As your success in network design an fixing certain security issues has been recognised, the company has asked you to support the preparation of an IT security plan for SS Ltd.
To do this work effectively, you will need to:
This needs to cover technical measures, staff working arrangements and responsibilities, and how the effectiveness of the plan will be checked (audits). Also, consider how the plan may develop into the future and the things which may require the plan to be updated. To support your recommendations, you will need to identify relevant legislation and the resulting company and individual responsibilities arising from these laws. You must also identify the impact on HR (organisational/contractual) matters, including how your IT security policy will be disseminated within the organisation (training, etc.).
Task no. |
Learning Outcome |
Assessment Criteria |
In this assessment you will have the opportunity to present evidence that shows you are able to: |
1 |
Understand risks to IT security. |
1.1 |
Identify and evaluate types of security risks to organisations. |
1 |
1.2 |
Evaluate organisational security procedures. |
|
2 |
Understand mechanisms to control organisational IT security |
2.1 |
Discuss risk assessment procedures |
2 |
2.2 |
Evaluate data protection processes and regulations as applicable to an organisation |
|
2 |
2.3 |
Analyse physical security issues for an organisation |
|
3 |
Be able to manage organisational security |
3.1 |
Design and implement a security policy for an organisation. |
3 |
3.2 |
Evaluate the suitability of the tools used in an organisational policy |
|
3 |
3.3 |
Discuss the human resources issues that have to be considered when carrying out audits. |
Task no. |
Task |
1 |
Understand risks to IT security |
2 |
Understand mechanisms to control organisational security |
3 |
Be able to manage organisational security |
Evidence checklist |
Summary of evidence required by student |
Task 1 |
Evaluate business risk generally and in relation to SS Ltd. In particular see SS documents. |
Task 2 |
Explain the risk assessment process, giving examples. |
Task 3 |
Prepare a presentation for SS Ltd. staff training on the new IT security policy. |
Why do so many teachers and teacher education programs utilize the “Heroes and Holidays/Tourist” approach to Multicultural Education?
Read MoreOutline and discuss the key social and environmental challenges that corporations are called upon to integrate when seeking to achieve their economic value chain goals?
Read MoreDiscuss why a Chi-Square goodness of fit is important. Provide real world examples related to your major to support your discussion.
Read MoreExplore the impact of consumer culture change our lifestyle and accelerate climate change
Read Morehttps://w4writers.com/identify-issues-you-may-need-to-negotiate-and-determine-the-style-you-will-use-to-handle-the-conflict-and-your-expectations-at-each-step-of-the-negotiation-process/
Read MoreIdentify the steps the project manager should take to acquire a well-balanced team for this project. What are some strategies to work around resource constraints?
Read MoreIdentify issues you may need to negotiate and determine the style you will use to handle the conflict and your expectations at each step of the negotiation process.
Read MoreHow would you handle the situation similarly/ differently than the peer you are replying to?
Read MoreHow did Naval expeditions of discovery enabled the United States to expand its commercial, scientific, and diplomatic strategic objectives? What was significant about Lieutenant Charles Wilkes naval expeditions?
Read MoreDevelop a Business Continuity Program Briefing Document
Read More