HOW TO USE THIS TEMPLATE The instruction to the student is given within brackets and the provided titles are to be used to develop the security framework Introduction Objectives Application Scheme of...

ICTNWK519 is the main file of the assessment. Only tasks 2-6 are required. The other two documents attached are the templates for Task 2-4.
The number of words is not important.


HOW TO USE THIS TEMPLATE The instruction to the student is given within <> brackets and the provided titles are to be used to develop the security framework Introduction Objectives Application Scheme of Delegation under the ICT Security Framework Legislation Physical Security< you="" need="" to="" discuss="" following.="" location="" access:="" you="" need="" to="" mention="" where="" the="" ict="" equipment="" are="" located="" and="" the="" list="" the="" people="" who="" have="" access="" to="" the="" location="" and="" all="" relevant="" permissions="" are="" defined="" for="" each="" role.="" equipment="" siting:="" you="" need="" to="" mention="" what="" reasonable="" care="" is="" required="" in="" the="" sitting="" all="" ict="" equipment="" (screen,="" pc,="" monitors,="" photocopies,="" printers,="" network="" devices="" etc).="" also="" mention="" the="" precaution="" that="" can="" be="" taken="" (eg.="" never="" leaving="" pc="" unattended)="" inventory:="" list="" who="" maintain="" inventory="" of="" all="" items="" in="" the="" ict="" infrastructure,="" how="" often="" and="" how="" maintenance="" is="" organized.="" protecting="" output:="" countermeasure="" to="" be="" discussed="" such="" as="" ex:="" assigning="" printers="" to="" users="" with="" security="" clearances,="" disposal="" of="" confidential="" waste/papers,="" suitable="" security="" procedures="" of="" common="" carriers="" when="" shipping/receiving="" etc.=""> System Security Access to Network Passwords Backups Endpoint Security and Antivirus < you="" need="" to="" detail="" how="" antivirus="" software="" will="" be="" used="" to="" protect="" the="" network="" and="" networking="" devices="" (pc,="" laptop,="" etc).="" you="" will="" also="" need="" to="" outline="" how="" updates="" to="" these="" antivirus="" software="" will="" be="" maintained="" and="" outline="" the="" policy="" if="" any="" devices="" will="" be="" compromised=""> Disposal of Equipment Repair and Maintenance of Equipment Security Incident Management < a="" policy="" is="" to="" be="" developed="" on="" how="" to="" manage="" the="" undesirable="" incidence="" and="" procedure="" is="" to="" be="" in="" place="" to="" manage="" them.="" this="" will="" include="" reporting="" and="" escalation="" of="" the="" security="" incidence="" to="" appropriate="" person="" and="" department="" and="" provision="" of="" monitoring="" the="" network="" or="" system="" via="" software="" monitoring="" tool="" for="" continuous="" monitoring="" of="" the="" system.="" reporting="" incidence:="" mention="" which="" department="" person="" to="" be="" contacted="" if="" incidence="" occur.="" you="" may="" also="" categories="" the="" incidence="" which="" need="" to="" be="" reported.="" emergency="" plans:="" you="" need="" to="" mention="" in="" cases="" of="" emergency="" who="" will="" be="" responsible="" to="" look="" after="" the="" proper="" functioning="" of="" the="" ict="" systems.="" you="" may="" highlight="" the="" disaster="" recovery="" plans,="" business="" continuity="" plans="" and="" backup="" strategies.=""> Acceptable Usage Implementation of Security Framework < you="" need="" to="" outline,="" how="" the="" security="" policies="" will="" be="" implemented="" as="" this="" will="" be="" the="" procedure="" which="" shall="" ensure="" that="" security="" framework="" is="" in="" place.=""> DOCUMENT REVIEW / APPROVAL SHEET Task Title: Listing Procedures to execute Policies Document Type: Revision, Proposal, Agreement Proposed by: Operations and Procedure for Implementation of Security Framework S NO. Procedures 1. 2. 3. 4. 5. 6. 7. 8.< the="" number="" of="" procedure="" will="" vary="" based="" on="" the="" security="" framework="" and="" you="" may="" add="" row="" to="" list="" all="" procedures.="" please="" delete="" this="" text="" once="" you="" have="" listed="" all="" procedures="">> Feedback / Comment: Reviewed and Approved By: Date:
Nov 05, 2021ICTNWK519Training.Gov.Au
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here