Explain the principles of information security

Assignment Help Other Subject
Reference no: EM132355187 , Length: word count:1000

IT Systems Security Assignment - Security Training

Learning Outcomes -

  • Understand current IT security threats, information security and the legal requirements affecting the security of IT systems.
  • Examine the techniques used to protect an IT system from security threats.
  • Implement strategies to protect an IT system from security threats.

Assignment Brief and Guidance -

Case study - You work as a IT Security Specialist for a leading Security Consultancy. As part of your role, you need to train junior staff members on the tools and techniques associated with identifying and assessing IT security risks together with the organisational policies to protect business critical data and equipment.

IT Security professional revolves around protecting IT systems, this includes network, infrastructure and all other areas of IT. Securing information assets, customer data, financial information and other critical information is the key responsibility of an IT security professional.

Your Training should include -

1. Explain the different security threats that can affect the IT systems of organisations.

2. Explain the principles of information security when protecting the IT systems of organisations.

3. Explain why organisations must adhere to legal requirements when considering IT system security.

As a Trainer ask the trainees to Assess the impact that IT security threats can have on organisations' IT systems and business while taking account of the principles of information security and legal requirements. Evaluate the effectiveness of the techniques used to protect organisations from security threats while taking account of the principles of Information security and legal requirements.

Protection is one of the key part in any organisation from security threats, Explain how protection techniques can help defend an organisation from security threats.

Justify the choice of protection techniques used to defend an organisation's IT system from security threats.

Part of a training build up a activity to work on the following tasks:

1. Produce a plan to protect an IT system that meets organisational and legislative requirements.

2. Perform tasks to protect the IT system that meets the requirements given in the plan.

3. Review the extent to which the organisation's IT system has been protected.

4. Justify decisions made in producing the plan, showing how the IT system will be protected from security threats.

5. Enhance the protection of the IT system that meets the requirements given in the plan.

Evaluate the plan and the effectiveness of the protected IT system against requirements. Demonstrate individual responsibility and effective self-management in the planning and protection of an IT system.

Learning Outcome 1: Understand current IT security threats, information security and the legal requirements affecting the security of IT systems.

  • Threat types
  • Information security
  • Legal requirements
  • Impact of security breaches

Learning Outcome 2: Examine the techniques used to protect an IT system from security threats

  • Physical security
  • Policies and procedures
  • Software-based protection

Learning Outcome 3: Implement strategies to protect an IT system from security threats.

  • Group policies
  • Anti-matware protection
  • Firewall configuration
  • Wireless security
  • Access control
  • Testing and reviewing protection applied to an IT system
  • Skills, knowledge and behaviours.

Reference no: EM132355187

Questions Cloud

Why are companies so willing to forego the training needs : Why are companies so willing to forego the Training Needs Analysis step when it is so obvious that conducting a needs analysis is good business?
Define societal factors that contribute symptoms of anxiety : Anxiety and depression are two of the most commonly diagnosed mental health disorders. Describe societal factors that may contribute to symptoms of anxiety.
What are real estate property rights : What are real Estate Property Rights granted to the owner of land? including the types of Ownership Rights, Physical Property Rights, and Water Rights.
Can a monopoly be good for society : 1. Can a monopoly be good for society? Please explain and provide examples
Explain the principles of information security : IT Systems Security Assignment - Security Training. Explain the principles of information security when protecting the IT systems of organisations
Principles of value used during appraisals of real estate : What are the principle(s) represent and how they are used in determining a fair market value for real estate.
What will be the outcome of the assessment : What will be the outcome of the assessment? How will the information be used? How might this information impact the life of the character in your story?
What are the pros and cons of owning your own home : If you already own a home, have you seen these concepts realized in your own investment? If you do not yet own a home, are you interested in buying a home
What might be some pros and cons of having an agent : What is their responsibility to the buyer or seller they represent? What might be some pros and cons of having an agent represent you?

Reviews

len2355187

8/9/2019 10:12:39 PM

Need 1000 words. Can all the tasks be completed to a good standard. Please keep the similarity index low. Submission Format: The submission is in the form of an individual written report. This should be written in a concise, formal business style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as appropriate, and all work must be supported with research and referenced using the Harvard referencing system. Please also provide a bibliography using the Harvard referencing system. The recommended word limit is 1,000 +/- 10% words, although you will not be penalised for exceeding the total word limit.

len2355187

8/9/2019 10:12:32 PM

Grading – Distinction: Evaluate the effectiveness of the techniques used to protect organisations from security threats while taking account of the principles of information security and legal requirements. Evaluate the plan and the effectiveness of the protected IT system against requirements. Demonstrate individual responsibility and effective self-management in the planning and protection of an IT system.

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd