Ethics in infosec of the staff of information security

Assignment Help Computer Engineering
Reference no: EM132218536

Objectives

This assessment task relates to Unit Learning Outcomes 1 and 5 and can be undertaken in a group of up to 4 members or individually. Distance students can form groups with on-campus students as well.You will analyse the scenario given on page 3and discuss the issues given in the Assessment Task below by contributing to the Group Discussion Forum of your group in Moodle during weeks 3, 4, 5, 6 & 7.

Assessment Task

You are required to analyse the scenario given on page 3 and discuss the following issues in the specified weeks by contributing to the Group Discussion Forum of your group.

a) Legal issuesrelated tomishandling of information of patients by the mobile teams of NTN

b) Ethics in InfoSec of the staff of Information Security Division of NTN

c) The measures that the Information Security Division should take to prevent all staff members of NTN from handling information unethically

d) Assume that you obtained a job at the Information Security Division of NTN. Your line manager asked you to study the InfoSec programs and policies of similar health-related organisations on the web and provide the following information:

(1) Components of InfoSec programs that you found (Due in Week 6).

(2) National and/or international InfoSec standards that these organisations follow.

Reference no: EM132218536

Questions Cloud

Find the mean marks of all 40 students : The average marks of 39 students of a class is 50 . the marks obtained by 40 students are 39mpre than the average marks of all the 40 students.
Briefly describe the osi reference model : Briefly describe the OSI reference model and the TCP/IP networking model, use diagrams to show the relation between both these models.
Calculate tax for the employees of a company called xyz : Write a Java program that will calculate tax for the employees of a company called XYZ.
Explain evolving market regimes and outcomes : Identify and explain evolving market regimes and their outcomes.
Ethics in infosec of the staff of information security : COIT20263 : The measures that the Information Security Division should take to prevent all staff members of NTN from handling information unethically.
How to develop financial statements : How to develop financial statements? How to develop a Balance Sheet, Profit and Loss Statement and Cash Flow Statement
Find the effective rate of the compound interest : Find the effective rate of the compound interest rate or investment. (Round your answer to two decimal places.)
Create an erd that represents the entities and attributes : Create an ERD that represents the entities, attributes, the relationships between entities, and the cardinality and optionality.
Describe the role arp cache plays in establishing address : Describe the role ARP Cache plays in establishing Address Resolution Protocol (ARP)?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd