Audit or review of the information security issues, Computer Network Security

Assignment Help:

Using the selected approach, you should then conduct an audit or review of the information security issues associated with the use of computing facility and report on the findings.  It is important that in conducting this review, issues around the risks associated with the particular circumstances of your facility are appropriately considered.  It is also important that the review extends beyond the simple technical aspects of the situation.

Your report should include the following details:

  • a discussion of the methodology or review approach that you have adopted. You should identify the approach, briefly outline it key features, and you should provide a justification as to why this is an appropriate tool for this assignment. Where you have taken a recognised approach (or combination of approaches) and have modified them to suit the particular circumstances of this review, you should outline any rationale for these modifications;
  • a summary of the tasks undertaken to conduct the review. What steps did you follow in conducting the review? What evidence did you consider in helping you form your views? What tests did you perform in order to verify the answers to key review questions?
  • the findings of your review and recommendations for improvement. What issues from the situation came up looking good in the review, and where was there room for improvement? What things would you change in order to improve the information security environment?
  • a brief reflection on the methodology or review approach, following your experience of applying it to your personal computing facilities. Do you think this approach targeted the right issues? Did it leave anything out that you could see might be a significant information security issue? Did it expect certain security measures that you would regard as being unreasonable (assuming that you have applied the methodology in an appropriate way)? Did the approach allow for an adequate consideration of your risk profile and make allowances for risk management with these issues?

Related Discussions:- Audit or review of the information security issues

Ethernet network, QUESTION : a) A datagram of 3000 bytes has to travel...

QUESTION : a) A datagram of 3000 bytes has to travel over a network with a MTU size of 1000 bytes. Describe how fragmentation can be used to solve this problem. You should pr

Explain how can we achieved privacy in an e-mail system, Explain how can we...

Explain how can we achieved privacy in an e-mail system.  The full form of PEM is Privacy Enhanced Mail: PEM  is  the  internet  Privacy  Enhanced  Mail  standard  adopted

Address resolution protocol (arp), ADDRESS RESOLUTION PROTOCOL (ARP) T...

ADDRESS RESOLUTION PROTOCOL (ARP) TCP/IP can use any of the three address resolution functions relaying on the addressing procedure used by the underlying hardware. To guarant

Encryption key size-cryptography, Encryption Key Size When using ciphers...

Encryption Key Size When using ciphers, the size of crypto variable or key is quite important as the strength of many encryption applications and cryptosystems were measured by

Illustrate about tinysec protocol, Illustrate about TinySec Protocol T...

Illustrate about TinySec Protocol TinySec is implemented on the link layer and addresses security requirements of the resource staffed nodes in the WSN based on the link layer

Develop firewall rules based on a fictitious organisation, Question requir...

Question requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption te

State the fermat-euler theorem, Question: (a) Prove that every positive...

Question: (a) Prove that every positive integer n can be factorized into a product of prime powers. (b) State the Fermat-Euler theorem as needed in the RSA system. (c) Us

Digital certificates, A Certificate presents an organization in an official...

A Certificate presents an organization in an official digital form. This is same to an electronic identity card which serves the purpose of Identifying the owner of the certificate

Access control matrix, You are provided with 3000 sample keystrokes for 5 u...

You are provided with 3000 sample keystrokes for 5 users mentioned above. You can find this data using the ‘Lab 2 User Data' link in the ‘Lab 2' folder on Blackboard. Please note t

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd