Logical flow leading the reader from start to finish on a


Selected an organisation, and provided information on the current security state and made suggestions of improvements to their security. Use this organisation for this assessment item as well. Depending on the size of the organisation (small, medium, large) you are asked to assist in developing a security program. Reflect on the current roles and titles of the security personnel and make suggestions of improvements. Provide a plan to make these changes incorporating training requirements. Determine if the organisation uses any ISO security standards and provide reasoning which security model would be more suitable. Determine the suitability of certification. Justify by using threat identification and provide risk assessment for this organisation.

As in the previous assessment item, please make sure NOT to divulge any sensitive information. If you are working for an organisation, use the internet to determine what information is available to the public. To protect security of the organisation, you are requested to invent the current security situation of this organisation. This will allow you to create a scenario that you can then use to apply your knowledge of the course material.

Write a report in accordance to the recommendations of the links on the study desk. The word-count limit for the introduction, body and conclusion of this report is set at about 3000 words. Use five (5) or more resources for your citing and referencing in Harvard style.

Structured development of report

Logical flow leading the reader from start to finish on a clear path of addressing the assessment requirements; clear identification and description of current state; clearly leading into the solutions; application of correct report format.

Depth of research/ critical reflection

Reason to support findings: showing depth of understanding critical security issues of an organisation; being able to reason for the most suitable security model, training, roles to address these issues; showed depth of understanding threat identifications, ISO, model, etc. (chapter 1-4 concepts); selections of addition journal articles specifically address and support.

Understanding of key ideas and concepts

Understood the course material; able to identify key ideas and concept within a real life scenario of issues; able to explain an issue with the use of key ideas and concepts; able to relate own experience to course material and issue by introducing own perspective

Evidence of support

Citing and referencing: Correct within text Harvard citing; correct Harvard referencing; used more than five (5) sources (book, journal article, report, news article on the internet) in addition to the course text book.

Solution Preview :

Prepared by a verified Expert
Other Subject: Logical flow leading the reader from start to finish on a
Reference No:- TGS01127643

Now Priced at $80 (50% Discount)

Recommended (91%)

Rated (4.3/5)