whatsapp

Connect on Whatsapp : +97143393999, Uninterrupted Access, 24x7 Availability, 100% Confidential. Connect Now

Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!
loader
Add File

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!

Stuck on Your Question?

Get 24x7 live help from our Top Tutors. All subjects covered.

loader
250 words

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Students Who Viewed This Also Studied

7 Pages
MITS5003 Wireless Networks and Communication

Question: This research study requires in-depth reading and analysis of a single specific topic. This one topic can be of your choice, but the topic must have been covered in this course.   Yo ...

Course

Mits5003

Type

Assignment

Subject

It Write Up

University

Victorian Institute of technology

12 Pages
ART40639 User Experience Design I

Questions: In this assignment you are tasked with writing a literature review.   Literature review assignments require students to produce a critical view of the literature on a particular topic. ...

Course

ART40639

Type

Assignment

Subject

It Write Up

University

University of California San Diego

14 Pages
MIS 305 Intelligent Support Systems in Business

Task: The Assignment Objective:   This is a project-based assignment divided into two deliverables: theoretical and practical part. Each with 10% of your final grade. It aims to familiarize ...

Course

MIS305

Type

Assignment

Subject

It Write Up

University

Jubail University College

Season

Fall

153 Pages
Session Hijacking Threats

Running head: Cloud computing security mechanism Cloud computing security mechanism Name of student: Name of university: Author’s note: Cloud computing security mechanis ...

Course

COMP5349

Subject

It Write Up

University

The University Of Sydney

Season

Spring

COMP09086 Information Security Management

Question

Answered

Question:

The coursework assignment for the Information Security Management module involves the production of an information security evaluation report. This coursework is a major piece of work and represents 50% of the overall assessment for this module. This coursework is a piece of groupwork. Groups will consist of a maximum of 4 students unless otherwise agreed with your tutor. If you do not manage to form a group on your own then you will be allocated to one.

The deliverable for this coursework is a written report that evaluates the current level of information security management within an organisation by:

• identifying the organisation’s key physical and information assets;

• highlighting key vulnerabilities and threats relating to information security;

• reviewing the controls in place to protect the organisation’s assets against these vulnerabilities and threats;

• providing output from, and comment on, an information security risk assessment;

• identifying possible control improvements, safeguards and countermeasures to mitigate the identified risks;

• producing outline costs and general advice on ways that the organisation could improve information security.

Your report should be structured in sections, as follows:

Section 1: Introduction

Provide an overview of organisation/department and of the project at hand. Organisations and any personnel should be anonymised.

Section 2: Current Information Security Environment

Describe the existing information environment by identifying key physical and information assets and describe the impact on the organisation if their C.I.A was compromised.

Section 3: Information Security Audit This section should include three sub-sections:

a) Provide an overview of how you conducted the audit.

b) For each of the following 7 threat categories, through discussion with your client organisation, clearly identify vulnerabilities associated with the physical and information assets that you have identified in Section 2 above:

• Malware

• Hacking

• Social

• Misuse

• Physical

• Error

• Environment

c) Provide an assessment of the controls the organisation has (or does not have) in place to address the identified threats and vulnerabilities. Controls are a critical aspect of information security because they are the key concepts and patterns we employ to protect information systems. They are also the same things we deploy to mitigate non-system information risks and indeed wider operational risks. However most importantly, from a business perspective, they are the key to determining the costs of securing an organisation.

Section 4: Information Security Risk Assessment Evaluate and identify relative risk for all vulnerabilities (control weaknesses) highlighted in the previous section and provide comment on each risk and on the overall risk assessment.

Section 5: Control Improvements, Safeguards and Countermeasures Undertake some web-based research and identify potential control improvements, safeguards and countermeasures that the company could employ to mitigate or otherwise reduce risk and improve the general state of security within the organisation.

Section 6: Costs and Additional Advice Provide outline costs for implementing the control improvements proposed in the previous section and detail any additional general advice and guidance that you feel may assist your client in improving and maintaining their information security.

Section 7: Appendices Additional research material; useful information on existing technology controls, case studies, industry guidance, etc.;

technical glossary and anything else that you may feel may be relevant or that evidences your research and justifies your proposals Please note that the contents of the appendices are not included in the overall word count for your submission. You can, therefore include as much information as you like in this section without fear of being penalised.

The materials submitted are the students’ own work.

The purpose of the report is clearly stated.

The report addresses the requirements of the coursework.

The standard of English used is adequate for communication with the audience.

The approach taken by the students could lead to a solution for the scenario.

The report contains a discussion of the client’s current information security environment

The report contains details of an information security audit and risk assessment

The report presents potential control improvements, safeguards and countermeasures

The report presents outline costs and some additional general advice.

The students have demonstrated a satisfactory understanding and appreciation of information security management, have undertaken an information security audit and have reported on  the findings of such at a level that could provide real value to the client organisation.

The students have demonstrated a more than satisfactory grasp of the module material, have excelled in the presentation of risk assessment and control improvements and have displayed an admirable understanding and appreciation of the challenges associated with information security management within their client’s organisation.

The students have demonstrated an exceptional grasp of the module material and have undertaken and reported on an information security audit in a manner, and to a level, that would be considered commendable by an information security expert.

COMP09086 Information Security Management

Answer in Detail

Solved by qualified expert

Get Access to This Answer

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

168 More Pages to Come in This Document. Get access to the complete answer.

With MyAssignmenthelp.com, students enjoy affordable assignment help provided by 3000+ highly qualified and experienced experts who have acquired their academic degrees in various fields of study. We provide assignment help services in more than 100 subjects such as chemistry assignment help, science assignment help, biology assignment help, capital budgeting assignment help.

More COMP09086 COMP09086 Information Security Management: Questions & Answers

Q
icon

We aren't endorsed by this University

MITS5003 Wireless Networks and Communication

Question: This research study requires in-depth reading and analysis of a single specific topic. This one topic can be of your choice, but the topic must have been covered in this course.   You require to take two research papers of that topic and make a small report on those two research pa ...

View Answer
Q
icon

We aren't endorsed by this University

ART40639 User Experience Design I

Questions: In this assignment you are tasked with writing a literature review.   Literature review assignments require students to produce a critical view of the literature on a particular topic.  You should summarise and critically evaluate the literature to establish the current knowledge of ...

View Answer
Q
icon

We aren't endorsed by this University

MIS 305 Intelligent Support Systems in Business

Task: The Assignment Objective:   This is a project-based assignment divided into two deliverables: theoretical and practical part. Each with 10% of your final grade. It aims to familiarize and expose students to the business intelligence tools and the four phases of the decision making pr ...

View Answer
Q
icon

We aren't endorsed by this University

Session Hijacking Threats

Running head: Cloud computing security mechanism Cloud computing security mechanism Name of student: Name of university: Author’s note: Cloud computing security mechanism 2 ...

View Answer

Content Removal Request

If you are the original writer of this content and no longer wish to have your work published on Myassignmenthelp.com then please raise the content removal request.

Choose Our Best Expert to Help You

icon

5% Cashback

On APP - grab it while it lasts!

Download app now (or) Scan the QR code

*Offer eligible for first 3 orders ordered through app!

screener
ribbon
callback request mobile
Have any Query?