As your success in network design an fixing certain security issues has been recognised, the company has asked you to support the preparation of an IT security plan for SS Ltd.
To do this work effectively, you will need to:
This needs to cover technical measures, staff working arrangements and responsibilities, and how the effectiveness of the plan will be checked (audits). Also, consider how the plan may develop into the future and the things which may require the plan to be updated. To support your recommendations, you will need to identify relevant legislation and the resulting company and individual responsibilities arising from these laws. You must also identify the impact on HR (organisational/contractual) matters, including how your IT security policy will be disseminated within the organisation (training, etc.).
|
Task no. |
Learning Outcome |
Assessment Criteria |
In this assessment you will have the opportunity to present evidence that shows you are able to: |
|
1 |
Understand risks to IT security. |
1.1 |
Identify and evaluate types of security risks to organisations. |
|
1 |
1.2 |
Evaluate organisational security procedures. |
|
|
2 |
Understand mechanisms to control organisational IT security |
2.1 |
Discuss risk assessment procedures |
|
2 |
2.2 |
Evaluate data protection processes and regulations as applicable to an organisation |
|
|
2 |
2.3 |
Analyse physical security issues for an organisation |
|
|
3 |
Be able to manage organisational security |
3.1 |
Design and implement a security policy for an organisation. |
|
3 |
3.2 |
Evaluate the suitability of the tools used in an organisational policy |
|
|
3 |
3.3 |
Discuss the human resources issues that have to be considered when carrying out audits. |
|
Task no. |
Task |
|
1 |
Understand risks to IT security |
|
2 |
Understand mechanisms to control organisational security |
|
3 |
Be able to manage organisational security |
|
Evidence checklist |
Summary of evidence required by student |
|
Task 1 |
Evaluate business risk generally and in relation to SS Ltd. In particular see SS documents. |
|
Task 2 |
Explain the risk assessment process, giving examples. |
|
Task 3 |
Prepare a presentation for SS Ltd. staff training on the new IT security policy. |
Business Economics Assignment 3: Case Study Analysis on Price Controls in Pharma and Monopoly Power in Airline Industry
Read MoreCSC408 MIS Case Study Assignment Report: Analysis of Issues and Solutions in Information Systems
Read MoreScientific Research Review Assignment 4: Advancements and Ethical Practices in Your Study Area Literature Synthesis
Read MoreOrganizational Development Assignment: Tech Solutions Inc. Case Study on Engagement, Retention, and Inclusive Culture
Read MoreHPGD3103 Instructional Technology Assignment: ASSURE Model-Based Lesson Design in Google Classroom
Read MoreAI Deepfake Cybersecurity Assignment: Evaluating Security Risks and Detection Techniques for Safe Digital Environments
Read MoreMGT4216E Strategic Innovation Management Assignment: Exploring Innovation Capabilities, Strategy Stages, and Leadership for Business Transformation
Read MoreEmployee Engagement & HR Strategy Assignment: Case Analysis of Tech Solutions Inc. on Turnover, D&I, Performance, and Work-Life Balance
Read MoreHigher Education Reform Assignment: Curriculum Development Strategies for a Future-Ready Malaysia
Read MoreCross-Cultural Management Assignment Report: Importance, Challenges & Strategies in Global Teams
Read More