New

Learn smart - Learn online. Upto 88% off on courses for a limited time. View Courses

Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!
loader
Add File

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!

Stuck on Your Question?

Get 24x7 live help from our Top Tutors. All subjects covered.

loader
250 words

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Students Who Viewed This Also Studied

9 Pages
INFS 5115 Security Principles

Task: Select and research one of the following topics and prepare a short (10 minute) presentation: 1. Cyber Insurance: Many organisations are investigating the potential benefits of purchasing cybe ...

Course

INFS 5115

Type

Assignment

Subject

It Write Up

University

University of South Australia

7 Pages
Management

This assessment requires you to conduct investigation of serious security management issue in corporate organizations and prepare a report based on the findings of your investigation. Analyzing real-l ...

Type

Assignment

Subject

It Write Up

15 Pages
Management

This assessment aims to develop and gauge student understanding of the key topics covered so far by answering the following questions. Answering these questions will help you build some understanding ...

Type

Assignment

Subject

It Write Up

9 Pages
MIS603 Microservices Architecture

Task: Incomprehensible submissions. Assessments provide the opportunity for students to demonstrate their knowledge and skills to achieve the required standard. To do this, assessment responses need ...

Course

MIS603

Type

Assignment

Subject

It Write Up

University

Torrens University

INFO5301 Information Security Management

Question

Answered

Questions:

Case study scenario: Moving Fast Supplies

Moving Fast Supplies (MFS) is a company that designs and manufactures equipment for use in logistics industries. MFS prides itself in the development of products that use the latest technology and knowledge of the logistics industry to provide products that lead the way in the delivery of goods throughout the supply chain. Most of their products require custom installations, but these installations are largely implemented by configuration options available within their product lines. They sell their products to large logistics organisations and manufacturers through their own branch offices that are located across the globe. Some of the products they manufacture must be installed and serviced by specialist technicians. MFS branch offices provide three major functions for their customers: sales and consultancy; trained service and support professionals; and training staff. Many small common items are kept in stock at branch locations for service requirements, but some products are shipped to directly to customers on an as needed basis due to the customization required to match different installations. An online portal allows branches and retailers to order equipment and arrange installation dates, time, and location.  A key part of MFS is the design and testing of their products. Care must be taken with products in development that the information is retained within the company and laws relating to copyright (e.g. software for electronic equipment), patents (physical equipment) and trade secrets as well as not releasing important commercial information (eg product release dates and quantities). Design, development, and testing is coordinated through the Central Office in Melbourne. The final products are assembled through contracts with several manufacturers located in Viet Nam, India and Indonesia. 
 
The Central Office in Melbourne has three main divisions: Research; Design and Development; Manufacturing; and Sales and Installation. Support departments include Finance, Payroll, and Accounts, ICT, and Human Resources. Support and oversight for branches is largely provided by the relevant areas of the business, however since international branches must conform to local regulations, many of their functions are set up according to local laws. Branches must have their own ICT systems that support local requirements. Online product and support information is provided through services hosted at the Central Office. The Melbourne Branch has 400 employees. There is a sales branch in global area: Europe, South America, Asia, North America and Oceana. Branches generally have 100 employees consisting of managers, installers, service personnel, ICT assistants, and installation assistants. Various managers include: an installation manager; an accounts and finance manager; a sales manager.
 
Product manufacturing is coordinated through the Melbourne Central Office with the various manufactures. Final installation of products requires coordination between the customer, branch sales and installation services and the Melbourne Central Office. This coordination is supported by the Production Planning Software hosted in Melbourne. This provides for speedy implementation of product installation from the quotation stage through to final implementation of products and training of staff. This Production Planning Software assists with production planning including the purchasing of production supplies, stock control, manufacturing schedules, shipping arrangements, installation support, implementation testing and training of customer staff.
 
Research and development use specialist applications for developing products. This includes applications including software development tools, hardware design tools, CAD design tools and applications necessary for administration. The Sales of billing for products sold products is supported SafeTrans Software. It provides for sales invoicing, and accepting payments of clients. Invoicing is usually coordinated with the installation software. Key triggers include delivery of products, installation completion, testing and product approval, and training completion.  Payroll is handled by a separate system: MyPayrol is used across the organisation, but each branch has its own locally supported version that conforms to local requirements. All branches can interact with these major systems through the internet. MFS uses many other common application programs: email, word processing, spreadsheets, etc. ICT has the responsibility of organising and implementing the network, server and computing facilities as well as maintaining the applications in use in the Melbourne Branch as well as the Sales Branches.  Each of the divisions has their own internal servers and subdomain which are part of MFS’s intranet which connects to all branches and departments. All external traffic is routed through the main branch systems.
 
MFS has only recently identified a need for a more formal approach to securing their ICT systems, though there are currently some elements implemented in an ad hoc fashion (firewalls, virus and malware protection, user access controls which are overseen by the ICT technical staff. MFS have contracted your consulting service, Secure Security Services (SSS), to provide a report outlining the need for a Security Management Program, its purpose, and a suggested framework for the development of a security management program that oversees security concerns across their business.
 
As an employee of SSS, you have been asked to develop a report that presents the needs and requirements to implement an ICT Security Program for MFS. This plan should discuss how information security could be better managed by developing a Security Management Program and provide an overview of how to develop such a program. This would include identifying the tasks and roles that need to be assigned for the development and implementation of a Security Management Program. The policy development and the need for a risk management program. Specifically, they have asked for an explanation of benefits of a risk management plan, the steps for creating a risk management plan, a description of risk assessment process. To meet the client’s request, you need to do the following: Document contents A discussion of the types of policies needed for information security. A discussion on what policy documents should look like.
 
Explanation of benefits and purpose of a risk assessment.

Description of risk assessment process. 

Outline the steps for creating a risk management plan.
 
A set of asset and risk priorities using the tables below  Identification of Assets. (One asset from each of the different categories: people, process, hardware and software).  Identification of threats/vulnerabilities. (One threat from each of the different categories: Internal, external, deliberate, and accidental).  Priorities determined, Preliminary impact of risks  Suggest controls for the items in the last table. To assist with their understanding of risk assessment and management you have decided to consider 4 assets and 4 threats to be used to complete the tables below. To effectively demonstrate your skill, the tables would need to include examples of assets from different categories: people, process, hardware and software. Threats should also include examples from different categories: Internal, external, deliberate, and accidental.

INFO5301 Information Security Management

Answer in Detail

Solved by qualified expert

Get Access to This Answer

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

33 More Pages to Come in This Document. Get access to the complete answer.

MyAssignmenthelp.com boasts a team of talented and highly skilled coursework writers based in UK who assist students in the best possible manner. Students, who need coursework help, find our services fulfilling and effective because we provide high quality help at affordable price. So, students who often search can someone do my coursework cheap or can experts Write my coursework for cheap get perfect solution at MyAssignmenthelp.com. They pay for best coursework and get it from us.

More INFO5301 INFO5301 Information Security Management: Questions & Answers

Q
icon

We aren't endorsed by this University

INFS 5115 Security Principles

Task: Select and research one of the following topics and prepare a short (10 minute) presentation: 1. Cyber Insurance: Many organisations are investigating the potential benefits of purchasing cyber insurance. However, there are various aspects to be considered beyond the potential financial comp ...

View Answer
Q

Management

This assessment requires you to conduct investigation of serious security management issue in corporate organizations and prepare a report based on the findings of your investigation. Analyzing real-life cybersecurity incidents provides you with crucial insights regarding cybersecurity posture of an ...

View Answer
Q

Management

This assessment aims to develop and gauge student understanding of the key topics covered so far by answering the following questions. Answering these questions will help you build some understanding for the next assessment item as well as for the entire subject. It is expected that answers to the a ...

View Answer
Q
icon

We aren't endorsed by this University

MIS603 Microservices Architecture

Task: Incomprehensible submissions. Assessments provide the opportunity for students to demonstrate their knowledge and skills to achieve the required standard. To do this, assessment responses need to be both clear and easy to understand.   If not, the University cannot determine that stude ...

View Answer

Content Removal Request

If you are the original writer of this content and no longer wish to have your work published on Myassignmenthelp.com then please raise the content removal request.

Choose Our Best Expert to Help You

icon

5% Cashback

On APP - grab it while it lasts!

Download app now (or) Scan the QR code

*Offer eligible for first 3 orders ordered through app!

screener
ribbon
callback request mobile
Have any Query?