This assignment is an exercise in thenbspapplicationnbspof


Background

This assignment is an exercise in the application of knowledge to an actual organisation and the compilation and presentation of the findings in the format of a sophisticated report - well edited, attractive, and professionally laid out and academically sound. 

Deliverables

This Individual assignment constitutes 70% of your module mark. It consists of a single portfolio style document. The due date for this assignment is 01-JAN-2016. Late work will be dealt with as per the university regulations. Please ensure that you:

? Complete and sign the cover sheet

? Submit the work by the due date

? Submit the work as a word document to Moodle.

Task The following headings are indicative of what should be included and provide a guideline:

You are required to assess the information security situation in a selected company and prepare a security plan that includes recommendations for improvements. Assume that the selected company plans to use mobile devices and cloud for storing important documents and utilizing virtual resources.

You are responsible for overseeing the security of information from deliberate and accidental threats. Assume some engineersreported that some of their documents experienced a security attack recently. Management has directed to undertake some security analysis and planning to improve the company's information security.

You must address at least the following in the report.

1. Identify and describe the main categories of information assets that may be at risk and have to be protected.

2. Appraise the actual and potential threats to and vulnerabilities of the Company's information assets.

3. Evaluate the challenges in information security related to the use of mobile application.

4. Discuss the factors distinguish mobile security fromtraditional computer security.

5. Reviews the recent prevention and detection techniques used to protect information at the mobile devices.

6. Analyse the threats and data privacy issues related to the use of cloud.

7. Develop a security plan that describes counter-measures that will manage the threats that put the company's information assets at risk from a risk management perspective.

8. Develop a comprehensive information security education and awareness programme for use by management, staff and contractors for the selected organisation.

9. Recommendations you can make to improve the information security situation of the company.

10. Presentations in the form of PowerPoint slides 

Note:

11. Evidence of your research into the topic (This might be a single article, or you may wish to append citations andreferences, posts, emails, web pages etc)

12. A critical evaluation of the topics - show us what you think and how you justify your argument or recommendations.

13. Just ensure that you are able to convince your marker that you have been actively researching, reading, and turning your research into decision-level knowledge.

Request for Solution File

Ask an Expert for Answer!!
Basic Computer Science: This assignment is an exercise in thenbspapplicationnbspof
Reference No:- TGS01215232

Expected delivery within 24 Hours