type of injury that may result from these hazards.

  Identify and explain the main feed and product streams

Process &Instrumentation Diagram of the process chosen for study and identify and explain the main feed and product streams, pumps, valves, equipments and signals in Process &Instrumentation Diagram

  Describe the applications of dsps

Problem: Special Purpose Microprocessors. Describe the Applications of DSPs. Advantages over general purpose processors for certain applications.

  Kindly answer the following epistemology questions

Someone who claims that sense experience is our sole source of knowledge about the world would best be described as a?

  Draw diagrams for a right-left rotation

Draw diagrams for a right-left rotation similar to those in the text for the left right rotation.

  Determine the cumulative exposure in wlm

Determine the cumulative exposure in WLM and determine the rate of emanation into the stope - working level of radon daughters at exit due to the initial radon

  Iron loss and copper loss

What is the different between iron loss and copper loss?

  Calculate the present value and future value of the machines

Find the present value and future value of the machines over the next 5 years if money is worth 10% compounded continuously.

  Determine the numerical integral of construction functions

N5E28 Further Mathematics for Construction Assignment - Determine the numerical integral of construction functions using two different methods

  Write a program to swap the first element of the array

Write a program to swap the first element of the array with the last element of the array, the second element with the second-to-last element, and so on.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd