ISY3006 Information Security Report

Assessment Type Group Report
Assessment Number Assessment four
Assessment Name Report
Unit Learning LO3 - Research, develop, and document a basic security policy,
Outcomes Assessed and analyse, record, and resolve all security incidents
  LO4 - Identify and assess the threats to, and vulnerabilities of networks
Due Date and Time Week 5 by Thursday 5:00pm
Weighting 25%
Assessment This assessment is designed to help students to research and
Description analyze hot topics related to information security.
Detailed Submission Submit a word document through Turnitin in the unit Moodle
Requirements page

Assessment Details

Total Marks: 25
Length Minimum = 2,500 words +/- 10%
Report Type Group Report

 Assignment

This is a group assessment. Students are to form groups of 4-5 members. This report gives you the opportunity to collaborate, research, formulate, develop and document a basic security policy for a specific organization in Australia ECXEPT for BANKING/MORTGAGE organisation. Moreover, you are required to analyze, record, resolve security incidents and identify and assess the threats to, and vulnerabilities of the organisation’s networks. This report will use many of the concepts and techniques discussed in this unit throughout the semester.

Please note, you will need to either choose from the list of examples of the industries provided below or come up with your own idea for a chosen specific organisation.

Hospital/Medical Centre Supermarket

Vehicle rental Tourism agency Hotel/Motel

School/University Library

Aviation operator Property Management

Please discuss your chosen organisation and or ideas with your lecturer before you start your research. You must send the organization that you have chosen to your lecturer by Week 3. Please note you might NOT be allowed to choose the same or similar specific organisation as other in your class. You should aim at research, develop, and document answers to questions (a.) and (b.) below. Do not copy the examples of information security policies used in class!

You should state clearly:

the name of the organisation you have chosen(Aviation operator /Virgin Airlines Australia)

 the stakeholders of the organisation

the nature of the business

These above can be discussed in Background and Introduction sections. It is recommended to use a sub- heading for stakeholders of the organisation.

and

answer questions (a) and (b).

Questions:

(a.) Strategic Security Policy: Research, formulate, develop and document a strategic security policy for your chosen organisation based on the nature of the organisation and the stakeholders in the organisation.

(b.) Based on the security policy you have researched, formulated, developed and documented in the item (a.) above, identify and assess the potential threats and vulnerabilities of the company’s network and discuss how such threats and vulnerabilities can be mitigated based on your research.

Referencing and Plagiarism

All information in the report should be in your own words and not copied from other sources. Any idea used should be referenced appropriately according to AIH policies and procedures. The report will be submitted through Turnitin and similarities may attract large penalties according to AIH policies and procedures.

It is essential to use IN TEXT referencing. If you are using the exact words from a reference then you must use quotation marks.

You can use Harvard Style referencing with numbers, with a listing at the end of the report. Microsoft Word has an EndNote plugin that makes this style very easy and clear to follow. https://library.sydney.edu.au/subjects/downloads/citation/Harvard_Complete.pdf

DO NOT COPY AND PASTE FROM THE INTERNET OR COPY OTHER STUDENTS’ WORK!

Submission

You are required to submit a digital copy of the report to Turnitin on Moodle by Week 5 Thuesday, 5pm.

You will NOT need to submit a hard copy.

Late submissions will attract a 5% late penalty (of the maximum mark) per day (or part thereof) as per the late submission policy.

Report Structure

Cover Page - your group members’ names, IDs, subject, date, report title and WORD COUNT

Executive Summary

Table of Contents - listed sections (and sub-sections if required)

Introduction - Brief and clear introduction (includes stakeholders of the organisation – use a subheading)

Body – (three sections – Strategic Security Policy; Typical Threats and Vulnerabilities; Mitigation Strategies)

Conclusion

References-listing of all cited literature. A small number of high-quality references strategically used is the main aim here.

Formatting Guide

Font: Times New Roman 12pt for paragraph text, 14pt bold for headings, with single paragraph breaks between paragraphs.

Line Spacing: 1.5, Margins: 2cm all around

Alignment: left-aligned.

Page numbering: Insert page number

Expert's Answer

Chat with our Experts

Want to contact us directly? No Problem. We are always here for you

Professional

Online Tutoring Services

17,148

Orders Delivered

4.9/5

5 Star Rating

748

PhD Experts

 

Amazing Features

Plagiarism Free

Top Quality

Best Price

On-Time Delivery

100% Money Back

24 x 7 Support

Ask a New Question
*
*
*
*
*

TOP

  Connect on WHATSAPP: +61-416-195006, Uninterrupted Access 24x7, 100% Confidential

X