Task Write between 400 to 600 words for each of the short-essay questions. All questions are of equal value. You should provide credible references for each question according to the Faculty of...

1 answer below »
Task
Write between 400 to 600 words for each of the short-essay questions. All questions are of equal value. You should provide credible references for each question according to the Faculty of Business guidelines.
However, it is expected that answers to questions be succinct (i.e. precise and concise) with all sources of information fully referenced as per APA referencing style. See the CSU guide to APA at http://www.csu.edu.au/division/studserv/learning/referencing/index.htm
Question 1 – (5 marks)
Discuss 4 suitable information security policies for an online food supply company. Polices should include: implementable, deliverable to end-users and stakeholders.
Question 2 – (5 marks)
Access controls are built on three key principles. List and briefly define them. And how to apply these key principles on smart phone devices GPS tracking system/software to mitigate user personal information be exposed undesirably.
Question 3 – (5 marks)
Describe the recommended process for the development of information security measurement program implementation.
Question 4 – (5 marks)
Using the Internet and/or Library find an example of a company or organisation which is subject to information security vulnerability. From the finding identify people, procedures, and data assets which are still remaining a security risk and need to address and action promptly.
Question 5 – (5 marks)
Explain why risk appetite and residual risk are varies from organisation to organisation. Provide an example for each to support your discussion.
Question 6 – (5 marks)
List and describe the criteria for selecting information security personnel. In scenario of selecting a security officer for Australian Tax Office to manage and backup all databases, name some of criteria this employee should comply with.
Rationale
This assessment item is designed to test your understanding of ICT management and information security topics, issues and be able to:
• provide suitable information security policies for an designated organisation;
• address and apply the key access control principles on smart phone devices in concerning about the users personal information;
• describe process for performance measures implementation recommended by NIST;
• identify how people, procedures, and assets are part of information security system;
• explain the variation of risk appetite and residual risk in organisations; and
• examine the requirement criteria for a information security officer in an given organisation.
Marking criteria
Marks will be awarded for evidence of reading, selection of sources, logical flow of discussion, spelling, grammar, English expression and completion of tasks. Detailed marking criteria and marking sheet for this assessment will be uploaded available in Interact - Resources.
Satisfactory work will be awarded 60%. You need to demonstrate much better than ordinary work to receive a higher score.
Answered Same DayDec 21, 2021

Answer To: Task Write between 400 to 600 words for each of the short-essay questions. All questions are of...

Robert answered on Dec 21 2021
126 Votes
Access controls are built on three key principles. List and briefly define them. And how
to apply these key principles on smart phone devices GPS tracking system/software to
mitigate user personal information be exposed undesirably.
Solution:
Three main security principles for any type of security control are:
Availability: The characteristic data that permits user acces
s to information in a very needed
format, while not interference or obstruction. A user during this definition is also either an
individual or another laptop system. Availability doesn't imply that the data is accessible to
any user. (Access Control Principles, 2012) (Access Control, 2012)
My Point of View: The availability feature defines that the information being available in the
required format to the application or the devices so that, information can be analyzed as per
the requirement. This helps in maintaining the system being fed with the required information
timely as and when required. (Access Control, 2012)
Integrity: When a security mechanism provides integrity, it protects the data/resource from
being altered in any unauthorized fashion. (Access Control, 2012)
My Point of View: when the information is exchanged between any system or device the
information is communicated without being altered by any unauthorized person etc. so that
information exchanged is integrated and correct.
Confidentiality: The assurance the information communicated is not disclosed to the person
to whom it is not intended for. (Access Control, 2012)
My Point of View: When the information is communicated it should be encrypted with such
strong encryption method so that information is not disclosed to any other application or un
authorized users.
The Global Positioning System (GPS) is Satellite navigation system which provides the
location of the user and the information related to that user’s position like weather, roads,
traffic etc. anywhere possible in the earth without being obstructed by line of sight for four or
more GPS satellite. It is generally maintained by the country’s government like US data
being maintained by United States of America which is made freely available to anyone with
a GPS device. It provides highly critical information to organizations like Military,
Commercial etc. to the users. This technology is the backbone of the Global Air Traffic
Around the world.
A GPS receiver calculates the position of the user precisely and sends those timing signals to
the satellite which includes:
 the time the message was transmitted
 satellite position at time of message transmission
The key principles are implemented in the smart phone either using the hardware or the
software (APP) by availability factor which is handled to check for the resource by the
application or the device for the GPS system by sending the encrypted data to the GPS
stations in the vicinity.
Data sent to the tower is maintained and checked to maintain the data integrity so that
requested information is received and the signal is uninterrupted. Since the data sent is
encrypted the information is highly secure and confidentiality of the data is maintained.
Describe the recommended process for the development of information security
measurement program implementation.
Solution:
For the information security measurement the organization has the two choices either to start
a new security policy which is cheap early or expensive in the later stages or to improve the
on-going mechanism. An end to and approach is required to measure the program
implementation of the technology required and its implementation. This approach will
address the people working in the company, assets etc.
There are six main phases of the Information Security...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here