Assessment Details and Submission Guidelines Trimester March 2022 Unit Code ICT 309 Unit Title IT GOVERNANCE, RISK & COMPLIANCE Assessment Type Group Assessment Assessment Title Case study...

1 answer below »
Please add minimum of 5 pictures with proper APA referencing. Also, PowerPoint for presentation. Thank you


Assessment Details and Submission Guidelines Trimester March 2022 Unit Code ICT 309 Unit Title IT GOVERNANCE, RISK & COMPLIANCE Assessment Type Group Assessment Assessment Title Case study Purposeofthe assessment(with ULO Mapping) 1. ULO 1. Assess the Organizational need to satisfy quality, fiduciary and security requirements for information as for all other assets. 2. ULO 2. Critically analyse corporate integrity. 3. ULO 3. Analyse Governance, Risk Management and Compliance Management processes of an organization. 4. ULO 4. Design processes to effectively manage proper governance, risk management and compliance management for all IT systems that support the business operations. 5. ULO 5. Evaluate the business benefits of GRC in managing the contribution of IT to organizations. Weight 60% Total Marks 60 Word limit 2000 minimum Due Dates Check Moodle submission link for submission dates Submission Guidelines · All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. · Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using APA referencing style. Extension · Extensions to assignment deadlines (not including exams) based on mitigating circumstances shall be at the discretion of the Lecturer for a unit. Mitigating circumstances are circumstances outside of the student's control that have had an adverse effect on the student's work or ability to work. Extensions of up to three days are permissible. · Students must email or otherwise write to the Lecturer prior to the due date for an assessment item. The student must produce a copy of their work to date on the assessment, demonstrating that they have commenced work. Academic Misconduct · Academic misconduct involves cheating, collusion, plagiarism or any other conduct that deliberately or inadvertently claims ownership of an idea or concept without acknowledging the source of the information. This includes any form of activity that negates the academic integrity of the student or another student and/or their work. Please refer 2.6 Academic misconduct – plagiarism, collusion and cheating for further details. Assignment Description (Total marks 60) You are required to prepare ‘case report’ based on the following scenarios- Case Study: Evaluation of IT Governance Implementation Using COBIT 5 Framework at Telecommunication Industries. Submission Guidelines 1. Manuscript should be containing minimum 1000 words and should not exceed 3000 words including embedded figures and tables, contain no appendix, and the file should be in Microsoft Office (.doc/.docx) format. 2. Paper should be in prepared in A4 paper (21cm x 29.7cm) using 2.5 cm for inside margin and 2 cm for top, bottom, and outside margin. 3. The title, abstract and main text should be in one column. 4. Title should be less than 15 words, title case, small caps, centered, bold, font type Times New Roman (TNR), font size 16, and single spaced. 5. The main text of the writing should be in one column with 1 cm column spacing, justified, 12 TNR, first line indent 5 mm, and 1.5 spaced. 6. The manuscript should begin with title, abstract, and keyword and the main text should consist of: Introduction, Literature Review, Research Methodology, Finding and Discussion, Conclusion followed by References. Marking Guide: Criteria Description Marks Abstract One paragraph abstract with clear objectives of paper. 10 Key Terms Minimum 5 key terms. 5 Literature Review 15 Diagrams, Figures Labelling of diagrams and figures. 10 COBIT5 Framework Implementation Step 1—Establish business drivers relevant to the IT processes Step 2—Set up the IT processes in the enterprise Step 3—Perform a prior selection of target processes based on the above selection Step 4—Confirm the prior selection of target processes with the project sponsor and key stakeholders Step 5—Finalize the list of processes Step 6—Document the scoping methodology in the IT strategy document 10 Presentation In Class , students need to do presentation 10 Possible steps (In no strict order) 1. Analyse the topic and define key terms. 2. Establish a possible point of view 3. Do the literature review. Use books, journals and other credible academic sources for support and evidence. Import references with EndNote. 4. Write a first draft to include your abstract, body and conclusion. 5. Complete or finalize your references and citations 6. Complete your final draft and check similarity index with Turnitin. 7. Similarity index should not cross 20 %.
Answered 1 days AfterSep 13, 2022

Answer To: Assessment Details and Submission Guidelines Trimester March 2022 Unit Code ICT 309 Unit Title IT...

Shubham answered on Sep 14 2022
84 Votes
Abstract
The study highlights IT governance strategy in the telecommunication industry that is aligned between information technology and business. The study describes strategies that require cumulative capability for performing changes till the business process is systematically transformed. The systematic approach can help in determining changes that can affect the strategy of the telecommunication industry and internal capabilities. The strategy implementation can help in fulfilling the aim for achieving established strategic objectives through rational resource management. The transition requires changes in the statical organizational structure and it provides with systematic approach that is based on an e
fficient communication system. It includes the purpose for changing the strategic program to the project responsible for transition.
Keyword
IT Governance, Distributed Data, Statistical Data, COBIT Framework, Risk Management
Introduction
The telecommunication industry requires IT governance and it includes the use of a framework for accessing the information. The information is about to be managed with objects that provide information on network interfaces and devices. The study describes implementation of IT governance in the telecommunication industry. It provides a function for reporting and evaluating the behavior of telecommunication equipment and effectiveness of network elements. This includes analysis of statistical data for the purpose of correcting and monitoring the effectiveness and behavior of the network and network entities. It is used for managing devices in the communication network.
Literature Review
IT Governance Implementation in Telecommunication industry
Figure 1: IT Governance
Telecommunication industry is an inseparable part of critical worldwide infrastructure and social interaction. It is important to protect the network from malicious attacks because malicious attacks can result in loss of integrity and critical business systems that are important aspects that cannot be ignored. The use of robust security programmes can be implemented for protecting telecommunication networks from attacks. It is important to develop a strategy that can be embedded to save the telecom industry from malwares. The dependence on telecommunication networks has a critical role as it is required for ensuring security of telecom equipment, customer information and network (Quoquab et al. 2018). The implementation and development of security procedures and policy to security requirements can provide better security. It is effective and it includes procedures and policies that can be tightly coupled and supported with industry accepted guidelines. It is the risk based approach that can help in development of policies for ensuring that security measures are adequate for addressing business risks. Multiple IT frameworks like COSO, COBIT, ISO27001 and ITIL can be adapted for formulation of security programmes. It is the address that can be widely accepted for accepting security standards. This model can help in operating, reviewing, establishing and implementing the information security management system. Information security governance is the subset for the enterprise government that can provide strategic direction and ensures that objectives can be achieved for management of risk.
Fiduciary and security requirements
IT governance can be defined as a subset for enterprise governance that can help in providing strategic decisions for ensuring that enterprise security programs are implemented. The information security governance framework can help in preparing the risk before it is forced to reevaluate the critical business and IT functions (Abraham, Schneider & Vom Brocke, 2019). Information security is aligned with business objectives and it needs to satisfy the future and current business requirements. The goals of the information security governance is aligned with IT and business strategy in the telecom industry. Information security governance requires resources, commitment and implementation of procedures and policies that can help in addressing the controls within the chosen framework. It is important that adequate resources are aligned with the overall strategy that is deployed and technology and operational risk can be mitigated and addressed with appropriate levels. Aligning the information security governance framework can help in identifying the necessary controls that are required to be implemented and managed for IT security. It works in conjunction with the framework that is enhanced with current security posture (Morisson & Doussineau, 2019). The framework maintains and establishes a model with standardized structure that can help in improving information security. The implementation of information security provides the framework for providing information needed for management for making information decisions on overall information security strategy for the organization. Monitoring and metrics can help in development of effective programs for providing information to help management in making decisions and addressing compliance issues and establishment of information security controls with a proactive approach.
Analysis of corporate integrity
Figure 2: Corporate Integrity
Corporate integrity can help in protecting the system data from unauthorized access. The security program ensures that data is maintained in the state that is being expected by the user. The security does not ensure accuracy of the data that are put into the system by users. It can only help in ensuring changes that are correctly applied. It includes additional elements for integrity that are needed for protecting programs and processes that are used for manipulating the data from unauthorized modification (Syed Ibrahim et al. 2019). The critical requirement of both government and commercial data processes is ensured for the integrity of data for preventing errors and frauds. It is imperative and no users can modify the data in the way that might lose or corrupt the data. The user is granted access for those programs and files that are needed for performing assigned job functions. The Integrity model can help in describing the need to be done for enforcing the information integrity policy. It can help in preventing unauthorized users from making modifications to programs and data. It prevents unauthorized users from making unauthorized modifications. This maintains external and internal consistency of programs and data (Mulligan & Bamberger, 2018). It ensures that data is aggregated in the way of providing effective data analytics and data remains unchanged. Data is marinated in a secure way and it can only be used by authorized access. It involves consideration like authorization, backup, authentication and other data protection.
Governance, Risk Management and Compliance Management processes of an organization
Figure 3: Governance, Risk Management and Compliance Management processes
Governance, Risk Management and Compliance Management processes is the strategy that can help in managing the organization's overall governance, compliance and risk management...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here