Develop the issp for the organisation

Assignment Help Computer Network Security
Reference no: EM131031736 , Length: word count:2000

Information Security Management-

Objectives- This assessment task can be undertaken in a group of up to 4 members or individually. Each group/student will analyse the given scenario of the organisation, and develop and document the specified Issue Specific Security Policy (ISSP) for the organisation.

Assessment criteria - The students are assessed against their ability to analyse the given scenario and develop the specified ISSP.

The marking criteria for Assessment Item 1 are provided on page 4.Students need to familiarise themselves with the marking criteria to ensure that they have addressed them when preparing the document for this assessment item.

Assessment Task - You are required to analyse the scenario on page 3 and develop the following ISSP for the organisation described in the scenario:

• Access and use of sensitive information of the organisation

The ISSP should include:

1. Statement of Purpose
2. Authorised Uses
3. Prohibited Uses
4. Systems Management
5. Violations of Policy
6. Policy Review and Modification
7. Limitations of Liability

You also need to include a section containing the justification of the contents of your policy as well as any assumptions that you have made.

Note: You need to upload the document containing the ISSP to Moodle. You must follow the Harvard citation and referencing guidelines.

Please do not include an executive summary, a table of contents, an introduction or a conclusion. Please use the ‘Template for Your Answers' Section of this document and upload only that template.

Check the course website at least once a week for further information relating to this assessment task. Please ensure that you write your answers in your own words to avoid possible plagiarism and copyright violation. You can understand the Plagiarism Procedures by following the corresponding link in the CQUniversity Policies section of the Course Profile.

The Scenario for Information Security Management Assessment Tasks

A private company in Australia plans to establish a private nursing school. The main campus of the nursing school is located in a suburb of Sydney and the satellite campuses are located in the suburbs of capital cities of three South East Asian countries. The company has made agreements with a private hospital in each of these locations to provide the internship and training to the students of the nursing school. The main and satellite campuses that are currently being constructed will have modern communication networks suitable for the business.

The lectures, tutorials and laboratory classes conducted in the main campus will form virtual classrooms with the satellite campuses. The students can participate in the virtual classes from within the campus premises or from their homes. More than 100 students are expected to enrol in each location in the first year.

The management of the company plans to help out the wider community by providing a telemedicine and homecare service to the needy patients at their homes. This service covers a radius of about 200km from the main and satellite campuses and will be provided with the help of a mobile team of health personnel.

The mobile team will be able to receive medical advice directly from the medical staff of the hospital in their country as well as the private hospital in Sydney via a virtual consultation room. The hospitals should be able to locate and contact all registered homecare patients. The nursing school should know the location of all their students and staff when they are on duty.

As the company is newly established, the information security policies are yet to be developed.

Reference no: EM131031736

Questions Cloud

Determine the constant for p required to cause the 0.5kg : The slider starts from rest at position 1 and the unstretched length of the spring of modulus k = 250 N/m is 200mm. Neglect friction.
What do you learn about the company hp inc : What do you learn about the company? What areas are changing and may be opportunities for cost control and improved profits?
How much charge is stored on each capacitor : In the figure (Figure 1), if C1=C2=2C3=26.3µF, how much charge is stored on each capacitor when V=47.0V?
Compare existential therapy and psychoanalytic therapy : The paper (6pages) will compare Existential Therapy and Psychoanalytic Therapy (Frued) as it relates to philosophy, key concepts and tenets, stragtegies and technqiues, and goals. Additionally, the paper will include a discussion of the appropriat..
Develop the issp for the organisation : Assessment Task - You are required to analyse the scenario on page 3 and develop the following ISSP for the organisation described in the scenario: Access and use of sensitive information of the organisation
Partial credit for incomplete assignment : Them tell me what future Supreme Court cases cited the Bethel case and tell me why or why not you agree or disagree. I expect at least three pages in order to get credit. I will not give partial credit for an incomplete assignment. The assignment ..
Find the minimum aperture diameter of a camera : Find the minimum aperture diameter of a camera that can resolve detail on the ground the size of a person (1.5m ) from an SR-71 Blackbird airplane flying at an altitude of 26km .
Prepare an individual tax return including all required form : Based on the information presented below, prepare an individual tax return (married filing jointly) including all required forms and schedules for Harry and HenriettaHurricane for 2015.
What is the direction of the acceleration : three forces acting on an object are given by f1=[-2.00i+2.00j]N,f2[5.00i-3.00j]N,f3[-45.0i]N.The object experiences an acceleration of magnitude 3,75 m/s to the power 2

Reviews

Write a Review

Computer Network Security Questions & Answers

  What are the benefits or privacy issues

What are cookies and how do they work? What are the benefits/ privacy issues? Short answer (1 -2 paragraphs).

  Describe how hacker might go about cracking message

Describe how a hacker might go about cracking a message encrypted with each type of algorithm. Suggest a specific application for each type of algorithm where the advantages clearly outweigh the disadvantages.

  Case study- risk management policy

Case Study- Risk Management Policy, You have just been hired as an Information Security Engineer for a large, multi-international corporation.

  How the companycan go online

How the company(luton) can go online, steps in which they should take before going online, security threat and have a disaster recovery plan.

  Identify the key features of the affordable care act

Identify the key features of the Affordable Care Act

  Security logic to specific forms in the web application

You will add additional security features to make the web application more secure. You will also add security logic to specific forms in the web application.

  The broad definition of computer crime can be described

According to the text, the broad definition of computer crime can be described

  Create and submit a security policy

Create and submit a security policy for McBride Financial Services, located in the Virtual Organizations. Develop a policy based on perceived needs associated within the loan department and issues in implementing online loan applications.

  Protocol stack for wap2

WAP protocol, cellular network infrastructure, SSL protect against eavesdropping, network datagrams (packets) be protected at the network layer, pin and fingerprint, Certificate Revocation, Public Key Infrastructure, modern symmetric algorithm bl..

  Attacking the devises by doing buffer overflow

Implement buffer overflow in c++ And attacking the devises by doing buffer overflow.

  Build on the systems development selected in week 2 and

build on the systems development selected in week 2 and design 1 to 2 user interfaces. explain how the user interface

  Efficient means of electronic payments

Think about security concerns and limited resources, do you think public sector entities should consider utilizing PayPal to facilitate inexpensive and efficient means of electronic payments?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd