The learning objectives of the security plan assignment are

Assignment Help Computer Networking
Reference no: EM13375760

The learning objectives of the Security Plan Assignment are for you to recognise the threats to information assets that exist in your current or future work place. The complacent and lackadaisical approach many organisations have towards the security of their information holdings is common. You have, through your research essay and ongoing inquiry, the opportunity to identify the threats, outline security guidelines and develop a robust and pragmatic training programme. You should develop a plan that you would regard as helpful to you, the information user, as well as protecting your organisation's information environment.

You are required to complete and submit a security plan based on the following scenario:

a) You are the recently appointed head of a security team responsible for protecting the information holdings of a business organisation of some 60 staff. The organisation is housed in a detached, multi-storeyed building located in the central business district of an Australian city.

b) The security team is responsible for overseeing the security of information from deliberate and accidental threats. A recent audit of the information security management system found it to be deficient in some key areas, notably incident response, disaster recovery and business continuity, social engineering exploitation of personnel, an apparent lack of personnel awareness of the various threats to information, and poor password security. These issues were identified as needing urgent remedy.

c) Technical systems were found to be reasonably effective in maintaining database and document management security, and were well serviced by the IT team.

Management has directed you to undertake some security analysis and planning to improve the organisation's security of information. You are tasked to:

a) Identify and describe the organisation's physical, human, and electronic information holdings that may be at risk.

b) Identify and describe the actual and potential physical, human, and electronic threats to the organisation's information holdings.

c) Design a security plan that describes counter-measures that will manage the threats that put the organisation's information holdings at risk and disaster recovery processes.

d) Develop a comprehensive information security education and awareness programme for use by management, staff members and contractors).

5. Use the marking sheet as a possible template to prepare your security plan.

6. The assignment must include the following to enhance your grade:

a) Include a title page containing the topic, number of words, unit name, student name, student number and trimester/semester year or study period, complete, and attach a coversheet as part of the same assignment document.

b) Identify and describe what is at risk and the potential threats that may exploit the vulnerability of the organisation's physical, human and electronic information assets - you should read the topic notes AND from the recommended readings and URLs provided in the Unit Learning Guide AND from your OWN research in order to define these threats.

c) Design a security plan that describes counter-measures that will manage the threats that put the organisation's information assets at risk. The security plan should cover a full range of protection measures - please refer to your topic notes for leads and the marking guide and then undertake your own research.

d) Detail the steps you consider necessary to enhance information security through a security education, training awareness (SEATA) programme and include a description of the specific objectives you hope to achieve and the measures you would use to test the efficacy of your plan, i.e., to monitor and sample staff awareness of the SEATA programme.

The quality and breadth of references used will be taken into account and credit will be given for evidence of wide reading on the topic and use of material from a variety of sources (i.e., books, journals, websites, newspapers, etc).

You will also be assessed on the presentation of your Security Plan, as well as the contents. Marks will not be awarded where correct referencing is not used. Marks will not be awarded where the above instructions are not followed.

If you are presently working for an organisation, please do NOT include any information or reference to its security plans or policies in your assignment, if this contravenes or potentially jeopardises the organisation's interests.

Reference no: EM13375760

Questions Cloud

The warehouse company supplies spare parts for its two : the warehouse company supplies spare parts for its two plants plant a and plant b. plant a and plant b do not have any
Question 1 a what are minerals sketch different types of : question 1 a what are minerals? sketch different types of mineral crystal forms and list different types of rock
You must prepare a formal 10-12 page research paper on a : you must prepare a formal 10-12 page research paper on a topic of your choice related to a major air cargo operator or
Computing tax liabilityhardwaresoftware setup required : computing tax liabilityhardwaresoftware setup required financial calculatorproblem description jonathan a single male
The learning objectives of the security plan assignment are : the learning objectives of the security plan assignment are for you to recognise the threats to information assets that
I want design circuit this bufferlifo this blocking is for : i want design circuit this bufferlifo. this blocking is for fifo memory but i want design circuit buffer last-in
Evaluate the swot analysis on the tourism development in : evaluate the swot analysis on the tourism development in nigeria. produce a comprehensive report detailing the
Question 1in lectures we covered how to develop : question 1in lectures we covered how to develop spreadsheets to value american and european call and put options using
Results of a statistical survey and analyze processed : results of a statistical survey and analyze processed datadirections this is your end-of course assignment to assess

Reviews

Write a Review

Computer Networking Questions & Answers

  Determine about the crash if rip is used

The node in Denver crashes completely. How do the other nodes in the country find out about the crash if RIP is used? If OSPF is used?

  Install backbone to connect four base-t ethernet lans

You have been hired by a small company to install backbone to connect four 100base-T Ethernet LANs (each using one 24-port hub) and to give a connection to Internet. Develop simple backbone and determine total cost.

  Determine five companies that provide p2p file-sharing

Find five companies that provide P2P file-sharing services. For each company, what kind of files (that is, content) do they handle

  Basic requirements for data communications and networking

List some of the basic requirements for the data communications and networking required to support the business information needs? Discuss in scholarly detail. Your answer should be of 300 words.

  Find out rtcp bandwidth will sender be allocated

Let RTP session comprising of four users, all of which are sending and receiving packets to same multicast address. Find out RTCP bandwidth will each sender be allocated?

  Create the technology survey of lans

Create the technology survey of LANs, which means for each LAN determine (or create): Hardware (# of computers, printers, etc.) CPU architecture (Intel, RISC, etc)

  Describe the imap protocol

List and illustrate 5 RFCs that describe the IMAP protocol. Print and read the first two pages of one of these RFCs.

  Explain bgp in wan between different as

You are using BGP-4 in WAN between AS1, AS2, and AS3. Explain in plain text or as BGP-4 policy statement how you would: Allow AS3 to communicate with AS1 but not allow AS2 to communicate with AS1.

  Solution for real-time analytical processing diminishes

When merging transaction and analytical processing problem occurs. Real-time analytical processing diminishes performance of transaction processing. Find the solution to this problem which many companies use?

  Task 1 write java or cc udp programs allowing two parties

task 1 write java or cc udp programs allowing two parties to establish a secure communication channel. for simplicity

  Question 1abriefly explain how the suspect dobson in utah

question 1abriefly explain how the suspect dobson in utah has been intercepting his ex-employer email.baccording to the

  Explain system gives protection using bell-lapadula policy

A computer system provides protection using the Bell-LaPadula policy. How would a virus spread if: The virus were placed on the system at system low (the compartment that all other compartments dominate)?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd