Information security system in australia

Assignment Help Computer Network Security
Reference no: EM131029253

Assessment Task

You are required to analyse the scenario given on page 3 and discuss the following issues in the specified weeks in relation to the Course Learning Outcomes 4 and 7.

a) The steps that the company should take for the certification and accreditation of its information security system in Australia.

b) Would the company need the certification and accreditation of its information security system in the countries of satellite campuses as well?

c) Which professional organisations would likely to be involved in this process of certification and accreditation?

You also need to individually prepare and upload a very brief video (5 min) to Moodle in week 6. The video should clearly express the group consensus and your own views.

The Scenario for Information Security Management

Assessment Tasks

A private company in Australia plans to establish a private nursing school. The main campus of the nursing school is located in a suburb of Sydney and the satellite campuses are located in the suburbs of capital cities of three South East Asian countries. The company has made agreements with a private hospital in each of these locations to provide the internship and training to the students of the nursing school. The main and satellite campuses that are currently being constructed will have modern communication networkssuitable for the business.

The lectures, tutorials and laboratory classes conducted in the main campus will form virtual classrooms with the satellite campuses. The students can participate in the virtual classes from within the campus premises or from their homes. More than 100 students are expected to enrol in each location in the first year.

The managementof the company plans to help out the wider community by providing a telemedicine and homecare service to the needy patients at their homes.This service coversa radius of about 200km from the main and satellite campuses and will be provided with the help of a mobile team of health personnel.

The mobile team will be able toreceive medical advice directly from the medical staff of the hospital in their country as well as the private hospital in Sydney via a virtual consultation room. The hospitals should be able to locate and contact all registered homecare patients. The nursing school should know the location of all their students and staff when they are on duty.

As the company is newly established, the information security policies are yet to be developed.

Reference no: EM131029253

Questions Cloud

Suggest an appropriate dependent variable : a. Suggest an appropriate dependent variable. b. Write a model for this experimental situation and identify all terms. c. Fill out the sources and degrees of freedom for an AOV table.
Offshore financial centers facilitate money laundering : Governments dislike the fact that offshore financial centers facilitate money laundering. Do you think that electronic commerce makes it easier or harder to launder money and camouflage other illegal activities? Do you think offshore financial center..
How small would the sample percentage need to be : A manufacturer claimed that at least 20% of the public preferred her product. A sample of 100 persons is taken to check her claim. With α = .05, how small would the sample percentage need to be before the claim could legitimately be refuted? (Noti..
Variability in an analysis of variance table : a. Write an appropriate model (including an effect for weeks) and the sources of variability in an analysis of variance table. b. How would your model change if we analyze the total 2-week sales data? c. Run an analysis of variance on the 2-week sale..
Information security system in australia : Would the company need the certification and accreditation of its information security system in the countries of satellite campuses as well?
Required using the low-level coded product structure tree : Product A consists of three units of Subassembly B, three units of C, and one unit of D. B is composed of two units of E and three units of F. C is made of three units of H and four units of D. H is made of five units of E and two units of G. d. To p..
Components as taking the you attitude emphasizing positive : Components as taking the "you" attitude, emphasizing the positive, establishing credibility, being polite, using bias-free language, using visual aids, and projecting a good company image. How can I exhibit these qualities in a formal proposal?
Describe role of packaging labeling in marketing of product : Explain the purposes of each step of the new-product process. Identify ways that marketing executives manage a product's life cycle. Describe the role of packaging, labeling, and warranties in the marketing of a product
Write the equation in the slope-intercept form : Carla invested $23,000, part at 16% and part at 15%. If the total interest at the end of the year is $3,500, how much did she invest at 16%?

Reviews

Write a Review

Computer Network Security Questions & Answers

  What was the digital crime and who was the subject or what

select a real world event related to digital forensics. this could be a crime a well documented breach or intrusion or

  What is the value of shared secret key

You have secretly picked the value SA = 17. You begin the session by sending Bob your calculated value of TA. Bob responds by sending you the value TB = 291. What is the value of your shared secret key?

  Critique the transition process performed by the dms

Critique the transition process performed by the DMS in the case study. Then, recommend two (2) alternatives to the IP infrastructure or applications not already mentioned in the case study.

  Facilitate donations to non-profit organizations

You have been asked to design a database system for DonationDollars, a company that wants to facilitate donations to non-profit organizations via an online service.

  Examine the contents of the security and privacy tabs

Using a Microsoft Windows XP, Vista, or 7, open Internet Explorer. Click Internet Options on the Tools menu. Examine the contents of the Security and Privacy tabs. How can these tabs be configured to provide: (a) content filtering and (b) protecti..

  Companys needs for these types of security

Details on physical security, you have to make sure you include the basics. Make sure you detail what will deter hackers from breaking in. Be sure to include your references -

  Explain your method of attack and operation of the law

Explain your method of attack and operation within reasonable parameters of the law. Discuss specific malware, social engineer, or any other type of attacks you would deploy to achieve your desired goals.

  Network infrastructure and security

Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

  Describe scenarios where there is an it troubleshooting?

Approaches this communication from the perspective of specific technologies the IT technicians can implement to tighten IT security.

  How to collect data for traffic analysis

Suppose a terrorist is known to use Skype for encrypted email from internet cafes, using a known email ID in small city. How could you collect data for traffic analysis (i. e, what kind of technology or access could you use)?

  Process of generating an rsa key pair

List the smallest 10 numbers that are greater than 1000 and are candidates for being selected as the public key - can the number 1995 be selected as the public key? Justify your answer.

  Information systems security policy

From the e-Activity, discuss how the National Security Telecommunications and Information Systems Security Policy (NSTISSP) national policies facilitate the confidentiality, integrity, authentication, and non-repudiation of computing security

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd