Managing the information security risks of the organisation

Assignment Help Computer Network Security
Reference no: EM131650042 , Length: word count:3000

Information Security Management Written Assessment

Objectives - This assessment task can be undertaken in a group of up to 4 members or individually. Each student/group will analyse the given scenario given on page 2, and write a report. The report should discuss the guidelines for managing the information security risks of the organisation.

Assessment Task

Each student/group is required to analyse the scenario given on page 2 and produce a report that discusses the guidelines for managing the information security risks of the organisation. Your report should have the Executive Summary, Table of Contents, Introduction, Discussion (the guidelines), Assumptions and References sections.

The Scenario for Information Security Management Assessment Tasks

Academics for Academics (A4A) is a Non-Governmental Organisation (NGO) that has its head office and the branch office in Sydney and Singapore respectively. Being a NGO, A4A funds all of its projects and activities from public donations. A4A has a team of 10 staff members, and 6 of them are located in Sydney office and the remaining four are located in the Singapore office.

A4A was established to help small public and private universities and colleges in Australia and Southeast Asia. The private universities and colleges that are interested in receiving the service of A4A need to register with A4A and become its member institutions. The academics and experienced professionals who like to provide a voluntary service such as teaching a subject, supervising a research project or development of curricula for a member institution, can register their interests with A4A. After a recruiting process, they can become members of A4A.  A4A then recruit them to short term assignments at its member institutions. The members that are recruited to various projects will be provided with accommodation, meals, medical and travel expenses.

Once recruited to a project, the A4A member will work at the member institution but the information produced by the member, except the emails, marked assignments and exams will remain the property of A4A and the member. As such, all those information should be handled and stored by the information system of A4A irrespective of the location where the member works. A4A needs the guarantee that the various data and information in their information system are secured.

As A4A was established last year, the information security policies have not yet been developed. It is now in the process of developing a comprehensive set of information security policies for its information system.

Note: This scenario was created by Dr Rohan de Silva on 3rd June 2017 and no part of this scenario should be reproduced by any individual or an organisation without written permission from CQUniversity, Australia.

Reference no: EM131650042

Questions Cloud

Determine the limiting factor for peal limited : Determine the limiting factor for Peal Limited - Calculate the sales mix and the production plan which will maximize the firms profit
How are the different models of culture similar : How are the different models of culture similar? What unique contributions does each model make?
Discuss impact law-enforcement officers and attorneys : How does consistency in legal decisions positively and negatively impact law-enforcement officers and attorneys
Create and interpret a given confidence interval : Safety. Observers in Texas watched children at play in eight communities. Of the 814 children seen biking, roller skating, or skateboarding, only 14%.
Managing the information security risks of the organisation : COIT20263 Information Security Management Written Assessment. Produce a report that discusses the guidelines for managing the information security risks
What are the four models of culture : What are the four models of culture, and how do they affect leadership?
What empirical evidence supports the theoretical approach : What empirical evidence supports the theoretical approach of the agency in which you are doing your practicum?
Managing the quality of a project : Describe organizational standards, such as "Six Sigma" and the role these standards play in managing the quality of a project.
Define what are examples of this type of crime : What is computer crime. What are examples of this type of crime. Provide a short description of one of the early cases of computer crime

Reviews

len1650042

9/20/2017 1:27:29 AM

Australian student, total 3000 words, And I need academic resources not general... Please check the criteria and make sure you all follow it.... Submission - Your report should be submitted online through the COIT20263 Moodle unit website assessment block on or before the due date. Covered all the sections of the report. Used decimal notation. Included all headings and page numbers. Used ToC auto-generation. Set the scene for the report and described the purpose clearly.

len1650042

9/20/2017 1:27:22 AM

Covered all the sections of the report. Used decimal notation. Included all headings and page numbers. Used ToC auto-generation. Set the scene for the report and described the purpose clearly. Correct list of assumptions. All references are listed according to Harvard reference style.

len1650042

9/20/2017 1:27:15 AM

Note: Each student in the group needs to upload the report of their group to Moodle. You must follow the Harvard citation and referencing guidelines. Check the unit website at least once a week for further information relating to this assessment task. Please ensure that you write your answers in your own words to avoid possible plagiarism and copyright violation. You can understand the Plagiarism Procedures by following the corresponding link in the CQUniversity Policies section of the Unit Profile. Late assessments will be penalised as per the university policies and guidelines.

Write a Review

Computer Network Security Questions & Answers

  Explain access control methods and attacks

Explain access control methods and attacks

  What do you believe are the motives of a cybercriminal

What are the main investigative tools that all cybercrime investigators should have? What are some of the specialty tools that investigators would require for specific type of investigation such as network intrusion or mobile investigation?

  Ealuate the significance of the internet describe how the

1. analyze the evolution of internet to do this show how it has changed over time.2. evaluate the significance of the

  Compute value of shared secret key

You have secretly picked value SA = 17. You begin session by sending Bob your computed value of TA. Bob responds by sending you value TB = 291. What is the value of your shared secret key?

  Assignment hi i am need your help in my assignment can you

hi i am need your help in my assignment. can you please help me. the date has already been passed i.e. 249 2014. so i

  How to protect a computer and business against their threat

Security goes hand-in-hand with developing effective Excel applications. As an Excel user, it is necessary to learn more about macro viruses and how to protect a computer and business against their threat

  Email viruses are typically launched by people

Email viruses are typically launched by people who modify header information to hide their identity. Brightmail's Enrique Salem says that in the future

  How to conduct vulnerability assessment

How to model and determine threats and how to conduct vulnerability assessment - leading industry practices and include at a minimum complete strategies of modeling threats and assessing vulnerabilities

  What is the guaranteed quality of coursework

What is the guaranteed quality of this coursework? how many days it take for 10-12 pages? how much will be?

  Web application security challenges

You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for.

  Define principles of risk management that apply to industry

Define the principles of risk management that apply to the retail industry. Define steps for a retail loss-prevention program. Explain the security systems you incorporated in your loss prevention analysis.

  Provide a windows security implementation model for compay

You are a Security professional hired by NextGard Technologies in Phoenix, AZ to provide a Windows security implementation model for their organization.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd