Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Based on the case study supplied,write a report that includes;

a) An Information Security Risk Assessment for the organisation (Wolftech). A good answer will identify threats, vulnerabilities, and impacts. It will include priorities and risk treatment options. (35).

b) Discuss whether you think that the organisation will be able to successfully implement an information security policy. Identify any potential obstacles to success. (10)

c) You have been asked by the Chief Executive to consider whether seeking

Certification for ISO 27001 would be a good idea for the company. What is

your response? (10)

d) Discuss what the organisation needs to have in place in order to try to

Maintain operation following a major incident. (15)

You should aim to write no more than 3500 words (excluding appendices).

In your answers you are expected to demonstrate knowledge of appropriate topics discussed in the module, justify your answers and demonstrate further reading (please provide a list of references and / or bibliography). Any work that you submit must be your own interpretation written in your own words (cutting and pasting from the internet will result in an automatic fail).

Opportunity will be provided during / after the Lectures and workshops to ask individual or collective questions about this assessment. These are the times when tutors are available to answer questions relating to this module. You are encouraged to ask questions. Tutors cannot provide answers to the assessment questions asked above, but it is important that you are clear on what you are being asked to do. So please ask questions at an early stage. It is recommended that you begin work on this assessment as soon as you can in order to clarify anything that you are unsure of. Waiting until the final week to say that there is something that you do not understand will mean that you will struggle to produce a good answer.

Case Study

Wolftech is based in the Energy sector and currently employees 85 people who deal with businesses that are located in the UK, Central Europe and China. They have offices in each location, but the management team and main office are located in Wolverhampton. The company is part of a group that includes power plants in developing countries that are considered by some to be harmful to the environment.

Office staff have a range of PCs with different specifications and a number of staff and managers use laptops and mobile devices. Most of the company’s computers are now running Microsoft Windows 7 operating system and Microsoft Office 2010 Professional edition, however some computers are running Windows XP. Many senior staff use a variety of mobile devices (phones, iPads) to access mail, contacts and other work related files. When asked, the MD of the company was not aware of any addition security systems or software being used with mobile devices and believes that staff use both their own and company issued devices. The company servers are located in the basement of the Wolverhampton office. Backups are taken via removable hard disks which are locked in the system administrator’s desk. There does not appear to be any plans to respond to a loss of the servers.

The company uses Microsoft exchange server and operates Outlook for e-mail. Standard applications recently introduced include Microsoft CRM (for Customer Relationship and Contact Management) and Microsoft Share Point for collaborative working and document handling. Outlook Web Access is employed for remote web access to e-mail and public folders. Some staff use their webmail accounts to forward emails to when they are working from home or overseas. Back office systems may use bespoke front end and web-based applications linked to the company Oracle 11g database housed on a database server. The company website is hosted by an external hosting company. There is an integrated sales and purchase system. Accounting is linked with these systems but the main application is Sage 50 Accounts Professional together with the Sage 50 Forecasting package.

The company has a small IT Support team based at the Wolverhampton offices. Outside of the main office, support is provided via a help-line and remote access. A third party company is used for dealing with some of the more difficult problems. The Board do not consider that the company has experienced any cyber-security issues. The company does not currently have an information security policy, any issues would be the responsibility of IT Support.

The MD says that the systems administrator is very able to deal with any security issues; when passwords have been forgotten, he has been able to get into the affected accounts and he will not allow anyone else know the administrator passwords. He also told us that the administrator had been able to reduce the costs of some of the equipment by sourcing less expensive versions from China.

The MD stated that he never had password problems as his PA is able to remind him if he forgets a password. When asked whether the company used encryption he did not seem to understand the question but said that he would talk to the system administrator about this.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91597281
  • Price:- $140

Guranteed 48 Hours Delivery, In Price:- $140

Have any Question?


Related Questions in Computer Network & Security

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

Question do some research and find a case of cyber

Question : Do some research and find a case of cyber harassment or cyberbullying. Explain the case, and discuss the relevant theories of criminal justice associated with the perpetrator(s). Your response should be a mini ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Metasoft ltd is a software development company which works

MetaSoft Ltd is a software development company which works across Australia and New Zealand. The company is considering the following strategic proposal: - They plan to close down the Melbourne data centre rather than up ...

You need to prepare packet tracer fileattached pdf contains

You need to prepare packet tracer file attached pdf contains topology and required configurations and assigned ip address. In packet tacer file you need to include banner, router and switches. 1. VLSM Design a) As first ...

Question suppose you wish encrypt the message beyonce using

Question : Suppose you wish encrypt the message BEYONCE using the one-time pad with the key RIHANNA (a) Encode to this message and the key as bits. (b) Encrypt with the one-time pad using XOR. What is the resulting ciphe ...

Question for the remaining questions consider a 4-bit block

Question : For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 ...

In a short paragraph explain the transmission of data for a

In a short paragraph, explain the transmission of data for a TCP connection between a client computer and a web server to request a web page. Assume that the server responds with a web page that fits in one packet. Assum ...

Buffer overflowthe common vulnerabilities and exposures cve

Buffer overflow The "Common Vulnerabilities and Exposures" (CVE) is a list of cybersecurity vulnerabilities that have been discovered, and they are collected in a database for everyone to see and improve or patch their s ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As