Develop specified issue specific security policy

Assignment Help Management Information Sys
Reference no: EM131021823 , Length: word count:2000

Information Security Management - Australia

Objectives

This assessment task can be undertaken in a group of up to 4 members or individually. Each group/student will analyse the given scenario of the organisation, and develop and document the specified Issue Specific Security Policy (ISSP) for the organisation.

Assessment Task

You are required to analyse the scenario on page 3 and develop the following ISSP for the organisation described in the scenario:

- Access and use of sensitive information of the organisation

The ISSP should include:
1. Statement of Purpose
2. Authorised Uses
3. Prohibited Uses
4. Systems Management
5. Violations of Policy
6. Policy Review and Modification
7. Limitations of Liability

You also need to include a section containing the justification of the contents of your policy as well as any assumptions that you have made.

The Scenario for Information Security Management

Assessment Tasks

A private company in Australia plans to establish a private nursing school. The main campus of the nursing school is located in a suburb of Sydney and the satellite campuses are located in the suburbs of capital cities of three South East Asian countries. The company has made agreements with a private hospital in each of these locations to provide the internship and training to the students of the nursing school. The main and satellite campuses that are currently being constructed will have modern communication networks suitable for the business.

The lectures, tutorials and laboratory classes conducted in the main campus will form virtual classrooms with the satellite campuses. The students can participate in the virtual classes from within the campus premises or from their homes. More than 100 students are expected to enrol in each location in the first year.

The management of the company plans to help out the wider community by providing a telemedicine and homecare service to the needy patients at their homes. This service covers a radius of about 200km from the main and satellite campuses and will be provided with the help of a mobile team of health personnel.

The mobile team will be able to receive medical advice directly from the medical staff of the hospital in their country as well as the private hospital in Sydney via a virtual consultation room. The hospitals should be able to locate and contact all registered homecare patients. The nursing school should know the location of all their students and staff when they are on duty.
As the company is newly established, the information security policies are yet to be developed.

Word count - 2000

Reference no: EM131021823

Questions Cloud

How does the decision in this case impact the validity : Cite and include on the reference page at least 3 peer-reviewed sources. Use sources from this course (text, readings), Library, or appropriate articles from the internet.
What is the encryption algorithm : What is the encryption algorithm? How secure is it?
Loss of revenue due to employee theft : Erosion can be explained as the: A. additional income generated from the sales of a newly added product. B. loss of current sales due to a new project being implemented. C. loss of revenue due to employee theft. D. loss of revenue due to customer the..
Following transactions have not been journalized for july : In addition, the following transactions have not been journalized for July. The cost of all merchandise sold was 65% of the sales price.
Develop specified issue specific security policy : Analyse the given scenario of the organisation, and develop and document the specified Issue Specific Security Policy (ISSP) for the organisation.
Modify movebug so that if the bug can not move : Write a method named moveBug that takes a bug as aparameter and invokes move. Test your method by calling it from main. Modify moveBug so that it invokes canMove and moves the bug only ifit can.
Explain the functionality of a firewall and give an example : Explain the functionality of a firewall and give an example of a firewall. 200 word response. Describe a Network Address Translation (NAT). Provide an example of NAT.200 word response.
Defining the rights of management and unions : Use at least three references from outside the course material, one reference must be from EBSCOhost. Text book, lectures, and other materials in the course may be used, but are not counted toward the three reference requirement.
How many of these people are unemployed : Suppose that in a hypothetical economy there are 400 people who have jobs and 100 people who are at least 16 years old that do not have jobs. Given this information, how many of these people are unemployed

Reviews

Write a Review

Management Information Sys Questions & Answers

  Determine the problem as the proper network problemtopless

determine the problem as the proper network problemtopless city is a small chain of car dealerships that sells vintage

  Who are your stakeholders for this project

Who are your stakeholders for this project and What characteristics do you look for when identifying a project stakeholder?

  The performance chain and key components are discussedshow

the performance chain and key components are discussed.show the performance chain as it applies to your organization or

  Data information and knowledgewhat are some of the issues

data information and knowledgewhat are some of the issues inherent in managing data? you must state two issues and

  Write essay about effect of social media in children

Write essay about " Effect of social media in children"

  Benefits of using graphs in the report presentation

From Part 1 of this discussion, determine the main benefits of using graphs in the report presentation. Next, explain the matter in which a creatively constructed graph might help you to better manage and present your data

  Prepare materials for a presentation arguing opposing side

You are required to prepare materials for a presentation arguing the opposing side of the argument that you developed in your case study report. The audience you are aiming this for is senior executives.

  Was your social media strategy successful

Let's suppose your current annual sales are $1 million. You implement social media strategy and begin generating $200,000 in revenue through your Facebook page. At the end your sales are still $1 million. Was your social media strategy successful?..

  Important information about quality control amp supply

important information about quality control amp supply chain managementuse the library corporate web sites and other

  What critical tasks does it facilitate in purchasing process

Briefly describe the steps of a pure prototyping methodology as an alternative to an SDLC approach. Which disadvantages of an SDLC methodology are addressed by a prototyping approach?

  Analysis of a topic of information systems management

Description: Write a 5 page description and analysis of a topic of information systems management in an organization. Objectives: Identify a topic or issue of current interest related to the course. Learn how to search Library Catalogs, Databases and..

  Evolution of current generation database technologies

Write Annotated Biblicagraphy on Evolution of Current Generation Database Technologies

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd