Managing the information security risks of the organisation

Assignment Help Business Management
Reference no: EM131231162 , Length: word count:3000

Information Security Management Assignment-

Objectives

This assessment task can be undertaken in a group of up to 4 members or individually. Each student/group will analyse the given scenario of an organisation, and write a report. The report should discuss the guidelines for managing the information security risks of the organisation.

Assessment Task

You are required to analyse the scenario given on page 2 and produce a report that discusses the guidelines for managing the information security risks of the organisation. Your report should have the Executive Summary, Table of Contents, Introduction, Discussion (the guidelines), Assumptions and References sections.

Check the course website at least once a week for further information relating to this assessment task. Please ensure that you write your answers in your own words to avoid possible plagiarism and copyright violation. You can understand the Plagiarism Procedures by following the corresponding link in the CQ University Policies section of the Course Profile. Late assessments will be penalised as per the university policies and guidelines.

The Scenario for Information Security Management Assessment Tasks

Farmers for Farmers (3F) is a cooperative society of crop farmers in Queensland founded one year ago. Established to increase the yield of its member farmers and reduce the wastage due to rotting of crops, the society sells the crops to the customers at a lower price than that of the few giant supermarket chains in the state. 3F competes with these supermarket chains by directly supplying the produce from the farmers to the consumers without an intermediary. To this end, 3F has its own trucks, five distribution centres in the state and six distribution vehicles at each distribution centre.

3F operates from a small office in Rockhampton and the customers can place their orders using the web interface of 3F or over the phone. The orders are processed using a proprietary software algorithm of 3F. By using this software, 3F not only collect the optimum quantities of crops from the farmers and deliver them on time to the distribution centres, but also deliver the order to the customers in a minimum time. This whole process is automated with the help of on-board computers on the trucks as well as on the distribution vehicles connected to the office of 3F and the farmers.

This software algorithm is also used by the farmers to order and add fertilizer to their farmlands, to water the plants, spray pesticides and collect the yield in an optimum fashion while saving energy costs, resources and money. For this purpose, the algorithm collects real-time information from the farms, such as air and soil temperature, humidity, soil moisture content, information about pests, rain fall figures and the intensity of sunlight, without human intervention. The farmers also connect to the Internet via the network of 3F and post questions to the online forums. 3F also includes an online banking society that provides most of the banking facilities of other banks to its member farmers. 3F needs the guarantee that their proprietary algorithm, and various data and information in their information system are secured.

After the success in Queensland, 3F expanded its services this year to the New South Wales farmers and customers as well.

As the society was established last year, the information security policies have not yet been developed. The society is now in the process of developing a comprehensive set of information security policies for its information system.

3000 words

6 Harvard references.

Reference no: EM131231162

Questions Cloud

State your opinion about whether or not airport security : Conduct research on the Internet and back up your discussion with some of the latest government, newspaper, or magazine articles about airport security. You might also locate and use statistics on hiring, training, or turnover of TSA security scr..
Determine the sidelighting workplace illuminances : Determine the sidelighting workplace illuminances for a 20 ft long, 15 ft wide (deep), 8 ft high light-colored room with a 15 ft long by 5 ft high window. Assume that the direct sun plus clear sky illuminance is 3000 fc and the ground-reflected il..
Determine the clear sky day and the cloudy day work-plane : A 20 ft long by 7 ft high window with ¼-in clear glass faces 10°E of south, the building is at 32°N latitude, and it is January 15 at 2 p.m. solar. The ground outside is covered by dead grass.
Determine the clear day and cloudy day illuminances : Determine the clear day and cloudy day illuminances on a horizontal skylight at noon on June 21 and December 21
Managing the information security risks of the organisation : COIT20263 Information Security Management Assignment. You are required to analyse the scenario given on page 2 and produce a report that discusses the guidelines for managing the information security risks of the organisation
Define how justification and excuse play a role in the case : Explain the nature and types of defenses used in the cases and what evidence was used to demonstrate the defense. Describe how justification and excuse play a role in the cases.
The new york times article conspicuous by their presence : Read the New York Times article "Conspicuous by Their Presence." - Explore how she breaks the textbook rules of journalism.
Calculate the net transmittance of the skylight : A 3 ft × 5 ft double-domed skylight has outer and inner fat-plate plastic transmittances of 0.8 and 0.7, respectively; a 2 ft deep well with 80% reflectance walls; and a 90% net skylight area. Calculate the net transmittance of the skylight.
Describe the biological evidence obtained at the crime scene : Describe the biological evidence obtained at the crime scene. Identify the preservation and collection of the various types of biological evidence.

Reviews

len1231162

10/5/2016 1:43:23 AM

Creating security policies by assessing risk assessment and after finding vulnerabilities on giving scenario can use is guideline to create policies. Students are assessed against their ability to analyse the given scenario and discuss the guidelines for managing the information security risks of the organisation. The marking criteria for Assessment Item 2 are provided on page 3.Students need to familiarise themselves with the marking criteria to ensure that they have addressed them when preparing this assessment item.

Write a Review

Business Management Questions & Answers

  Oranges between the usa and japan

The USA and Japan were in negotiations for a period of ten years, (1977 - 1988) over oranges. The Americans had certain goals that they wanted to accomplish in these negotiations.

  Demand of goods and supply in the economy

List down some of the factors that affect the demand of goods and supply in the economy.

  Persuasive requests and sales messagesexamine persuasive

persuasive requests and sales messagesexamine persuasive requests and sales messages. what traits do persuasive

  Leadership to the politics of the organization

Show the relationship of leadership to the politics of the organization. Please be sure to address the following issues, along with presenting any other ideas about this concept that you find interesting

  Optimal order quantity per order

The store policy is never to have stockouts of the laptops. The store is open for business every day of the year except Christmas Day. Determine the following.

  The primary care clinic

The Primary Care Clinic

  Monopoly firm will profit-maximize by setting

If demand is P = A - bQ, then MR = A - 2bQ. MC = dTC/dQ = c. The monopoly firm will profit-maximize by setting A - 2bQ = c, so the equilibrium quantity traded will be Q* = (A-c)/2b.

  Organizational research and theoryresearch paper must be at

organizational research and theory.research paper must be at least 10 pages in length not including the cover page and

  Compute the upper and lower control limits

A medical facility does MRI's for sports injuries. Occasionally a test yields inconclusive results and must be repeated. Using the following sample data and n = 200, estimate the upper and lower control limits for fraction of retests using two sigma ..

  Management in leadership

Management in Leadership - Whom would you select if yours is a Manufacturing department or Accounts department

  Project management course

Please describe each of these methods: The Simple Payback Method and Discounted Cash Flow as they are described in the associated case studies. Please use any charts or graphs that you think may be helpful in answering these questions.

  Discuss why a disaster recovery plan is necessary

Discuss why a disaster recovery plan is necessary even for brick and mortar businesses

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd