Modern Day Policing And Society
April 24, 2022
Comprehensive Psychiatric Evaluation and Patient Case Presentation
April 24, 2022

[ad_1]

i want it within 15 hours with turnitin report
Prepared by: Ms Samira Baho Moderated by: A/Prof Tony Jan March, 2019
Assessment Details and Submission Guidelines
Unit Code BN311 – T1 2019
Unit Title IT Security Management
Assessment Type Individual Assignment
Assessment Title Assignment1: Contingency Planning and Security for Organizations
Purpose of the assessment (with ULO Mapping)
This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them. a. Report on the significance of IT security management for organisations
b. Discussing the role of IT security management to support the security of
businesses and corporations
c. Reporting on the security of the existing organisation architecture, data, application, technology, etc
Weight 15% of the total assessments
Total Marks 50
Word limit 1200-1500
Due Date Sunday 28 April 2019, 11:55 PM
Submission Guidelines
 All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.
 The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.
 Reference sources must be cited in the text of the report and listed appropriately at the end in a reference list using IEEE referencing style.
Extension If an extension of time to submit work is required, a Special Consideration Application must be submitted directly through AMS. You must submit this application within three working days of the assessment due date. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies-procedures- and-guidelines/specialconsiderationdeferment
Academic Misconduct
Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about- mit/institute-publications/policies-procedures-and-guidelines/Plagiarism- Academic-Misconduct-Policy-Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description.
http://www.mit.edu.au/abouthttp://www.mit.edu.au/abouthttp://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdefermenthttp://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdefermenthttp://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdefermenthttp://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdefermenthttp://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdefermenthttp://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdefermenthttp://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdefermenthttp://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdefermenthttp://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdefermenthttp://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdefermenthttp://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdefermenthttp://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdefermenthttp://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedurehttp://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedurehttp://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-ProcedureBN311 IT Security Management Page 2 of 4
Prepared by: Ms Samira Baho Moderated by: A/Prof Tony Jan March, 2019
Assignment Specification:
The assignment consists of four questions. Prepare a report for the below sections. Addressing the
requirements of the questions may require use of learning materials accompanied by online search.
You will be applying the learning materials for the appropriate scenarios elaborated in the
questions. All the references from online sources have to be cited at appropriate places in the
report. A list of references should be provided using IEEE referencing style at the end of the report.
Assignment Questions:
Case Study:
Shiba Veg is a famous vegetarian restaurant in Chaple Street, Melbourne. The management would
like to take advantage of technology and introduce on-line booking and payment facility for their
customers. As an InfoSec professional, you are to write a report on the following sections in relation
to the restaurant information security requirement.
Section 1: Contingency Planning
Discuss what contingency planning is appropriate for the restaurant and discuss the issues you
think might arise that would form part of the contingency plan (400 words)
Section 2: Security Tools

Provide three examples of security equipment or tools that you would recommend for the

business and briefly explain why you choose them taking into account the investment cost (500
words)
Section 3: Information Security Act

Explain the main act that outlines the basis for the security of information in Australia and outline

the key points (200 words)
Section 4: Security Management Policy
Using the following template, create a security management policy with defined separation of duties for the business:
Policy Name
Policy Statement
Purpose/Objectives Provide the purpose and objectives of the policy
Scope
BN311 IT Security Management Page 3 of 4
Prepared by: Ms Samira Baho Moderated by: A/Prof Tony Jan March, 2019
Define what areas the policy covers and its scope. What areas of IT are impacted. What elements, IT assets, or organization-owned assets are within the scope of this policy?
Standards Specify all the hardware, software and configuration standards.
Procedures Explain how you intend to implement this policy for the entire organization. This is the most important part of the policy definition as you need to explain and define the separation of duties across the domains of a typical IT infrastructure. All the domains should be as well as who is responsible for ensuring CIA and security policy implementation within that domain. Guidelines Explain any implementation issues you must overcome and how you will overcome them based on the policy guidelines. Any disputes or gaps in the definition and separation of duties and responsibilities needs to be addressed in this section.
Marking Criteria:
Questions Description Marks
Section 1 Components of Contingency Planning
Issues as a part of Planning
5
5
Section 2 Examples of Security tools and Description Justification on selection based on investment cost
5
5
Section 3 Information Security Act of Australia
Key points
5
5
Section 4 Addressing the sections of the template (7 sections) 7 x 2 = 14
Reference style Follow IEEE reference style (should have both in-text citation
and reference list)
6
Total 50
BN311 IT Security Management Page 4 of 4
Prepared by: Ms Samira Baho Moderated by: A/Prof Tony Jan March, 2019
Marking Rubric
Sections Excellent Good Fair Poor
Section 1
Contingency
Planning
Appropriate
requirements of the
plan specified explained
and
Issues identified and listed
Requirements for
the plan specified
and issues
identified and
listed
Not a complete
plan with a few
requirements and
issues
Did not address
sub sections of
the section
Section 2
Security Tools
Addressed the three
tools and explained
briefly as to how they
work and the cost
analysis explained
Addressed the
three tools
however with
minimum
explanation with
cost analysis
Three tools
selected but not
explained and not
provided a
enough
explanation for
the justification
of cost analysis
Not a complete
list of security
tools and missing
explanation of
cost analysis
Section 3
Information
Security Act
Explained the act and
the important key
points
Provided an idea
about the act
with the key
points
Did not provide a
clear picture of
the act with the
key points
included
Missing
explanation and
key points
Section 4
Security
Management
Policy
Addressed all the seven
sections of the policy
with necessary
explanation
Addressed all the
sections and
managed to
explain the
requirements of
the policy
Addressed all
sections with
minimum
information
Missing sections
from the policy
(Incomplete)
The post i want it within 15 hours with turnitin report appeared first on Lion Essays.
 
“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!”

i want it within 15 hours with turnitin report was first posted on April 24, 2019 at 8:28 pm.©2019 “Lion Essays”. Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at support@Lion Essays.com

[ad_2]

Source link

 

"Is this question part of your assignment? We Can Help!"

Essay Writing Service
ORDER NOW