i want it within 15 hours with turnitin report

i want it within 15 hours with turnitin report

Prepared by: Ms Samira Baho Moderated by: A/Prof Tony Jan March, 2019

Assessment Details and Submission Guidelines

Unit Code BN311 – T1 2019

Unit Title IT Security Management

Assessment Type Individual Assignment

Assessment Title Assignment1: Contingency Planning and Security for Organizations

Purpose of the assessment (with ULO Mapping)

This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them. a. Report on the significance of IT security management for organisations

b. Discussing the role of IT security management to support the security of

businesses and corporations

c. Reporting on the security of the existing organisation architecture, data, application, technology, etc

Weight 15% of the total assessments

Total Marks 50

Word limit 1200-1500

Due Date Sunday 28 April 2019, 11:55 PM

Submission Guidelines

 All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.

 The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.

 Reference sources must be cited in the text of the report and listed appropriately at the end in a reference list using IEEE referencing style.

Extension If an extension of time to submit work is required, a Special Consideration Application must be submitted directly through AMS. You must submit this application within three working days of the assessment due date. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies-procedures- and-guidelines/specialconsiderationdeferment

Academic Misconduct

Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about- mit/institute-publications/policies-procedures-and-guidelines/Plagiarism- Academic-Misconduct-Policy-Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description.

http://www.mit.edu.au/about
http://www.mit.edu.au/about
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure
BN311 IT Security Management Page 2 of 4

Prepared by: Ms Samira Baho Moderated by: A/Prof Tony Jan March, 2019

Assignment Specification:

The assignment consists of four questions. Prepare a report for the below sections. Addressing the

requirements of the questions may require use of learning materials accompanied by online search.

You will be applying the learning materials for the appropriate scenarios elaborated in the

questions. All the references from online sources have to be cited at appropriate places in the

report. A list of references should be provided using IEEE referencing style at the end of the report.

Assignment Questions:

Case Study:

Shiba Veg is a famous vegetarian restaurant in Chaple Street, Melbourne. The management would

like to take advantage of technology and introduce on-line booking and payment facility for their

customers. As an InfoSec professional, you are to write a report on the following sections in relation

to the restaurant information security requirement.

Section 1: Contingency Planning

Discuss what contingency planning is appropriate for the restaurant and discuss the issues you

think might arise that would form part of the contingency plan (400 words)

Section 2: Security Tools

  1. Provide three examples of security equipment or tools that you would recommend for the

business and briefly explain why you choose them taking into account the investment cost (500

words)

Section 3: Information Security Act

  1. Explain the main act that outlines the basis for the security of information in Australia and outline

the key points (200 words)

Section 4: Security Management Policy

Using the following template, create a security management policy with defined separation of duties for the business:

Policy Name

Policy Statement

Purpose/Objectives Provide the purpose and objectives of the policy

Scope

BN311 IT Security Management Page 3 of 4

Prepared by: Ms Samira Baho Moderated by: A/Prof Tony Jan March, 2019

Define what areas the policy covers and its scope. What areas of IT are impacted. What elements, IT assets, or organization-owned assets are within the scope of this policy?

Standards Specify all the hardware, software and configuration standards.

Procedures Explain how you intend to implement this policy for the entire organization. This is the most important part of the policy definition as you need to explain and define the separation of duties across the domains of a typical IT infrastructure. All the domains should be as well as who is responsible for ensuring CIA and security policy implementation within that domain. Guidelines Explain any implementation issues you must overcome and how you will overcome them based on the policy guidelines. Any disputes or gaps in the definition and separation of duties and responsibilities needs to be addressed in this section.

Marking Criteria:

Questions Description Marks

Section 1 Components of Contingency Planning

Issues as a part of Planning

5

5

Section 2 Examples of Security tools and Description Justification on selection based on investment cost

5

5

Section 3 Information Security Act of Australia

Key points

5

5

Section 4 Addressing the sections of the template (7 sections) 7 x 2 = 14

Reference style Follow IEEE reference style (should have both in-text citation

and reference list)

6

Total 50

BN311 IT Security Management Page 4 of 4

Prepared by: Ms Samira Baho Moderated by: A/Prof Tony Jan March, 2019

Marking Rubric

Sections Excellent Good Fair Poor

Section 1

Contingency

Planning

Appropriate

requirements of the

plan specified explained

and

Issues identified and listed

Requirements for

the plan specified

and issues

identified and

listed

Not a complete

plan with a few

requirements and

issues

Did not address

sub sections of

the section

Section 2

Security Tools

Addressed the three

tools and explained

briefly as to how they

work and the cost

analysis explained

Addressed the

three tools

however with

minimum

explanation with

cost analysis

Three tools

selected but not

explained and not

provided a

enough

explanation for

the justification

of cost analysis

Not a complete

list of security

tools and missing

explanation of

cost analysis

Section 3

Information

Security Act

Explained the act and

the important key

points

Provided an idea

about the act

with the key

points

Did not provide a

clear picture of

the act with the

key points

included

Missing

explanation and

key points

Section 4

Security

Management

Policy

Addressed all the seven

sections of the policy

with necessary

explanation

Addressed all the

sections and

managed to

explain the

requirements of

the policy

Addressed all

sections with

minimum

information

Missing sections

from the policy

(Incomplete)

The post i want it within 15 hours with turnitin report appeared first on Lion Essays.

 

“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!”


i want it within 15 hours with turnitin report was first posted on April 24, 2019 at 8:28 pm.
©2019 "Lion Essays". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at support@Lion Essays.com

"Get 15% discount on your first 3 orders with us"
Use the following coupon
FIRST15

Order Now