logo
  • Measurment and Decision Making
  • IT Networking Designing
  • The Scholarship of Marketing
  • Marketing Strategy and Plan
  • Marketing 301
  • Networking Project
Add File

Files Missing!

Please upload all relevant files for quick & complete assistance.

I accept the T&C and other policies of the website and agree to receive offers and updates.

ISY3006 Information Security

  • Subject Code :

    ISY3006

  • Country :

    AU

  • University :

    Australian Institute of Higher Education

Questions:

Task Unit Learning LO3 - Research, develop, and document a basic security policy, Outcomes Assessed and analyse, record, and resolve all security incidents LO4 - Identify and assess the threats to, and vulnerabilities of networks   Assessment This assessment is designed to help students to research and Description analyze hot topics related to information security. Assignment This is an individual assessment. This report gives you the opportunity to research, formulate, develop and document a basic security policy for a specific organization in Australia Ecxept For Banking/Mortgage organisation. Moreover, you are required to analyze, record, resolve security incidents and identify and assess the threats to, and vulnerabilities of the organisation’s networks. This report will use many of the concepts and techniques discussed in this unit throughout the semester. Please note, you will need to either choose from the list of examples of the industries provided below or come up with your own idea for a chosen specific organisation. Hospital/Medical Centre Supermarket Vehicle rental Tourism agency Hotel/Mote School/University Library Aviation operator Property Management Please discuss your chosen organisation and or ideas with your lecturer before you start your research. You must send the organization that you have chosen to your lecturer by Week 5. Please note you might not be allowed to choose the same or similar specific organisation as other in your class. You should aim at research, develop, and document answers to questions (a.) and (b.) below. Do not copy the examples of information security policies used in class! You should state clearly: the name of the organisation you have chosen the stakeholders of the organisation the nature of the business and answer questions (a) and (b).

logo

Need Instant Assignment Help