The second assignment requires you to apply research skills and
information security management theory to the same organization
that you chose for the first assignment, however, this time you
will focus attention on Risk Management. Read the â€œAssignment
Briefâ€ section first to get a general idea, then complete the
tasks detailed for the assignment.
This assignment aligns with the Course Learning Outcomes #5 â€“ to analyse risk theories and how they are applied to the protection of assets, and #6 â€“ reflect, and critically evaluate ethical issues that relate to the practice of information security. Like the first assignment, this one also aligns with the Universityâ€™s Graduate Attributes in respect of acquiring research skills.
To prepare for this assignment, you need to pre-study chapter 8 â€œRisk Management: Identifying and Assessing Riskâ€ in Whitman & Mattord, 4th edition. This chapter gives you a basic grounding in the subject of risk management.
Assignment 2 In Brief
A variety of tasks are required in this second written assignment, expressed in the four questions you are asked to address. First, read all the questions to get an idea of the overall work, then read the ssignment Formatting Requirements for how to present your work.
Assignment 2 Requirements and Report structure
1. Review your organization (its size, its mission, its place in the market) but this time consider the organization as a whole. In terms of Information Security, identify five potential or real vulnerabilities specific to your organization, and briefly describe each, with reasons for your choice. Remember to discuss the vulnerabilities in terms of your particular organization rather than in general terms. (5 marks)
2. Using the risk management principles outlined in Chapter 8 of Whitman and Mattord, discuss how different risk theories would be applied to the protection of Information assets in your organization. (5 marks)
3. Study Chapter 12, then reflect on, and critically evaluate the Ethical issues applicable to Information Security in general and in particular for your organization, giving due consideration to the various contexts in which the organization operates. For example, you could evaluate the economic, political,social, environment, legal, global position, and employee relations contexts. (15 marks)
4. Using Internet news resources, research three instances of significant breaches in Information Security within industry in the past 10 years. Summarize the nature of the breach, and the consequences for the organization at the time. Finally, clearly articulate in your own words why you think these security breaches occurred in those organisations, being sure to identify the points of failure, and how the breaches could have been avoided.
Other samples, services and questions:
When you use PaperHelp, you save one valuable — TIME
You can spend it for more important things than paper writing.