1 | 5 COIT20263 Information Security Management (HT2, 2019) Assessment Item 3 - Written Assessment Due date: 8:00 AM AEST, Monday, Week 12 ASSESSMENT Weighting: 40% 3 Length: 3000 words (±500 words)...

1 answer below »









1 | 5 COIT20263 Information Security Management (HT2, 2019) Assessment Item 3 - Written Assessment Due date: 8:00 AM AEST, Monday, Week 12 ASSESSMENT Weighting: 40% 3 Length: 3000 words (±500 words) Objectives This assessment task relates to the Unit Learning Outcomes 3 and 4 and can be undertaken in a group of up to 4 members or individually. Distance students can form groups with on-campus students as well. In this assessment task, you will analyse the scenario given on page 3 and discuss in a report as to how you apply the principles of information security risk management as well as information security certification and accreditation to the organisation in the given scenario. Assessment Task You are required to analyse and write a report on a) guidelines for information security risk management b) guidelines for information security certification and accreditation for the organisation described in the scenario on page 3. You should ensure that you support your discussion with references and justify the content of your discussion. Your report should include: 1. Executive Summary 2. Table of Contents 3. Introduction 4. Discussion 5. Conclusion 6. References Note: You must follow the Harvard citation and referencing guidelines. Check the unit website at least once a week for further information relating to this assessment task. Please ensure that you write your report in your own words to avoid possible plagiarism and copyright violation. You can understand the Plagiarism Procedures by following the corresponding link in the CQUniversity Policies section of the Unit Profile. http://www.cqu.edu.au/?a=14032 2 | 5 Assessment Criteria You are assessed on your ability to apply the principles of information security risk management as well as information security certification and accreditation to the organisation in the given scenario. The marking criteria for Assessment Item 3 are provided on page 4. You need to familiarise yourself with the marking criteria to ensure that you have addressed them when preparing your report. Submission Each of you in the group must upload the same written report as a Microsoft Office Word file through the COIT20263 Moodle unit website assessment block on or before the due date. A group member who fails to submit the assessment item will not be awarded any marks for the assessment. Late submissions will incur the penalty as per university’s ASSESSMENT POLICY AND PROCEDURE. 3 | 5 The Scenario for Information Security Management Assessment Tasks FuturePlus is a newly established, independent charity organisation helping disadvantaged Australian students to continue their education, giving them a chance to a future full of possibilities. To start with, the support includes payments for tuition fees and educational supplies, as well as for student accommodations. However, the organisation plans to develop and offer more programs to help the disadvantaged students, for example, early intervention and tutoring programs. The costs are covered through public donations. FuturePlus collects one-off as well as monthly donations through their website equipped with a secure payment system. They also run special fund-raising drives twice a year by advertising about the event on national television, on their website, and via SMS and e-mails sent to donor list extracted from their donor database. To manage the operations of the organisation, they have recruited both full-time as well as casual staff. The full-time staff consist of an Operating Manager, an Accountant, a Planning Officer, two Case Officers, and three support staff. There are three casual staff providing extra support to the Case Officers with eligibility checks and visits to the candidate students, also providing updates on students who receive help from FuturePlus. However, the organisation is planned to grow in the number of staff members, and students they support in the next few years. FuturePlus operates from Sydney CBD, occupying one floor of a high-rise building. They have got their network designed and rolled out by your company, with all the servers located in their premise, and have employed your company to provide them ongoing network support. Their office network site is connected to the Internet via 5G cellular wireless technology. They require their database servers and the website to be up and running 24/7. FuturePlus provides their casual staff with portable devices to take on-site case notes during their site visits and send these to the office via secure communications. Since they store sensitive information about their donors, students receiving donations, as well as payment details such as bank account and credit card information, it is of utmost importance that their servers and communications over the Internet are completely secure. FuturePlus has requested your company’s service of designing a suitable information security program for their organisation. Note: This scenario was created by Dr Jahan Hassan on the 11th of June 2019 and no part of this scenario should be reproduced by any individual or an organisation without written permission from CQUniversity, Australia. . 4 | 5 Marking Criteria Section HD D C P F Max Mark Mark Obtained 5 4.5 4.25 4 3.75 3.5 3.25 3 2.5 2 0 Executive summary Summarised all key information of the report. One or two key information missing. Three key information missing. One or two key information missing. Three key information missing. Most key information missing. No Executive Summary. 5 Very clear writing with no mistakes. A few spelling or grammar mistakes. Several spelling or grammar mistakes. Very clear writing with no mistakes. Several spelling or grammar mistakes. Very clear writing with no mistakes. Several spelling or grammar mistakes. Not clear. Not clear. HD D C P F 5 4 3.5 3 2 0 Table of contents (ToC) Used decimal notation. Included all headings and page numbers. Used ToC auto-generation. Used Roman i for the Executive Summary page. Executive Summary was before the Introduction. Used a new page. One feature missing. Two features missing. Three features missing. Four or more features missing. ToC missing. 5 HD D C P F 5 4.5 4.25 4 3.75 3.5 3.25 3 2.5 2 0 Set the scene for the report and described the purpose clearly. Explained the research method used. Outlined the sections of the report. Started from a new page. Contained all information but not enough detail. Some information missing but enough detail given. Some information missing and not enough detail. Most information missing. No Introduction. 5 Introduction Very clear writing with no mistakes. A few spelling or grammar mistakes. Several spelling or grammar mistakes. Very clear writing with no mistakes. Several spelling or grammar mistakes. Very clear writing with no mistakes. Several spelling or grammar mistakes. Very clear writing with no mistakes. Several spelling or grammar mistakes. HD D C P F 20 18.5 17 16 15 14 13 12 10 8 0 Discussion Thorough and detailed discussion supported by in-text references and justifications. Contained all information but not enough detail. Some information missing but enough detail given. Some information missing and not enough detail. Most information missing. Irrelevant information. 20 Very clear writing with no mistakes. A few spelling or grammar mistakes. Several spelling or grammar mistakes. Very clear writing with no mistakes. Several spelling or grammar mistakes. Very clear writing with no mistakes. Several spelling or grammar mistakes. Very clear writing with no mistakes. Several spelling or grammar mistakes. HD D C P F 5 | 5 5 4 3.5 3 2 0 References All references are listed according to Harvard reference style. All references are listed but a few referencing errors. Not all references are listed but correctly referenced. Many references missing. Incorrect reference list. No reference list. 5 Plagiarism penalty Late submission penalty Total 40
Answered Same DaySep 23, 2021COIT20263Central Queensland University

Answer To: 1 | 5 COIT20263 Information Security Management (HT2, 2019) Assessment Item 3 - Written Assessment...

Kuldeep answered on Oct 06 2021
151 Votes
Information Security
Information Security
Topic: Information Security Risk Management
Student Name:
University name:
Unit Name:
Date:
Executive Summary
The main purpose of this report is to support in the growth of the well-designed safety procedures for Norwood System. In the procedure of raising a security plan, this report discusses the several roles of Norwood Systems and the duties of security personnel. The report focuses on improving the organization's existing safety structure to make it better. The report outlines several threats that can also affect the safety of organization's information, such as DoS and spoofing. It identifies the training requirements required to properly implement a security program. The report also provides recommendations for a security mode
l that Norwood Systems can implement to effectively implement information security.
Contents
Introduction    4
Discussion    5
Guidelines for information security risk management    5
Guidelines for information security certification and accreditation    9
Conclusion    12
References    15
Introduction
Data is the very significant asset of association. In this period of communication and information technologies, safety risks moreover risks have become the main focus of the organization (Andress 2014). Information security involves protecting the integrity, availability and confidentiality of a company's valuable and sensitive information (Bergström, Lundgren and Ericson, 2019). FuturePlusis also known for provide telecommunications services to businesses, customers and operators around the world. This report also discusses the safety procedures that Norwood Systems can use to improve its present security architecture. It identifies safety threats as well as risk assessment plan or procedures that can apply. The report provides a training programs, appropriate ISO standards, and requirements for the FuturePlus security model. In order to manage the organization's operations, they have recruited full-time and temporary employees (Chang et al., 2017). The full-time staff includes an operations manager, accountant, planning officers, two case officers’ also three support employees. A total of three temporary employees provide extra support to case officer, including qualification checks and visits to candidate students, as well as up-to-date information on students who receive assistance from FuturePlus. However, the organization plans to increase the number of employees and the number of students they support in the next few years. FuturePlus operates in the Sydney CBD and occupies a high-rise building. They have designed and deployed the network by FuturePlus Company; all servers are located inside and hired FuturePlus’s business to provide them with ongoing network supports. Their office network sites connect to the Internet through 5th Generation cellular technology. They require their websites and database servers to run 24/7 (Fenz et al., 2014). FuturePlus provides temporary equipment for temporary employees to record on-site case records when they conduct on-site visits furthermore send them to office by the use of safe communications. Because they store sensitive data about the donors, donated students, and compensation details for example bank accounts and credit card data, it's critical that their communications and servers over Internet are secure completely.
Discussion
Information security involves protecting systems and information to prevent some kind of illegal or unauthorized access, destruction, modification, and disclosure. The primary goal of IS system is to retain the integrity, confidentiality and availability of information. Confidentiality is to protect or protect valuable data from a few unauthorized or unethical accesses. Confidentiality ensures that only official users can access the correct data based on their requirements (Humphreys, 2007). Integrity is designed to protect valuable data from several unauthorized modification and destruction. Integrity ensures that the data is accurate and complete. Availability is designed to provide the right data in a timely approach without causing any interference or hindrance. Information systems consist of people, hardware, software, data, networks, and programs. All of these parts are susceptible to a variety of threats and risks. Information security system is a significant necessity for each association. Numerous strategies can also be use to protect information from any form of attack. Risks can be mitigated and avoided to promote safe business environment. Losing valuable data can damage multiple users as well as affect the reputation of company (Jirasek, 2012). As time goes by, information security is becoming more and more important. A variety of information security model can be incorporated into an organization's business processes depend on certain requirements and needs.
Guidelines for information security risk management
Security Models
The security model can be considered as a standard that can use for comparison or comparison reference. The NIST control model access is used to identify access stages at all levels in Norwood System. The Management accesses information and data associated to strategic plan. The management stage controls operational information, furthermore technical stage accesses the everyday information necessary for business continuity. Safety models also help to secure data in FuturePlus. Norwood Systems provides enterprise solutions through a cloud service called Corona Cloud (Kang, 2014). The NIST security model will be tremendously helpful to the business. NIST files are available free of charge and have also been update by government. It provides guidance on risk assessment, privacy control and safety planning. Norwood systems require to implementing the strong safety policies to protect the cloud from some type of threat.
Development of Security Program
Norwood Systems is the medium-sized business with hierarchical organization. Codes of conduct prevail in the organizational culture. Workers should act very honestly moreover protect company assets. Employees can post confidential information under company licenses. If it violates the behavior, the company will take serious action. There is a need to develop robust security procedures to protect companies from security risks and threats. Fail to protect the valuable data will damage the reputation of company. The key parts of the safety program that require to be developing are follows as:
Hire a DSO or Designated Security Officer: DSO is necessary for coordinating and monitoring the safety policies of association.
Risk Assessment: Companies must determine the type of information they store and the value of the information (Kim and Shon, 2015). There is a need to identify threats and risks related with different categories of data. Risks and Threats should be ranked based on their impact and exposure.
Access Control: The refuge officer should determine which data should be provided to whom. Workers should be authoritative to access kind of data they need to run their company, depending on their role and level in the managerial structure.
Personal accounts: All workers should have separate account so they can be properly monitored as well as can also help to investigate a few data loss as well as manipulation.
Develop a strategy: An IS strategy should be in place so that the whole organizations know safety expectations (Meily, 2014). The significance of data should be mention in policy. These policies should be reviewed and updated annually. Workers should sign an agreement to comply with policies and rules.
Effective governance: Security officials must ensure that policy is followed in useful manners. The responsibilities and roles of workers ought to be clear defined in the order to manage effectively.
Install a firewall: A firewall can be implementing to...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here