Evaluate need for security management in information systems


Case Study: Assignment

Introduction:

Macmillan Games is a medium-sized toy company located in the UK. The company develops online multiplatform games that can be purchased anywhere around the world and has a reputation for producing top quality games for children aged 7 to 11. The company is a major employer in the area, providing jobs for over 1000 employees.

Assessment Description:

Throughout the semester you will learn different security concepts as well as their relevance to businesses within real life scenarios. The assessment will allow you to demonstrate your understanding of the concepts reviewed in class by applying them to a case study and writing and individual report that should not exceed 2500 words

Analyze and evaluate the need for security management in information systems and the tools and techniques used to minimize the threat of attack. This analysis must be done in terms of the tools and techniques reviewed in class and in relation to the case study.

Discuss the motives, origins and techniques used by attackers of network based information systems and evaluate the role of cryptography in securing data transfer between systems. Within the case study, you must identify the possible motives, origins and techniques used by the attackers that allowed them to make the attack successful.

Research, critically evaluate and document solutions to known weaknesses in information security together with appropriate countermeasures and legal and ethical strategies. This should be done in context of the case study. Systematically investigate and discriminate between effective tools for maintaining system security and construct a strategy for deployment. Also in terms of the case study.

Introduction, a brief description of the contents of the document, scenario, etc.

Body of the document, all the elements described above (1-4). You can organize them as you want. Conclusions, a summary of what the document was about and the lessons learned.

References, a list of all the sources used. Intended learning outcomes for the assessment

Analyze and evaluate the need for security management in information systems and the tools and techniques used to minimize the threat of attack.

Discuss the motives, origins and techniques used by attackers of network based information systems and evaluate the role of cryptography in securing data transfer between systems.

Research, critically evaluate and document solutions to known weaknesses in information security together with appropriate countermeasures and legal and ethical strategies.

Systematically investigate and discriminate between effective tools for maintaining system security and construct a strategy for deployment.

Other skills and competencies:

The report must be written in your own words, except where referenced quotations are used, and be written in a style that makes the topic accessible to staff who are not security specialists, but who do have a good grasp of computing and networking. You will learn to critically analyze online material and to summarize it in a technical document.

Tutorsglobe is the most pioneering domain offering the top-notch Secure Systems Assignment Help services in the industry and have gained the trust of numerous students from all over the world!!

Tags: Secure Systems Assignment Help, Secure Systems Homework Help, Secure Systems Coursework, Secure Systems Solved Assignments 

Attachment:- Security management in information systems.rar

Request for Solution File

Ask an Expert for Answer!!
Other Subject: Evaluate need for security management in information systems
Reference No:- TGS03055682

Expected delivery within 24 Hours