Develop the issp for the organisation

Assignment Help Computer Network Security
Reference no: EM131021397

Its an Information security management Subject a branch for Network security.

Please do read the all the requirements before start the work.

Please do follow those rules and at the end their is Answer file, you need to use that file for the solutions.

Assessment Task

You are required to analyse the scenario on page 3 and develop the following ISSP for the organisation described in the scenario:

- Access and use of sensitive information of the organisation

The ISSP should include:

1. Statement of Purpose
2. Authorised Uses
3. Prohibited Uses
4. Systems Management
5. Violations of Policy
6. Policy Review and Modification
7. Limitations of Liability

You also need to include a section containing the justification of the contents of your policy as well as any assumptions that you have made.

The Scenario for Information Security Management Assessment Tasks

A private company in Australia plans to establish a private nursing school. The main campus of the nursing school is located in a suburb of Sydney and the satellite campuses are located in the suburbs of capital cities of three South East Asian countries. The company has made agreements with a private hospital in each of these locations to provide the internship and training to the students of the nursing school. The main and satellite campuses that are currently being constructed will have modern communication networks suitable for the business.

The lectures, tutorials and laboratory classes conducted in the main campus will form virtual classrooms with the satellite campuses. The students can participate in the virtual classes from within the campus premises or from their homes. More than 100 students are expected to enrol in each location in the first year.

The management of the company plans to help out the wider community by providing a telemedicine and homecare service to the needy patients at their homes. This service covers a radius of about 200km from the main and satellite campuses and will be provided with the help of a mobile team of health personnel.

The mobile team will be able to receive medical advice directly from the medical staff of the hospital in their country as well as the private hospital in Sydney via a virtual consultation room. The hospitals should be able to locate and contact all registered homecare patients. The nursing school should know the location of all their students and staff when they are on duty.

As the company is newly established, the information security policies are yet to be developed.

TEMPLATE

Access and Use of Sensitive Information of the Organisation

Mark

allocated

Mark earned

Assumptions

6

 

1 Statement of Purpose

 

3

 

2 Authorised Uses

 

3

 

3 Prohibited Uses

 

3

 

4 Systems Management

 

3

 

5 Violations of Policy

 

3

 

6 Policy Review and Modification

 

3

 

7 Limitations of Liability

 

3

 

Justification

6

 

References

2

 

Late submission penalty

 

 

Plagiarism penalty

 

 

Total

35

 

Verified Expert

The solution file contain 2300 words and discussed about the issues specific security policy for nursing school. It is explained ISSP and it should include Statement of Purpose Authorized Uses Prohibited Uses Systems Management,Violations of Policy Policy Review and Modification, Limitations of Liability. The references are included as apa format.

Reference no: EM131021397

Questions Cloud

Why might additional reductions in air pollution come : According to an article in the Economist magazine, however, recently some policymakers "worry that the EPA is constantly tightening restrictions on pollution, at ever higher cost to business but with diminishing returns in terms of public health."..
What trade-offs would be involved in cleaning up the final : To do 90 percent of the work only costs 10 percent of the money. It's the last 10 percent of the cleanup that costs 90 percent of the money." Why should it be any more costly to clean up the last 10 percent of polluted air than to clean up the fir..
Calculate the value of nominal gdp in grantland : Given the above information, calculate the value of nominal GDP in Grantland for 2010, 2011 and 2012. Provide any general formula you use to calculate these values and identify any abbreviations in that formula
Develop contingency plans for the possibility of sheltering : Formulate plans for sheltering the population in the immediate aftermath. Where could this population be safely sheltered in the short term?
Develop the issp for the organisation : You are required to analyse the scenario on page 3 and develop the following ISSP for the organisation - You also need to include a section containing the justification of the contents of your policy as well as any assumptions that you have made.
Find the y-intercept of this graph and explain what it means : Find the y-intercept of this graph and explain what it means in the context of the problem. Show all work to receive full credit. Explain the slope of the line.
Explained what advice you would give to frank and sarah : They wonder, Is a feeding tube equivalent to a breathing machine? Would it be possible to allow Ann to lie there and die of starvation? Is that murder? What would she want? What is the right thing to do? (Burkhardt & Nathaniel, 2008).
Determining the demand-supply analysis : An industry's supply and demand curves are given by the following equations: QD = 2000 - 4P and QS = 6P
Find the optimal risky portfolio : Find the optimal risky portfolio and its expected return and standard deviation - How much an investor with A = 5 will invest in the optimal risky portfolio

Reviews

Write a Review

Computer Network Security Questions & Answers

  Identify the current software security threats

The CISO often thinks that The Open Web Application Security Project (OWASP) is a good source to identify the current software security threats.

  Include strategies for developing secure software

You want to convince your software development manager that the team needs to include strategies for developing secure software. Your first step is to help your manager understand the common sources of risks in software. 1. Write a ½ to 1 page memo t..

  Determine impact of at least five potential logical threats

Determine the impact of at least five (5) potential logical threats that require attention. Detail the security controls (i.e., administrative, preventative, detective, and corrective) that the pharmacy could implement in order to protect it from ..

  Security domains of a typical it infrastructure

Analyze the seven security domains of a typical IT infrastructure and determine which two of the seven you would implement first for a nationwide bank. Explain your rationale for your choice.

  Case study on computer security

Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer.

  Determine plaintext and key from affine cipher

Below are given of ciphertext, from Affine cipher. Determine the plaintext and key. Give a clearly written description of the steps you followed to decrypt each ciphertext.

  What is the principle of adequate protection

What is the difference between a threat and a vulnerability? Define each, and then give at least one example of a threat and of a vulnerability.

  Draw network diagram of this network including ip addresses

Draw a network diagram of this network including IP addresses - Describe how the attack may have occurred with sufficient information to explain how a hacker could carry out the attack. Ensure you include references.

  How to identify udp socket and how to identify a tcp socket

How to identify a UDP socket and how to identify a TCP socket - Compare two pipelining protocols shown in the textbook

  Questions on cyber security

Question 1: Submit a list of five cybersecurity breach case studies. Question 2: For each breach, write a brief statement covering the following points: a\ When did the incident take place (dates)? b\ What went wrong? c\ What was the outcome?

  It security audit planning

Use the Web to conduct research on IT Security Audit Planning. Write a report which explains the Scope Definition

  Explain flow of information in and configuration of network

For the network that you have chosen to characterize, list the MAC Address, IP Address, IP Subnet Mask, Gateway Information. Based on this information, explain the flow of information in and configuration of this network.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd