Managing the information security risks of the organisation

Assignment Help Computer Network Security
Reference no: EM131650042 , Length: word count:3000

Information Security Management Written Assessment

Objectives - This assessment task can be undertaken in a group of up to 4 members or individually. Each student/group will analyse the given scenario given on page 2, and write a report. The report should discuss the guidelines for managing the information security risks of the organisation.

Assessment Task

Each student/group is required to analyse the scenario given on page 2 and produce a report that discusses the guidelines for managing the information security risks of the organisation. Your report should have the Executive Summary, Table of Contents, Introduction, Discussion (the guidelines), Assumptions and References sections.

The Scenario for Information Security Management Assessment Tasks

Academics for Academics (A4A) is a Non-Governmental Organisation (NGO) that has its head office and the branch office in Sydney and Singapore respectively. Being a NGO, A4A funds all of its projects and activities from public donations. A4A has a team of 10 staff members, and 6 of them are located in Sydney office and the remaining four are located in the Singapore office.

A4A was established to help small public and private universities and colleges in Australia and Southeast Asia. The private universities and colleges that are interested in receiving the service of A4A need to register with A4A and become its member institutions. The academics and experienced professionals who like to provide a voluntary service such as teaching a subject, supervising a research project or development of curricula for a member institution, can register their interests with A4A. After a recruiting process, they can become members of A4A.  A4A then recruit them to short term assignments at its member institutions. The members that are recruited to various projects will be provided with accommodation, meals, medical and travel expenses.

Once recruited to a project, the A4A member will work at the member institution but the information produced by the member, except the emails, marked assignments and exams will remain the property of A4A and the member. As such, all those information should be handled and stored by the information system of A4A irrespective of the location where the member works. A4A needs the guarantee that the various data and information in their information system are secured.

As A4A was established last year, the information security policies have not yet been developed. It is now in the process of developing a comprehensive set of information security policies for its information system.

Note: This scenario was created by Dr Rohan de Silva on 3rd June 2017 and no part of this scenario should be reproduced by any individual or an organisation without written permission from CQUniversity, Australia.

Reference no: EM131650042

Questions Cloud

Determine the limiting factor for peal limited : Determine the limiting factor for Peal Limited - Calculate the sales mix and the production plan which will maximize the firms profit
How are the different models of culture similar : How are the different models of culture similar? What unique contributions does each model make?
Discuss impact law-enforcement officers and attorneys : How does consistency in legal decisions positively and negatively impact law-enforcement officers and attorneys
Create and interpret a given confidence interval : Safety. Observers in Texas watched children at play in eight communities. Of the 814 children seen biking, roller skating, or skateboarding, only 14%.
Managing the information security risks of the organisation : COIT20263 Information Security Management Written Assessment. Produce a report that discusses the guidelines for managing the information security risks
What are the four models of culture : What are the four models of culture, and how do they affect leadership?
What empirical evidence supports the theoretical approach : What empirical evidence supports the theoretical approach of the agency in which you are doing your practicum?
Managing the quality of a project : Describe organizational standards, such as "Six Sigma" and the role these standards play in managing the quality of a project.
Define what are examples of this type of crime : What is computer crime. What are examples of this type of crime. Provide a short description of one of the early cases of computer crime

Reviews

len1650042

9/20/2017 1:27:29 AM

Australian student, total 3000 words, And I need academic resources not general... Please check the criteria and make sure you all follow it.... Submission - Your report should be submitted online through the COIT20263 Moodle unit website assessment block on or before the due date. Covered all the sections of the report. Used decimal notation. Included all headings and page numbers. Used ToC auto-generation. Set the scene for the report and described the purpose clearly.

len1650042

9/20/2017 1:27:22 AM

Covered all the sections of the report. Used decimal notation. Included all headings and page numbers. Used ToC auto-generation. Set the scene for the report and described the purpose clearly. Correct list of assumptions. All references are listed according to Harvard reference style.

len1650042

9/20/2017 1:27:15 AM

Note: Each student in the group needs to upload the report of their group to Moodle. You must follow the Harvard citation and referencing guidelines. Check the unit website at least once a week for further information relating to this assessment task. Please ensure that you write your answers in your own words to avoid possible plagiarism and copyright violation. You can understand the Plagiarism Procedures by following the corresponding link in the CQUniversity Policies section of the Unit Profile. Late assessments will be penalised as per the university policies and guidelines.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd