Trusted by Students Everywhere
Why Choose Us?
0% AI Guarantee

Human-written only.

24/7 Support

Anytime, anywhere.

Plagiarism Free

100% Original.

Expert Tutors

Masters & PhDs.

100% Confidential

Your privacy matters.

On-Time Delivery

Never miss a deadline.

The Assignment :   professional report for a company on the subject of information security

Computer Science Feb 27, 2023

The Assignment :

 

professional report for a company on the subject of information security .  The following are the tasks you must complete. For the company CISCO.

 

COMPANY BACKGROUND 

Provide a 'sense' of the organisation - background and size of the company its' industry and competitor market place and products and /or services and some use of systems.  List some of the business objectives (4 to 6) .

 

DATA RELEVANCE TO COMPANY 

A brief and concise explanation of what the importance of data and information to the company is - (how and why) , its benefits and disadvantages. You may consider the V's from big data as a starting point.

 

INFORMATION SECURITY FRAMEWORK

 

Identify an information security model that the organisation could benefit from-explaining the model (mind map or structure diagram) and its suitability to the organisation. Your identification and discussion must consider at least people, activities, technology, and network and Data as assets that must be secured. Although the focus will be on data.

 

RISK ASSESSMENT MANAGEMENT (BIA)

5.1Identify a risk management approach and explain its stages and steps. 

5.2 Conduct a risk assessment against known threats and identify how they could impact the company with likelihood and degree of impact on the company and processes and also indicate what effect that could have on the products and services offered by the company.

5.3 Briefly discuss what you could put in place to deal with incidents to allow for the business to a) respond initially and b) to continue to normal business resumption.#

 

INFORMATION SECURITY POLICY 

Create an outline / template for an Information security policy document with selected detail and example policies for 

6.1 the legal/compliance aspects and 

6.2 Provide a range of examples of access control policies for example as email policy, password policy, bring your own device policy etc, to mitigate different information security risks in an organization

Expert Solution

For detailed step-by-step solution, place custom order now.
Need this Answer?

This solution is not in the archive yet. Hire an expert to solve it for you.

Get a Quote
Secure Payment