Reference no: EM131245844 , Length: word count:3500
Assignment - Research Paper
Objectives:
- Demonstrate reflective practice and apply learning to different contexts by critically analyzing protection mechanisms for information systems to build sound knowledge.
- Demonstrate an understanding of the impact of interpersonal communication on specific management processes and outcomes using relevant theories and concepts by understanding the relationships between security and personnel, between security and law, between security and ethics.
- Demonstrate an understanding of the impact of interpersonal communication on specific management processes and outcomes using relevant theories and concepts by properly applying security principles into information security project management.
Background
In this assignment, you need to address the following specific items:
- Controlling risk
- Protection mechanisms
- Personnel and security
- Law and ethics
You need to provide the selected organisation with the necessary guidelines for implementation of a security plan based on four main components outlined above.
Your solution to the selected organization will incorporate specific aspects from all the chapters as you are building your argument for this requirement.
You are also required to review the PRT Network Monitor that you can find on this web site https://www.paessler.com/prtg. This web site provides you with the executable which you need to download. It also provides you with a lot of information on how to use it.
You are requested to try out installing and use of this software to monitor your home network. While the web site has documentation available (videos, help, explanations, etc.). After monitoring your home network you need to provide a report about any issues or limitations with your home network.
As mentioned in the previous assignments, you need to make sure NOT to divulge any sensitive information of the selected organisation. If you are working in this organisation, use the internet to determine what information is available to the public.
Your research paper should include the following sections:
-Title
-Name and student number
-Abstract
-Introduction
In your research paper the introduction should include the following:
- Overview about strategic information security
- What the research paper is about?
- The structure of the rest of the paper
- Body context
You could divide this section into several sub-sections such as
- Controlling risk
- Protection mechanisms
- Personnel and security
- Law and ethics
- PRT Network Monitor report
- Conclusion
-References.
Describe the status of the brain at the selected phase
: The brain goes through many changes as we age. Select and examine a developmental phase (infancy, childhood, adolescence, adulthood and old age) and describe the status of the brain at the selected phase.
|
What is the stock price and what is the price earnings ratio
: What is the stock price and what is the price-earnings (P/E) ratio? - What is the new stock price if the firm could continue to invest exactly $1 per year forever?
|
Write all possible node and edge facts
: COMP348: PRINCIPLES OF PROGRAMMING LANGUAGES - write all possible node and edge facts that describes the structure of this graph - Implement your facts & rules as a Prolog program and test all quires in part B.
|
Does someone seem to own or dominate the space
: What artifacts in the characters' lives might be part of the physical environment? In what ways is the environment personalized? Is one character's point of view more important than another's in determining the details of the physical environment?..
|
Implementation of a security plan based on given components
: You need to provide the selected organisation with the necessary guidelines for implementation of a security plan based on four main components outlined above
|
How individuals of various ages use probability
: To prepare: Think about examples of how individuals of various ages use probability to make decisions, and decide which age group you will write about in your discussion response.
|
Explain the use of equity versus debt
: explain the use of equity versus debt in corporate financial structure, even though interest but not dividends are tax deductible. - Can bankruptcy costs also explain hedging practices that on average reduce expected earnings?
|
How significant is the truth we learn from that statement
: What beliefs and actions does the film "Pride" attempt to change? Explain. Is the moral or social statement made in "Pride" a universal statement or is it restricted to our own time and place? Explain. How relevant is the theme of "Pride" to our own ..
|
What can you do to develop your weaknesses
: Select three of the Enhanced Skills areas for which to complete the assessment. What can you do to exploit your strength and what can you do to develop your weaknesses?
|