Evaluate cybersecurity asset management

Assignment Help Management Theories
Reference no: EM133499026

AusAuto started its business two decades ago as a mail-order company, selling accessories and spare parts for various car models. The company used to distribute a catalogue to customers by mail, but it recently started using a web-based catalogue. Customers can order from this online catalogue via an inquiry form on the AusAuto website. AusAuto cooperates with suppliers in the same sector.

Due to the increase in orders since going online, AusAuto has developed an inventory system. It launched an automated online store and
integrated it with the inventory system, so that the warehouse is notified when a purchase is made. The online store uses a credit-card-
enabled payment system, instead of the previous cash-on-delivery system. The store also enables suppliers to sell products directly to
AusAuto with a commission on sales. The server hosting these applications also hosts software development platforms used by the IT team.

The company values its online store and its databases storing information about inventory, customers and suppliers. Employees access
applications from within the organisation but also remotely over the internet. Based on risk analysis, AusAuto found it critical to keep its online store, and to ensure the privacy of customer information for compliance with data protection laws.

This assessment is linked to the following course learning outcomes:

CLO 4 Evaluate cybersecurity asset management, risk management strategies and security program management used in business organisations.

CLO 5 Apply the usage of performance metrics, KPIs and reporting in cybersecurity governance.

Marking criteria

This assessment will measure your ability to:
- Discuss security strategic goals, initiatives, and business needs
- develop cybersecurity program management considering relevant cybersecurity initiatives and projects derived from strategic initiatives
- develop performance metrics
- develop reporting scheme
- structure and formatting

RMIT Classification: Trusted
Assessment Details
Case study overview
Consider that you have been hired by the company you considered in assessment 1 as a security
professional to help them move their business online and address the cybersecurity program
management challenges that come with such initiatives.
For this assessment, complete each of the following steps:
1. Read the case study you selected in assessment 1. Revise your strategic goals, initiatives
and business needs
2. Develop security program by converting security initiatives into projects and tasks using
frameworks such as NIST CSF or similar
3. Develop metrics to measure the effectiveness of the proposed projects or tasks
4. Proposed security reporting scheme based on metrics you developed earlier
Target Audience
Executive level staff at the organisation.
Recommended Length and Structure

• Executive summary/introduction
• Cybersecurity strategic goals, initiatives and business needs
• Cybersecurity program development
• Performance metrics and KPI
• Cybersecurity Reporting and Oversight
• Conclusion

Reference no: EM133499026

Questions Cloud

Creates a view that returns names from the product : creates a view that returns names from the product table name from the product category table name from the product sub category, table and quantity
Describe respite care and associated procedures : Describe respite care and associated procedures and regulations as related to the hospice setting.?
Can be proven to have caused a given case of lung cancer : One of the tobacco industry witnesses suggests that lung cancer is multi-factorial. Is this a reasonable possibility?
Why do you think that is and are other common sense ideals : Why do you think that is, and are there other 'common sense' ideals or understandings we hold up without need of guidance?
Evaluate cybersecurity asset management : Evaluate cybersecurity asset management, risk management strategies and security program management used in business organisations
How does interactive class differ from traditional classroom : How does an interactive class differ from a traditional classroom? Which kind of class do you personally feel is easier to facilitate and why?
How does the theory determine or influence each of their : How does the theory determine or influence each of their recommendations for action? What theory do you agree with? Why? How would that theory determine
How can culturally responsive strength-based therapy : How a counselor can provide culturally responsive strength-based therapy to an older adult, a person with a disability, a person from a different ethnic group.
Detect dns reconnaissance attempts : Detect DNS reconnaissance attempts, Canary employs non-existent subdomains. What DNS status code would you get if you query one of these domains

Reviews

Write a Review

Management Theories Questions & Answers

  Learning in action

Learning contract proposal that will form the basis of your learning contract report.

  Change is the only constant

"Change is the only constant " Evaluate the different types of change that have occurred in Sony.

  How do advertisers try to use group influence

How do advertisers try to use group influence?  Will you find any specific examples and explain the relevant theory of group behavior and influence?

  Case study:saving sony

You have been appointed by Sony as a consultant on change management. Advise Sony on how they could implement the change by using the various theories of change you have learnt.

  How the stock market works

The purpose of this project is to help you to gain an understanding of how the stock market works and of the relationship between theory and practice.

  Find the optimal production quantities

Find not only the optimal production quantities, but also the optimal total cost.

  Describe the management process

Describe the management process and identify the skills required to manage business organizations.

  Case study : bert''s bonsai and aquatic sport museum

Case Study : Bert's Bonsai and Aquatic Sport Museum Prepare a knowledge management system.

  Knowledge management techniques

Demonstrate understanding of the many-sided nature of knowledge management

  Theory of transtheoretical model

Demonstrate understanding of the many-sided nature of knowledge management

  Write a paper on historical trends of management

Write a paper on Historical Trends of Management.

  Theory of reasoned action

Theory of Planned Behavior and Integrated Behaviors Model

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd