Explain, what main functions under an infosec program

Assignment Help Computer Networking
Reference no: EM132550197 , Length: 2 pages

Question Q1:
a) Explain, what main functions under an InfoSec program would you recommend a smaller organisation with three full time staff and two or three part-time roles from other parts of the business.? Specify for InfoSec department and other departments. Specify the functions that would be performed by the different departments and indicate if any functions could be outsourced. Justify your allocation of functions.

b) The New Zealand Privacy Act 1993 focuses on the storage and security of personal information. It requires agencies to ensure that the personal information is protected by reasonable security safeguards. Discuss how the New Zealand COVID tracing app adheres to all the relevant principles of the New Zealand Privacy Act and ensures that there will be no personal data compromise? information in consideration of each of the specific principles of New Zealand Privacy Act?.

Question Q2:
a) Consider a data classification scheme that contains the categories "confidential", "sensitive", and "unclassified" . Define these categories first, and then apply them to categorise five information assets contained in your personal computer. Explain the reason for the classification of each of the assets.

b) Consider a home office that comprises a laptop running the latest Windows OS, a monitor, a wireless keyboard and a wireless mouse ( one dongle), a backup device (external hard disk), an external DVD drive, and a fibre optic based Internet connection managed by an ISP that connects the home office Wi-Fi to the Internet. Perform a TVA (threat -vulnerability-asset) assessment of the home office IT infrastructure based on your general knowledge about the hardware described. Include all assets and identify at least three threats (see Table 6-8 on page 341).

Question Q3:
a) What risk treatment strategies would you recommend to banking industry as part of their information security program? Explain these in the context of the various business processes and resources.

b) Consider the case of ABC Software Company which is facing a number of major information security threats (as listed in the table below). The information security team has estimated the cost per incident which the company will bear if the threat is materialised. Calculate the Single Loss Expectancy (SLE), Annualized Rate of Occurrence (ARO), and Annualized Loss Expectancy (ALE) for each threat.

ABC Software Cost per             Frequency of             SLE ARO ALE

Company major incident         Occurrence

threats

Programmer      $4,500.00     2 per week

mistakes

Flood            $250,000.00     1 per 10 years

Virus, Worms, $1,500.00        1 per week

Trojan

Denial-of-                   $6,500.00     1 per quarter

service attacks

Theft of            $6,000.00     1 per 6 months

information

Question Q4:
a) Consider a tertiary education organization (e.g., a university). Consider applying mandatory access controls vs non-discretionary access controls with respect to student records. (Assume that student records include these four categories: (i) personal details,( H) external documents supplied by the student, (Hi) records about study progress, e.g., enrolment and grades , and (iv) internal documents generated administratively such as letters sent to the student). Which approach would you recommend, mandatory access controls or nondiscretionary access controls? Justify your recommendation, referring specifically to the four categories above.

b) Why is it a good security practice to collect and report near-miss event in which major incidents were only narrowly averted (such as spam messages that were not filtered out ) need to be collected and reported? Explain your answer providing five examples of hypothetical near-miss events. and what weaknesses they may indicate.

Reference no: EM132550197

Questions Cloud

What amount of loss should dike report as extraordinary : Ignoring income taxes, what amount of loss should Dike report as extraordinary on its annual income statement
Demonstrate how to use the cpi : Demonstrate how to use the CPI (CPI given) to compare dollar figures from different times (for example compare the cost of a cup of coffee in 2004 to 2020).
Make the adjusting general journal entry for the six-months : Use this information to make the adjusting General Journal entry (without explanation) for the six-months ended December 31, 2019
Describe the different methods of sewage treatment : Describe the different methods of sewage treatment? How doe they lower the costs of environmental damages, and the cost of clean available drinking water?
Explain, what main functions under an infosec program : Why is it a good security practice to collect and report near-miss event in which major incidents were only narrowly averted
Draw a graph that shows the inflation rate : Draw a graph that shows the inflation rate, the unemployment rate, and different short run Phillips curve based on different inflation expectations
What are the types of food systems : Describe the various "innovations" illustrated in the agricultural projects highlighted, the types of food systems are included, and explain
Combination of capital and labor : Economy X would like to use a certain combination of capital and labor with the demand variables to determine the quantity output.
Explain why recycling programs started : Explain how much of recyclable plastics are being recycled, and where. How has this effort changed over the past several decades?

Reviews

len2550197

6/19/2020 10:29:20 PM

I just want you to answer this questions within 5 hours I’ve to submit it after 5 hours and the book we are using is (Management of information security)

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd