Purpose of this assignment: The purpose of this assignment is to support the following unit Learning Outcomes (LO) for this unit: 1. Analyze and synthesize information security issues in modern...

1 answer below »

Purpose of this assignment:


The purpose of this assignment is to support the following unit Learning Outcomes (LO) for this unit: 1. Analyze and synthesize information security issues in modern organizations.


2. Demonstrate an understanding of the advantages, disadvantages, threats, and vulnerabilities associated with various IT environments.


3. Demonstrate the concepts, principles, and techniques relating to the security of information.


4. Evaluate the importance of information to organizations and society in general.


5. Identify the ethical and legal issues associated with information security and analyze their implications.


6. Use the Internet to locate information security services.


Task:


In this assessment, students must produce a case study report on a real-life enterprise security issue from the perspective of a CEO, CIO, CTO (chief technology officer) and CFO (chief financial officer).


Your report should address:




  1. Identify the organization involved




  2. The nature of any security issues or concerns in that case study.




  3. The type of enterprise systems that existed in the organization




  4. How the organization responded to the security threat or concern from CEO, CIO, CTO (chief


    technology officer) and CFO (chief financial officer) point of views.




  5. How successful their response was?




  6. Any lessons they may have learned from those security issues.




Cover/Title Page:


Must show the unit code and title, assignment title, your name, and student number, due date and the title of your topic.


Table of Contents:


Not required.


Introduction:


Introduce the report, define its scope and state any assumptions. Use in-text references were appropriate.


Main report content


The report should address the task outlined above.


References


A list of end-text references formatted, using APA 6th format. It is recommended that Endnote is used to manage references. Your references should ideally comprise of books, journal articles, and conference papers.


Format


This report should be between 2000 and 2500 words (excluding references and diagrams) and labelled as .docx and should be in a single file.


Your assignments must be word-processed, and the diagrams are developed using graphics software (most word-processors provide this facility). The text must be no smaller than 12pt and font Times New Roman

Answered Same DayMay 10, 2021

Answer To: Purpose of this assignment: The purpose of this assignment is to support the following unit Learning...

Ankit answered on May 15 2021
152 Votes
Unit code:
Unit Title:
Assignment title:
Student Name:
Student number:
Due date:
Title of topic:
Introduction:
Information security is an act of securing the information from unauthorized access and whose primary aim is to maintain confidentiality, integrity, availability (CIA) of data. It’s the practice of being protected against the unauthorized use of data especially digital data, or the steps to accomplish this. Today digital society is facing the biggest
challenges.
For a business, any organizations like government or private company, Information security is necessary to make a complete and essential system. It has impacted us so much that it had altered the way people live their lives. It ruled out the way a business is conducted or a government organization running.
But Information security is not simple straightforward. It carries many issues with it. Some of them can be categorized as hacking, blocking, vulnerable software, sniffing, spoofing and even an identity theft. All the current issues can be broadly categorised in two compartments i.e. computer abuse or computer crime.
As it’s clear that all the organizations are totally contingent on the Information technology for its successful growth and prevail, we can conclude that for the modern organizations is the most lucrative need of the hour. But protecting information is another important task. With the increase of digital, there is an increase of threats and cyber attacks.
Threats to the information technology can be broadly categorized as cyber attacks, stealing of cognitive property, recognition alteration, data stealing or information alteration. Security warning can be referred as helplessness in terms of security break to the important data or information.
The scope of this report is to understand the security threat and issues faced by a real time organization and how that organization responded to the security threats. What was the frequent measure this organization took to regain access on their enterprise system and to confide their clients or customers with trust or assurance?
Information Security Issues in Organizations:
As the frequency of cyber attacks and threats are increasing, stronger and solid cyber laws should be created. These laws should give data seclusion in an organization. It would make the base for the security processes and involvement. It should be on high priority for an organization. In the recent studies, it had been shown that the security breaches are not only the result of cyber attacks but also due to the lack of information security culture. It is the duty of an organization to create a security awareness program among its employees but in the end it’s failed to change their attitude towards security. It is the need to update the behaviour of each and every employee in the organization. If not done, then only the security involvement will not cover the security breaking risks.
It is the basic need of the hour to follow the rules and regulations described and created by the organization by the employees. But if the organization only focuses on the sole knowledge spreading of its protocols, it would not help. All the organization employees should go beyond their habits from merely awareness to real implementation of security protocols for the preventive coverage of all the risks that can be aroused because of security breaking. This behaviour of the employees can be referred as security culture. Thus we can say that it is the responsibility of all the employees to update their behaviour so that it becomes suppressed, natural and easy habit of them that would automatically corrects the behaviour and response to security protocols. So it’s very important for an organization to look for the ways to strengthen the information security culture.
For an organization it is demand of the changing time to handle security both on the physical level as well as the digital level. Otherwise they would not be able to stand of the crowd. An organization should use its power to make strict cyber laws and impose them on the employees with contractual programs. These laws are for the benefit of end products, information and employees safety. An organization’s esteem and monetary losses are the side effects are these contracts are not met. If an organization is attacked by threats, the overall image of the organization is hampered and thus the market is shattered. On working within a security culture, an employee can also benefit himself or herself. Digital and physical security is the one of the advantage that can user benefit of. [Continuitycentral 2017]
Advantages of Information Security:
1. Information security is exceptionally...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here