+1 (909) 375-5650
4982 Parkway Street, Los Angeles, CA 90017
support@smartwritingservice.com
800-888
Get an Answer

Strategic information security Semester

Strategic information security Semester

Objectives
The course objectives met by this assignment include:
• Course specifications are available online from the USQ website
. Always check the website for the latest version.
Background
This assessment item covers the chapters 5-8 of your textbook. In the previous assessment item you
selected an organisation, and provided information on the current security state and made
suggestions of improvements to their security. Use this organisation for this assessment item as
well. Depending on the size of the organisation (small, medium, large) you are asked to assist in
developing a security program. Reflect on the current roles and titles of the security personnel and
make suggestions of improvements. Provide a plan to make these changes incorporating training
requirements. Determine if the organisation uses any ISO security standards and provide reasoning
which security model would be more suitable. Determine the suitability of certification. Justify by
using threat identification and provide risk assessment for this organisation.
As in the previous assessment item, please make sure NOT to divulge any sensitive information. If
you are working for an organisation, use the internet to determine what information is available to
the public. To protect security of the organisation, you are requested to invent the current security
situation of this organisation. This will allow you to create a scenario that you can then use to apply
your knowledge of the course material.
Write a report in accordance to the recommendations of the links on the study desk. The wordcount
limit for the introduction, body and conclusion of this report is set at about 3000 words. Use
five (5) or more resources for your citing and referencing in Harvard style.
Submission requirements
• Submit your word document through your study desk – a link will be available on the study desk.
CIS8018 – Strategic information security Semester 2, 2012
Page 2 of 3
Marking criteria for research paper 2 – CIS8018
Student name: ___________________________ Student number: ____________________
Marks
Structured development of report
Logical flow leading the reader from start to finish on a clear path of addressing
the assessment requirements; clear identification and description of current
state; clearly leading into the solutions; application of correct report format.
Excellent meets all the requires for this objective 21-30
Good work – minor issue 11-20
Requires more work 5-10
Very poor effort 0-5
Comment:
/30
Depth of research/ critical reflection
Reason to support findings: showing depth of understanding critical security
issues of an organisation; being able to reason for the most suitable security
model, training, roles to address these issues; showed depth of understanding
threat identifications, ISO, model, etc. (chapter 1-4 concepts); selections of
addition journal articles specifically address and support.
Excellent meets all the requires for this objective 21-30
Good work – minor issue 11-20
Requires more work 5-10
Very poor effort 0-5
Comment:
/30
Understanding of key ideas and concepts
Understood the course material; able to identify key ideas and concept within
a real life scenario of issues; able to explain an issue with the use of key ideas
and concepts; able to relate own experience to course material and issue by
introducing own perspective
Excellent meets all the requires for this objective 21-30
Good work – minor issue 11-20
Requires more work 5-10
Very poor effort 0-5
Comment:
/30
CIS8018 – Strategic information security Semester 2, 2012
Page 3 of 3
Evidence of support
Citing and referencing: Correct within text Harvard citing; correct Harvard
referencing; used more than five (5) sources (book, journal article, report, news
article on the internet) in addition to the course text book.
Excellent meets all the requires for this objective 9-10
Good work – minor issue 7-8
Requires more work 4-6
Very poor effort 0-3
Comment:
/10
Total /100
General Comments:

1.0 Abstract1
2.0 Introduction.2
3.0 Literature on information security
4.0 Current security situation of 21st Century Oncology.2
4.1 Program..2
4.2 Risk assessment and control2
4.3 Models.2
5.0 Development of security program..2
5.1 Size of the organisation.2
5.2 Culture.2
6.0 Roles and responsibilities.2
7.0 Suggestions.2
8.0 Plan for training requirements.2
9.0 ISO standards and models.2
10.0 Conclusion.2
References

 

For a custom paper on the above topic or any other topic, place your order now!

What Awaits you:  

  • On-time delivery guarantee
  • Masters and PhD-level writers
  • Automatic plagiarism check
  • 100% Privacy and Confidentiality
  • High Quality custom-written papers

 

Previous ArticleNext Article