Potential vulnerabilities and risks the unitc system

Assignment Help Management Information Sys
Reference no: EM13985219 , Length: word count:3000

Learning Outcomes:

After completing the module you should be able to:

1. Critically evaluate concepts, principals and practice in the area of information systems security.

2. Demonstrate an in-depth understanding of a comprehensive risk management practice for ensuring secure information systems

3. Demonstrate the ability to consider relevant ethical and legal issues involved in the information systems security

4. Demonstrate the ability to perform information systems security audit based on industry specific standard and summarize the audit results

5. Critically evaluate and develop security policy and assess for the effectiveness and improvement of information systems security

6. Demonstrate the ability to document and explain in a professional manner their work

Your assignment should include a title page containing your personal details, the module name, the submission deadline and a word count; the appendices if relevant; and a full bibliography in Bournemouth University (BU) Harvard format. You should address all the elements of the assignment task listed below. Additional marks are awarded for the good use of theory and the supply of additional information from academic research and journalistic sources.

Word Limit: 3000 words (maximum)

Assignment Task

You have been placed in charge of Security for a new integrated IT system called UNITC (UN IT Cloud) system for handling United Nations communications between various regional offices across the world. The new strategy is to migrate to cloud to reduce operation and capital costs related to IT and communications by moving to a full paperless environment. The mandate has been published to all UN regional offices.

The regional offices have different level of activities in various divisions (departments) and agencies including human rights, financial affairs (banking), drug and criminal, culture, health, etc. as well as organizational charts for C-level management, human resource, finance, legal, IT, research departments, security, etc.

The new IT strategy requires a systematic paperless communication systems with different privileges upon the confidentiality and roles of users in the network.

The regional sites now should migrate to the paperless system with secure data stores for official documents, also emails and recordings related to the telephones calls.

The web presence is aiming to become more centralised with options to navigate to the regional sites. The cross domain communications are still required as most of the regional offices have autonomy to maintain and update their own presence in the Internet. However, they must follow the security guidelines and adapt a proper IT and security governance set by the UN IT department. The aim is to shift the responsibilities to regional offices to maintain their systems according to the IT Security Guidelines set as part of the UNITC system.

Question 1

Discuss the potential vulnerabilities and risks the UNITC system may be exposed to from the cloud and sub-systems. Rank the vulnerabilities in order of severity (from UN central office viewpoint) and justify the ranking with suitable academic argument and referencing.

Question 2

During the initial migration phase of tier-1 UN regional offices to UNITC, you discovered from the security logs that a virus was detected in the research reports related to UN Human Right division and dealt with automatically with no harm being done.

The UN Technology Director has mandated that all security flaws and virus attacks within the first year of operation must be reported with a statement as to how the system would be modified and governed to deal with a future attempt.

Consider the issues involved and determine whether or not you would report it. You need to explain the rational for each issue. Justify your decision with reference to standard practices. Reference the standard practices.

Question 3

The UN Technology Director has difficulty determining whether or not the system should go live without a paper system being used to shadow all functions during the first year of operation. They ask for a report from you on the issues from a security point of view. With suitable referencing and argument discuss your choice of approach.

Reference no: EM13985219

Questions Cloud

How far does ball fall before being brought momentary stop : A 350 g ball is attached to a vertical spring. The spring constant is 41 When released from rest, how far does the ball fall before being brought momentary stop by the spring?
Is there any downside to this for the homeowner : Residential mortgage terms (mortgage notes) have become increasingly uniform as the mortgage market has become more national and efficient. Is there any downside to this for the homeowner?
What is the shear modulus of jell-o : You push tangentially across the top surface of Jell-O with a force of 0.37 N. The top surface moves a distance of 10.5 mm relative to the bottom surface. The height of Jell-O is 2.5 cm, area is 3.5cm by 4.5 cm. What is the shear modulus of Jell-..
Calculate the unlevered net present value : Calculate the unlevered internal rate of return (IRR). Calculate the unlevered net present value (NPV).
Potential vulnerabilities and risks the unitc system : Discuss the potential vulnerabilities and risks the UNITC system may be exposed to from the cloud and sub-systems - explain the rational for each issue. Justify your decision with reference to standard practices. Reference the standard practices.
Find the height of its image : Suppose you are in a partially darkened room holding a flat piece of white cardboard in one hand and a converging lens of focal distance 6.6 x 10-2 m in your other hand. You want to form an image of the window in front of you, which is at a distan..
Calculate the fixed cost per unit : Selected financial data for Spark Enterprises follows for a production level of 120,000 units: Total fixed costs $300,000 Total costs (fixed and variable) $450,000
What are the magnitude and the direction of the current : A circular loop has radius R and carries current I2 in a clockwise direction (see figure). The center of the loop is a distance D above a long, straight wire. What are the magnitude and the direction of the current I1 in the wire if the magnetic f..
Write a letter of application to an advertised position : Application letter: Write a letter of application to an advertised position. It should highlight your background and experience to explain precisely how you fit your reader's needs. You have to convince the prospective employer to interview you. You ..

Reviews

Write a Review

Management Information Sys Questions & Answers

  It was already 72 degrees when astrid young pulled into the

it was already 72 degrees when astrid young pulled into the parking lot at the western oceanography institute woi. the

  Stopping a failed technologyhow would you know when to fail

stopping a failed technologyhow would you know when to fail fast in stopping a failed technology investment versus

  New ways of using internet for large companiesconsider a

new ways of using internet for large companiesconsider a large company with which you are somewhat familiar with

  Case study keeping the cloud computing mastermind

case study keeping the cloud computing mastermind happyguidelines for action and skill developmentchapter 5 contingency

  Step-by-step answer to supply chain managementat your

step-by-step answer to supply chain managementat your current company who do you source your raw materials from? what

  Supply chain management powerpointafter the initial report

supply chain management powerpointafter the initial report the owners of stone horse supply company john and michael

  Description of integrated marketing

description of integrated marketing communicationsintegrated marketing communications are the practice of developing a

  Determine the first two lines of new file created by code

Determine the first two lines of the new file created by the code below. This exercise refers to the file Justices.txt that contains data about the Supreme Court justices, past and present

  Most threatening security issues firms

What will be the most threatening security issues firms have to deal with within the next five years? Offer an example to support your response.

  Auditing infromation systems process powerpoint

Auditing Infromation Systems Process powerpoint based off of paper you already wrote me:it is attached to this assignment may as well use some of the references you already did plus some new ones

  Describe the cameron balloons simulation

This solution involves using a project simulator. The simulation covers the operations of the Cameron balloon factory. The solution explains cost analysis and the student will learn how to analyze costs and spreadsheets in managing the factory.

  Organizational policy to address the itrelated ethical issue

Write an organizational policy to address the IT-related ethical workforce privacy issue that you described in Matrix B1, where you mapped key organizational issues and identified how these ethical issues were affected by laws, regulations, and po..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd