Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

OBJECTIVES

This assignment is designed to assess students' ability to:

- Analyze the security frameworks challenges, risk and threats.

- Develop skills of dealing with new security trends.

And enhance:

- The student's knowledge through literature review.

- Use of CU Harvard referencing system to cite and reference academic resources

OUTCOME

Students must have an understanding of the following points

1. Critically evaluate Information Security requirements

2. Analyse risk management process.

3. Develop information security baseline(s).

Task 1: Submitting the assignment work proposal

Task 2:

Most organizations these days are moving towards a more technology based environment. Applying risk management frameworks will help to address the incremental risks associated with adopting these developing technologies such as BYOD, Cloud computing and virtualizations. Therefore, as an information security manager choose one of these technologies and:

a. Through two research papers analyse two frame works of Risk Management that can be used for your chosen technology/environment.

b. Through a case study show case the implementation process of risk management in any one of the environments.

Task 3:

Raising awareness is a critical part of the whole risk management process. In your opinion, as an information security officer discuss the different methods and techniques to raise security awareness.

Provide the following information in the report:

TASKS DESCRIPTION AND MARKS DISTRIBUTION

The marks allocation scheme for the assignment is as follows:

Task 1:

Expectation: Submitting the assignment work proposal which includes the student understanding and plan on how to complete the deliverables, which resources to use and the time line.

Task 2:

a. Through two research papers analyse two frame works of Risk Management that can be used for your choosen technology/environment.

Expectation: To define BYOD, cloud or virtualization and discuss two Risk Management frameworks that can be applied to these technologies to avoid risk and threats.

b. Through a case study show case the implementation process of risk management in any one of the environments.

Expectation: Analyse a case study where an organization that is adopting one the technologies has implemented risk management, showcasing the advantages , strengths and weaknesses.

Task 3:

Raising awareness is a critical part of the whole risk management process. In your opinion, as an information security officer discuss the different methods and techniques to raise security awareness.

Expectations: add your own opinion on various techniques and methedolgies to help raise staff awareness of the importance of information security.

- Originality of answer, i.e. writing in your words with some amount of referenced material

- Correct information and presentation in document form

- Adequate referencing and citation provided

- Submitting work proposal which include student solution plan and this will carry 10% of the marks

- Oral Examination/VIVA: Assignment marks are based on the VIVA which will be conducted upon submission of assignment. The VIVA will be based on the tasks given in the assignment. ZERO marks will be awarded to the student if he/she is absent for VIVA.

GUIDELINES

- The report should have 2500 words approximately.

- The document should be well presented and neatly done

- Assignment should be computer typed using Calibri 12 font and the soft copy should be submitted through Moodle, duly checked by TurnItIn to check the similarity of work. Please note the time mentioned above and also go through the Middle East College plagiarism policy given below.

- The report must have a Title Page, table of contents (optional), reference/ bibliography and page number. Every page must have header & footer.

- At least EIGHT references are required which must be referenced by using Harvard Reference System.

- Heading should be with Font Size 14, Bold, and Underline.

- Each student has to do the assignment individually. Please submit one hard copy to myself (during class or office hour) and upload soft copies through Moodle in time.

- You are welcome to discuss about the assignment with the lecturer in his/her office hours.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92081679
  • Price:- $65

Priced at Now at $65, Verified Solution

Have any Question?


Related Questions in Management Information System

Question briefly explain your understanding of

Question : Briefly explain your understanding of countermeasures and defense mechanisms that could be used to protect an organizations environment. Make sure to cite and reference the sources used for this discussion, as ...

Recent predictions for population growth in the 21st

Recent predictions for population growth in the 21st century are quite different from predictions made several decades ago. Find reports of older population model (say from 1960s, 1970s, or 1980s), and find reports of re ...

In the health care industry the topic of network topology

In the health care industry, the topic of network topology is becoming increasingly important as hospitals, clinics, and other supports consider adding more devices and equipment to existing networks or building addition ...

Research the history of the attack and those

Research the history of the attack and those responsible. What did this exploit? Why was it so much more effective than previous BotNet designs? What kind of mitigations would you recommend for protection? Research Paper ...

It and business transformation create an apa formatted

IT and Business Transformation Create an APA formatted paper in Microsoft Word. Using your organization or an organization you are familiar with, describe an IT implementation process. You can find many of these online i ...

Respectfully please see the structure for the program im

Respectfully, Please see the structure for the program I'm trying to write using Python. Below is how the program should be structured. 1. Program general structure: Function definitions should be at the top of the progr ...

Protected assets please respond to the followingduring a

"Protected Assets" Please respond to the following: During a disaster certain assets must be protected, and for industrial companies, this is not only for the company but also for the surrounding community. Read the arti ...

A case study of project and stakeholder management failures

A case study of project and stakeholder management failures: Lessons learned will be analyzed for Case 2. Sutterfield, J. S., Friday-Stroud, S., Shivers-Blackwell, S. (2006). A case study of project and stakeholder manag ...

Reply 1making sense of facts numbers and measurements is a

Reply 1 Making sense of facts, numbers, and measurements is a form of art - the art of data visualization. There is a load of data in the sea of noise. To turn your numbers into knowledge, your job is not only to separat ...

The less concrete and measurable goals areselect one a the

The less concrete and measurable goals are: Select one: a. the harder it is to communicate to the other party what we want b. the easier it is to understand what your opponent wants c. the easier it is to determine wheth ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As