Develop skills of dealing with new security trends

Assignment Help Management Information Sys
Reference no: EM131327086 , Length:

OBJECTIVES

This assignment is designed to assess students' ability to:

- Analyze the security frameworks challenges, risk and threats.

- Develop skills of dealing with new security trends.

And enhance:

- The student's knowledge through literature review.

- Use of CU Harvard referencing system to cite and reference academic resources

OUTCOME

Students must have an understanding of the following points

1. Critically evaluate Information Security requirements

2. Analyse risk management process.

3. Develop information security baseline(s).

Task 1: Submitting the assignment work proposal

Task 2:

Most organizations these days are moving towards a more technology based environment. Applying risk management frameworks will help to address the incremental risks associated with adopting these developing technologies such as BYOD, Cloud computing and virtualizations. Therefore, as an information security manager choose one of these technologies and:

a. Through two research papers analyse two frame works of Risk Management that can be used for your chosen technology/environment.

b. Through a case study show case the implementation process of risk management in any one of the environments.

Task 3:

Raising awareness is a critical part of the whole risk management process. In your opinion, as an information security officer discuss the different methods and techniques to raise security awareness.

Provide the following information in the report:

TASKS DESCRIPTION AND MARKS DISTRIBUTION

The marks allocation scheme for the assignment is as follows:

Task 1:

Expectation: Submitting the assignment work proposal which includes the student understanding and plan on how to complete the deliverables, which resources to use and the time line.

Task 2:

a. Through two research papers analyse two frame works of Risk Management that can be used for your choosen technology/environment.

Expectation: To define BYOD, cloud or virtualization and discuss two Risk Management frameworks that can be applied to these technologies to avoid risk and threats.

b. Through a case study show case the implementation process of risk management in any one of the environments.

Expectation: Analyse a case study where an organization that is adopting one the technologies has implemented risk management, showcasing the advantages , strengths and weaknesses.

Task 3:

Raising awareness is a critical part of the whole risk management process. In your opinion, as an information security officer discuss the different methods and techniques to raise security awareness.

Expectations: add your own opinion on various techniques and methedolgies to help raise staff awareness of the importance of information security.

- Originality of answer, i.e. writing in your words with some amount of referenced material

- Correct information and presentation in document form

- Adequate referencing and citation provided

- Submitting work proposal which include student solution plan and this will carry 10% of the marks

- Oral Examination/VIVA: Assignment marks are based on the VIVA which will be conducted upon submission of assignment. The VIVA will be based on the tasks given in the assignment. ZERO marks will be awarded to the student if he/she is absent for VIVA.

GUIDELINES

- The report should have 2500 words approximately.

- The document should be well presented and neatly done

- Assignment should be computer typed using Calibri 12 font and the soft copy should be submitted through Moodle, duly checked by TurnItIn to check the similarity of work. Please note the time mentioned above and also go through the Middle East College plagiarism policy given below.

- The report must have a Title Page, table of contents (optional), reference/ bibliography and page number. Every page must have header & footer.

- At least EIGHT references are required which must be referenced by using Harvard Reference System.

- Heading should be with Font Size 14, Bold, and Underline.

- Each student has to do the assignment individually. Please submit one hard copy to myself (during class or office hour) and upload soft copies through Moodle in time.

- You are welcome to discuss about the assignment with the lecturer in his/her office hours.

Verified Expert

The work is in 2500 word in Harvard in MS word where the focus has been on cloud computing and the risks management. it is important to work on the different methods which will improve the security and lead towards the development of the organization.

Reference no: EM131327086

Questions Cloud

Receive contributions to the profit sharing plan : Seth owns 50 percent of SM LLC, where he is the CEO. He turned 70 on May 3rd of this year. He continues to participate in the SM LLC 401(k) plan and receive contributions to the profit sharing plan. Seth must satisfy the minimum distribution rules by..
What drives them as individuals and for what purpose : Does our contemporary landscape reinforce, reject, and/or encourage these characters' relationships/ideas/interactions? In what specific ways? For what purpose?
Prepare analysis of financing strategies you would propose : Based on the company which is Ford Motor Co. that has been selected for your client's investment, prepare an analysis of financing strategies you would propose to pursue your recommendation.
What is a positive feedback mechanism : Explain homeostasis in a way your audience will understand it and why this concept is so crucial to A&P. What is a feedback mechanism and what are its components? What is a positive feedback mechanism? What is a negative feedback mechanism
Develop skills of dealing with new security trends : Information Security Management (COMP 0400) Analyze the security frameworks challenges, risk and threats and develop skills of dealing with new security trends.
Write an essay about the global warming : You have the opportunity to break away from the purely objective stance you were asked to take in your Exploratory Essay and present your own position about your topic.In order to successfully present your position, you must make your stance very ..
What is the economic rationale for the cost approach : What is the economic rationale for the cost approach? Under what conditions would the cost approach tend to give the best value estimate?
Funds at napa sunrise prior to full retirement age for plan : Jerry, who is age 56, was just called into the President’s office at Napa Sunrise, Inc. He just learned that his position has been eliminated in the recent reorganization. While he is devastated, he thinks he may attempt to retire and work on his gol..
Shows an evaluation hsbc relative to a peer bank chosen : Wrtie 2500 words report shows an evaluation HSBC relative to a peer bank chosen as BARCLAYS In london. Down below is a smaple of a similiar project i need it to be done in the SAME WAY.

Reviews

inf1327086

12/27/2016 4:47:08 AM

If two assignments/essays are similar in all aspects then marks will be deducted from both assignments. Your source of information should be mentioned in the reference page clearly. (For example: If it's from book, you have to mention the full details of the book with title, author name, and edition and publisher's name. or if it is from internet you have to mention the correct complete URL) Note: If you have any questions, please ask {during class timings or office hours).

len1327086

12/26/2016 12:35:52 AM

Task 2 A Through two research papers analyse two frame works of Risk Management that can be used for your chosen technology/environm ent. Analyze two research papers where it demonstrates different risk management frameworks with adding the student opinion and analysis Task 2 B Through a case study show case the implementation process of risk management in any one of the environments. 32-35 Analyze a case study showcasing advantages , strengths and weaknesses of the risk mngt implementation . with adding the student opinion and analysis Task 3 In your opinion, as an information security officer discuss the different methods and techniques to raise security awareness.

len1327086

12/26/2016 12:30:21 AM

• The report should have 2500 words approximately. • The document should be well presented and neatly done • Assignment should be computer typed using Calibri 12 font and the soft copy should be submitted through Moodle, duly checked by TurnItIn to check the similarity of work. Please note the time mentioned above and also go through the Middle East College plagiarism policy given below. • The report must have a Title Page, table of contents (optional), reference/ bibliography and page number. Every page must have header & footer. • At least EIGHT references are required which must be referenced by using Harvard Reference System. • Heading should be with Font Size 14, Bold, and Underline. • Each student has to do the assignment individually. Please submit one hard copy to myself (during class or office hour) and upload soft copies through Moodle in time. • You are welcome to discuss about the assignment with the lecturer in his/her office hours.

Write a Review

Management Information Sys Questions & Answers

  Does the availability and use of social media

Does the availability and use of social media on the Internet really provide businesses with new and different useful information? If so, how?

  Using the internet research the business uses of cloud

1. article reviewin this article review you will describe one thing about prototyping that surprised you the most. find

  Roles and responsibilities - retail supply managementi need

roles and responsibilities - retail supply managementi need some help getting started with the following

  Explain supply chain risk mitigation

Supply Chain Risk Mitigation and What factors (risks) can potentially disrupt a supply chain, and how

  Benchmarking of internal versus external service processes

benchmarking of internal versus external service processes

  Show the importance of managing employees and technology

This solution describes the technological changes that affect the general manager's job in the modern workplace. The human element in comparison to managing technology is also discussed.

  How do security managers facilitate the development

How do security managers facilitate the development of effective training, sound policies, and comprehensive procedures?  How are they implemented within the organization?

  Information technologycapital investmentinformation

information technologycapital investmentinformation technology now accounts for about 35 to 50 percent of total

  What are lessons learned within supply chain

What are lessons learned within supply chain and What is a lesson learned in relevant supply chain model that takes into consideration new business process, what should a company NOT do

  The importance of knowledge management to

the importance of knowledge management to organizationsmartime is a mexican headquartered trading firm that sources

  What are several e-business applications

What are several e-business applications that you might recommend to a small company to help it survive and succeed in challenging economic times. Why

  Explian solution to supply chain

The solution to Supply Chain - supply contract aid both parties in terms of their roles/responsibilities involving the supply chain

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd