Skip to main content

Analyze and synthesize information security issues in modern organizations.

ITNET202A - Enterprise Security major assignment Semester 02, 2019
Details:
Title: Enterprise Security report
Due Date: Week 11 Friday 5 PM
Value: 40% of the final mark for the unit
Length: Minimum of 2500 words (Max of 3000 words) excluding a cover page, tables, and references.
Purpose of this assignment:
The purpose of this assignment is to support the following unit Learning Outcomes (LO) for this unit:
1. Analyze and synthesize information security issues in modern organizations.
2. Demonstrate an understanding of the advantages, disadvantages, threats, and vulnerabilities associated with various IT environments.
3. Demonstrate the concepts, principles, and techniques relating to the security of information.
4. Evaluate the importance of information to organizations and society in general.
5. Identify the ethical and legal issues associated with information security and analyze their implications.
6. Use the Internet to locate information security services.
Task:
Assuming that you are the Security engineer. You are working on a project to implement the cryptography and Key Management solutions for your organization (your choice) against a risk-based approach, answer the following. Select any one of the industry standards of the cryptographic Technology solutions
Your report should address:
• The method of defining the criticality of data as you understand.
• Your knowledge of how the criticality of the Business processes or application / or information, etc. are discovered.
• Your rationale of the selection criteria you adopted.
• How you arrived at the short-list of two (2) relevant solutions.
• Demonstrate your ability to furnish the relevant data to justify your rationale appropriately.
• Demonstrate your ability to write an implementation plan that is instrumental in seeking top management’s approval.
• Demonstrate your ability to write a report that is instrumental in seeking top management’s approval.
• Demonstrate how you have tracked and managed a successful implementation.
Cover/Title Page:
Must show the unit code and title, assignment title, your name, and student number, due date and the title of your topic.
Table of Contents:
Introduction:
Introduce the report, define its scope and state any assumptions. Use in-text references were appropriate.
Main report content
The report should address the task outlined above.
References
A list of end-text references formatted, using APA 6th format. It is recommended that Endnote is used to manage references. Your references should ideally comprise of books, journal articles, and conference papers.
Format
This report should be between 2000 and 2500 words (excluding references and diagrams) and labelled as .docx and should be in a single file.
Your assignments must be word-processed, and the diagrams are developed using graphics software
(most word-processors provide this facility). The text must be no smaller than 12pt and font Times New Roman
Late submission:
Where the assignment is submitted not more than one week late, the penalty shall, for each working day that it is late, be 5% of the maximum assessment available for the assignment; or (b) where the assignment is submitted more than one week late, a mark of zero shall be awarded.
Academic Misconduct (Including Plagiarism):
Academic misconduct of any form as unacceptable. Academic misconduct, which includes but is not limited to, plagiarism; unauthorized collaboration; cheating in examinations; theft of other students works; collusion; inadequate and incorrect referencing; will be dealt with in accordance with Academic Misconduct (including Plagiarism) Policy.
Marking Criteria/Rubric
Student
Assessment Criteria Maximum
Marks Obtained Marks
Formal language Professionally formatted/drawn diagrams Title, Cover page, Page number, etc... Keeping to the required format 5
Introduction 5
The method of defining the criticality of data as you understand. 5
Your knowledge of how the criticality of the Business processes or application / or information, etc. are discovered. 5
Your rationale of the selection criteria you adopted. 5
How you arrived at the short-list of two (2) relevant solutions. 5
Demonstrate your ability to furnish the relevant data to justify your rationale appropriately. 5
Demonstrate your ability to write an implementation plan that is instrumental in seeking top management’s approval. 5
Demonstrate your ability to write a report that is instrumental in seeking top management’s approval. 5
Demonstrate how you have tracked and managed a successful implementation. 5
Lessons learned 5
Report presentation and referencing 5
Total Marks 60
Total Worth [40%]

Comments

Popular posts from this blog

Identify and discuss a key milestone in the history of computers that interests you and why.

  Part 1Title: Lab ResponseDiscuss one feature of MS Word and one feature of MS Excel that you found challenging within the lab and why. Examples are WordArt, inserting shapes, adding borders, cell styles, etc. This response should be at least one paragraph in length. Part 2Title: History of Computers Identify and discuss a key milestone in the history of computers that interests you and why. This section should be at least one paragraph. Part 3Title: System Software vs. Application Software In your words, explain the difference between application software and system software as if to another coworker who has limited technical knowledge. Use examples to support your rationalization. This section should be at least two paragraphs. Part 4Title: Blockchain and Cryptocurrency In a minimum of one paragraph each: 1. Conduct some research on the internet and discuss one underlying technology of cryptocurrencies like blockchain, cryptography, distributed ledger technol...

Cybersecurity and Infrastructure Security (CISA)

 Develop a research paper that identifies a specific Department of Homeland Security (DHS) operating agency. Fully describe 1 DHS operating agency from the following list: Cybersecurity and Infrastructure Security (CISA) U.S. Customs and Border Protection (CBP) U.S. Citizenship and Immigration Services (USCIS) Federal Emergency Management Agency (FEMA) U.S. Coast Guard (USCG) U.S. Immigration and Customs Enforcement (ICE) U.S. Secret Service (USSS) Transportation Security Administration (TSA) The information must include a discussion of the selected DHS agency. Identify the agency’s mission, goals, objectives, and metrics. Conduct an analysis of how these mission areas address the threats or challenges. Recommend agency program priorities among the current set of goals, objectives, metrics, or budget items. Justification of all choices is an essential element of this assignment. Reference all source material and citations using APA format. WE OFF...

Discuss how the project

ord count : no idea 1. You are required to write a report on all project activities involved in all the 10 knowledge areas of project management for the entire project life cycle. You should also include a list of the respective PM documents, for example PM Plan, PM Quality Management Plan, Risk management, Procurement, etc. The report must include the activities that are considered before the project is closed out. 2. Discuss how the project quality management plan can provide adequate standards and controls in managing global teams in projects. Your discussion must provide adequate arguments for the need of cultural awareness and legal issues. Regards, The post Discuss how the project appeared first on My Assignment Tutor . Assignment status :  Resolved by our Writing Team Source@ PrimeWritersBay.com GET THIS PAPER COMPLETED FOR YOU FROM THE WRITING EXPERTS   CLICK HERE TO ORDER 100% ORIGINAL PAPERS AT PrimeWritersBay.com NO PLAGIARISM