Information security management comp 0400 analyze the


OBJECTIVES

This assignment is designed to assess students' ability to:

- Analyze the security frameworks challenges, risk and threats.

- Develop skills of dealing with new security trends.

And enhance:

- The student's knowledge through literature review.

- Use of CU Harvard referencing system to cite and reference academic resources

OUTCOME

Students must have an understanding of the following points

1. Critically evaluate Information Security requirements

2. Analyse risk management process.

3. Develop information security baseline(s).

Task 1: Submitting the assignment work proposal

Task 2:

Most organizations these days are moving towards a more technology based environment. Applying risk management frameworks will help to address the incremental risks associated with adopting these developing technologies such as BYOD, Cloud computing and virtualizations. Therefore, as an information security manager choose one of these technologies and:

a. Through two research papers analyse two frame works of Risk Management that can be used for your chosen technology/environment.

b. Through a case study show case the implementation process of risk management in any one of the environments.

Task 3:

Raising awareness is a critical part of the whole risk management process. In your opinion, as an information security officer discuss the different methods and techniques to raise security awareness.

Provide the following information in the report:

TASKS DESCRIPTION AND MARKS DISTRIBUTION

The marks allocation scheme for the assignment is as follows:

Task 1:

Expectation: Submitting the assignment work proposal which includes the student understanding and plan on how to complete the deliverables, which resources to use and the time line.

Task 2:

a. Through two research papers analyse two frame works of Risk Management that can be used for your choosen technology/environment.

Expectation: To define BYOD, cloud or virtualization and discuss two Risk Management frameworks that can be applied to these technologies to avoid risk and threats.

b. Through a case study show case the implementation process of risk management in any one of the environments.

Expectation: Analyse a case study where an organization that is adopting one the technologies has implemented risk management, showcasing the advantages , strengths and weaknesses.

Task 3:

Raising awareness is a critical part of the whole risk management process. In your opinion, as an information security officer discuss the different methods and techniques to raise security awareness.

Expectations: add your own opinion on various techniques and methedolgies to help raise staff awareness of the importance of information security.

- Originality of answer, i.e. writing in your words with some amount of referenced material

- Correct information and presentation in document form

- Adequate referencing and citation provided

- Submitting work proposal which include student solution plan and this will carry 10% of the marks

- Oral Examination/VIVA: Assignment marks are based on the VIVA which will be conducted upon submission of assignment. The VIVA will be based on the tasks given in the assignment. ZERO marks will be awarded to the student if he/she is absent for VIVA.

GUIDELINES

- The report should have 2500 words approximately.

- The document should be well presented and neatly done

- Assignment should be computer typed using Calibri 12 font and the soft copy should be submitted through Moodle, duly checked by TurnItIn to check the similarity of work. Please note the time mentioned above and also go through the Middle East College plagiarism policy given below.

- The report must have a Title Page, table of contents (optional), reference/ bibliography and page number. Every page must have header & footer.

- At least EIGHT references are required which must be referenced by using Harvard Reference System.

- Heading should be with Font Size 14, Bold, and Underline.

- Each student has to do the assignment individually. Please submit one hard copy to myself (during class or office hour) and upload soft copies through Moodle in time.

- You are welcome to discuss about the assignment with the lecturer in his/her office hours.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: Information security management comp 0400 analyze the
Reference No:- TGS01729731

Now Priced at $65 (50% Discount)

Recommended (99%)

Rated (4.3/5)