Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!
Add File

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!

SIT763 IT Security Management

tag 0 Download 14 Pages / 3,423 Words tag 29-10-2020
  • Course Code: SIT763
  • University: Deakin University
    icon is not sponsored or endorsed by this college or university

  • Country: Australia


Brief description of assessment task

This task requires you to conduct an investigation of serious security management issues in corporate organisations. To complete this assignment, you will be required to work with other students as part of a team to apply prescribed management and audit procedures as well as analysis of roles, duties and privileges based on the case study information provided below.

Reflecting on the feedback provided to you for assessment tasks 1 and 2, your team will be required to prepare a security management report based on the findings of your group investigation of the fictional case study and use knowledge of IT security policies, risk assessment and risk management processes to prepare a report of approximately 3000 words.

You are also required to identify personnel security, training, security education needs, and associated legal and ethical awareness recommendations.

Case study

As the shipping industry moves into a smart-shipping era, the risk of cyber threats is at an all-time high.

Digitalised ships, increasing interconnectedness, the extended use of electronic data exchange and electronic navigation increases the likelihood of cyber-attacks in variety, frequency and sophistication against cyber enabled ships.

Cyber threats are one of the most serious economic and international security challenges facing the maritime industry today. The need for protection and security enforcements to mitigate the threats is more important today than ever. Guidelines to support secure cyber operations and contingency plans to be followed in a case of cyber incident have become necessary.

Peer- and self-evaluation

This is a team-based assessment task. Each team member will be required to demonstrate evidence of their contribution and performance in the team by rating their own and other team members’ contribution in SparkPlus.

The rubric you’ll be using to rate your own and other team members’ contribution is based on the

following criteria:

  • Working with others
    1. Contributed to the team agreement
    2. Listened and allowed others to share ideas
    3. Was respectful of others’ ideas
  • Contribution
    1. Provided useful ideas
    2. Participated in group discussion
    3. Completed the tasks they committed to .
  • Focus on task
    1. Punctual to all team tasks
    2. Self-motivated to work to the team agreement
    3. Used group time

What do I do now?

  • Contact your team members (your educator will provide instructions about setting up your team).
  • Read the case
  • Start collecting and researching
  • Think
  • Develop the report in Microsoft Word
  • Make sure you look at the assessment rubric and the unit learning outcomes to
  • ensure that you understand what you are being assessed (and marked) on. 

Report structure

This group assessment task requires you to prepare a single team report of approximately 3000 words based on the case study provided, which must include:

  • a description of the IT environment linked to Cyber Shipping
  • a list of risks, threats and possible countermeasures linked to Cyber Shipping
  • develop findings on how to secure ships in a cyber context
  • a review and reflection on the findings, and to propose justified recommendations to secure ships in a cyber
Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

Unique Document

Under Evaluation

Get Money
into Your Wallet

Total 14 pages

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2020). IT Security Management. Retrieved from

My Assignment Help (2020) IT Security Management [Online]. Available from:
[Accessed 29 September 2022].

My Assignment Help. 'IT Security Management' (My Assignment Help, 2020) <> accessed 29 September 2022.

My Assignment Help. IT Security Management [Internet]. My Assignment Help. 2020 [cited 29 September 2022]. Available from:

Stuck on Any Question

Our best expert will help you with the answer of your question with best explanation.

We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

250 words
Error goes here

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

We Can Help!

Get top notch assistance from our best tutors !
Excel in your academics & career in one easy click!


Other Samples

Content Removal Request

If you are the original writer of this content and no longer wish to have your work published on then please raise the content removal request.


5% Cashback

On APP - grab it while it lasts!

Download app now (or) Scan the QR code

*Offer eligible for first 3 orders ordered through app!

callback request mobile
Have any Query?