Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / The Assignment :   professional report for a company on the subject of information security

The Assignment :   professional report for a company on the subject of information security

Computer Science

The Assignment :

 

professional report for a company on the subject of information security .  The following are the tasks you must complete. For the company CISCO.

 

COMPANY BACKGROUND 

Provide a 'sense' of the organisation - background and size of the company its' industry and competitor market place and products and /or services and some use of systems.  List some of the business objectives (4 to 6) .

 

DATA RELEVANCE TO COMPANY 

A brief and concise explanation of what the importance of data and information to the company is - (how and why) , its benefits and disadvantages. You may consider the V's from big data as a starting point.

 

INFORMATION SECURITY FRAMEWORK

 

Identify an information security model that the organisation could benefit from-explaining the model (mind map or structure diagram) and its suitability to the organisation. Your identification and discussion must consider at least people, activities, technology, and network and Data as assets that must be secured. Although the focus will be on data.

 

RISK ASSESSMENT MANAGEMENT (BIA)

5.1Identify a risk management approach and explain its stages and steps. 

5.2 Conduct a risk assessment against known threats and identify how they could impact the company with likelihood and degree of impact on the company and processes and also indicate what effect that could have on the products and services offered by the company.

5.3 Briefly discuss what you could put in place to deal with incidents to allow for the business to a) respond initially and b) to continue to normal business resumption.#

 

INFORMATION SECURITY POLICY 

Create an outline / template for an Information security policy document with selected detail and example policies for 

6.1 the legal/compliance aspects and 

6.2 Provide a range of examples of access control policies for example as email policy, password policy, bring your own device policy etc, to mitigate different information security risks in an organization

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE