Part 1- Introduction The report contains the...
SIT763 IT Security Management Of Proof Reading Services
This subject about enhancing organizational level privacy programs based on Ethical Reasoning.
Information Privacy is an important information security issue of management that can cause significant challenges to an organization.
Assessment 1: Individual Problem Solving
Marks:This assignment has 10% marks for this unit.
Word limit:Total word count for this assignment is 1000-1500 words.
In this assignment, you will be focusing on these unit learning outcomes (ULOs):
ULO2: Assess security risks, threats, and vulnerabilities to the organization and implement applicable information security protection mechanisms by assessing requirements, plans, and IT security policies.
In this task, you are required to show the ability to conduct an investigation of security management issues in corporate organizations based on the background information provided below and write a report.
In your report, you will be required to follow prescribed procedures to evaluate risk levels and the potential impact of threats and vulnerabilities on a hypothetical organization. You will be assessed on your ability to identify and prioritize the security risks, threats, and vulnerabilities to an organization.
In Course 1 of SIT763, you looked at the Cyber Security and SMEs (Small and Medium Sized Enterprises).
In light of this, your security company has been hired by a government body to undertake a security review in relation to SMEs.
This body would like you to write a consultancy paper about cybersecurity risks. Your report should address the following:
1. What common cybersecurity risks, threats, and vulnerabilities do SMEs face?
2. Based on what we’ve covered so far and your additional research of the literature, what solutions do you propose?
Your task is to evaluate common security risks, threats, and vulnerabilities to an SME and implement applicable information security protection mechanisms by studying requirements, plans and IT security policies.
You may also want to reflect on how cybersecurity issues relating to SMEs are unique. Those provided in your prescribed reading list) and reference them.
What to do now?
a. Start collecting and researching information.
b. Think creatively.
c. Develop the report in Microsoft Word format.
d. Look at the assessment rubric and the unit learning outcomes to ensure that you understand what you are being assessed (and marked) on.
e. The problem-solving task should be between 1000-1500 words (not including references).
Below is an example of how you may structure your 1000-1500 word report.
a. Executive summary and description of an SME (150 words)
b. Cybersecurity risk assessment (600 words) including an assessment of the common cybersecurity risks, threats, and vulnerabilities that face SMEs.
c. Security strategy (600 words) outlining a proposed cybersecurity strategy for SMEs that may contain technical, policy, human and governance solutions.
d. Summary (150 words)
e. References that you have used not included as part of the word count.
Challenges that students may face in this assignment
Students may face several challenges and feedbacks in this IT Security Management Assignment like lack of programming skills, insufficient time, evaluating common security risks implement applicable information security protection etc. To resolve students’ problem, we provide necessary help and academic guidance so that they can improve their grades.