Information Security

| November 18, 2015

a

Individual Assignment

Introduction
The aim of the coursework is for you to extend your research into

the material covered in the lectures and apply it to a realistic

scenario.

The key skills you will need to deploy to complete this work

include research, analysis, evaluation, synthesis and design.
Background This assignment is an exercise in the application of knowledge to

an actual organisation and the compilation and presentation of the

findings in the format of a sophisticated report – well edited,
attractive, and professionally laid out and academically sound.
Deliverables

This Individual assignment constitutes 70% of your module mark.

It consists of a single portfolio style document. Late work will be dealt with as

per the university regulations. Please ensure that you:

• Complete and sign the cover sheet
• Submit the work by the due date
• Submit the work as a word document to Moodle.

Write a report/paper of around 3000 to 3500 words and present.
Task The following headings are indicative of what should be

included and provide a guideline:
You are required to assess the information security situation in a
selected company and prepare a security plan that includes

recommendations for improvements. Assume that the selected

company plans to use mobile devices and cloud for storing

important documents and utilizing virtual resources.

You are responsible for overseeing the security of information
from deliberate and accidental threats. Assume some engineers

reported that some of their documents experienced a security

attack recently. Management has directed to undertake some

security analysis and planning to improve the company’s

information security.
You must address at least the following in the report.
1. Identify and describe the main categories of information assets that may be at risk and have to be protected.

2. Appraise the actual and potential threats to and vulnerabilities of the Company’s information assets.

3. Evaluate the challenges in information security related to the use of mobile application.

4. Discuss the factors distinguish mobile security from traditional computer security.
5. Reviews the recent prevention and detection techniques used to protect information at the mobile devices.

6. Analyse the threats and data privacy issues related to the use of cloud.

7. Develop a security plan that describes counter-measures that will manage the threats that put the company’s information assets at risk from a risk management perspective.

8. Develop a comprehensive information security education and awareness programme for use by management, staff and contractors for the selected organisation.

9. Recommendations you can make to improve the information security situation of the company.

10. Presentations in the form of PowerPoint slides
Note:

11. Evidence of your research into the topic (This might be a single article, or you may wish to append citations and references, posts, emails, web pages etc)

12. A critical evaluation of the topics – show us what you think and how you justify your argument or recommendations.
13. Just ensure that you are able to convince your marker that you have been actively researching, reading, and turning your research into decision-level knowledge.

Marking Criteria

You should structure your document to reflect the following marking criteria. Task 1 (70% of module assessment)

• Extent of Clarity in the Classification of information based assets

• Quality and extent of scholarly research and critical evaluation of the threats and vulnerabilities

• Organisation and presentation of the security plan/policies

• Appropriateness of the controls based on reasonable assumptions.

• Evidence of thorough research into legal and financial issues/constraints

• Effectiveness of the recommendations/best practices for the organization

• Presentation using PowerPoint slides

The criteria will be graded as follows:

Evidence of research Critical evaluation Overall
100
85 Shows evidence of Shows clear evidence of Work of a very high
80 extensive investigation of reflective thinking about the standard
75 relevant concepts, issues presents a clear and
70 technologies and issues. relevant argument. Substantial
Presentation of data, originality of thinking.
arguments and decisions
in a very useful form.
68
66 Shows evidence of Shows reasonable evidence of Work of good quality
64 investigation of relevant reflective thinking about the
60 concepts, technologies issues with adequate evaluation.
and issues. Presentation
of data, arguments and
decisions in a useful form.

58 Reasonable level of Adequate evaluation, lacking in Acceptable and
56 investigation. depth of reflective thinking with adequate work
54 respect to major points.
50
48 Less adequate research Largely descriptive, with little Work with some merit
46 into the relevant concepts, reflective thinking. but at the lower end
45 technologies and issues. only just achieving
what is required.
44
42 Poor research. Clear signs of understanding, but The work is only just
40 Inadequate, inaccurate or reflection and analysis is poor. acceptable in its
irrelevant treatment of the present form.
issues.
38
Lack of evidence of No discernible reflection or The work is deemed
35 research evaluation inadequate.
30
20
0
Report

Please don’t get too hung up on formats and styles. We are obliged to establish assessment criteria and then mark you upon how well (or otherwise) you meet those criteria. In turn, our assessment of you will be scrutinised by the external examiners, so we must be able to defend the marks we award. We will be far more impressed by a student who demonstrates their active participation, interest and understanding of the module subject matter than by a meticulously presented submission. Please don’t worry if the style, format and length of your individual assignment are totally different to your friend’s. That’s not only OK, it’s encouraged.
• Work submitted up to 1 week (5 working days) after the due date for submission will lose 10% of the mark (after internal moderation).

• Work submitted after this, but up to 2 weeks (10 working days) late will lose 20% of the overall mark.

• Work tendered for submission more than 2 weeks (10 working days) after the due date will not be accepted and an absence will be recorded for the assessment concerned. This will count as a failed attempt and may result in you failing the module overall.

Plagiarism policy: Please refer to the plagiarism policy in the MSc-IT student handbook.
PG-IS-ASSIGNMENT-ECM84CS-FALL15
Marking Criteria Individual Assignment

Name of the Student: ID No:
Name of the assessor:
Date Submitted: ___-Jan-2016 Date Assessed: __-Jan-2016

Please rate each of the criteria below on a scale of 0(absent/complete lack of understanding/no ability demonstrated) to 10 (complete mastery/highest level of ability demonstrated).
Criteria Grade
#
1 Extent of Clarity in the Classification of information based 0 1 2 3 4 5 6 7 8 9 10
assets
2 Quality and extent of scholarly research and critical 0 1 2 3 4 5 6 7 8 9 10
evaluation of the threats and vulnerabilities
3 Evaluate the challenges in information security related to the 0 1 2 3 4 5 6 7 8 9 10
use of mobile application.
4 Discuss the factors distinguish mobile security from 0 1 2 3 4 5 6 7 8 9 10
traditional computer security.
5 Reviews the recent prevention and detection techniques 0 1 2 3 4 5 6 7 8 9 10
used to protect information at the mobile devices.
6 Analyse the threats and data privacy issues related to the 0 1 2 3 4 5 6 7 8 9 10
use of cloud.
7 Evaluate of an existing security plan. 0 1 2 3 4 5 6 7 8 9 10
8 Develop a comprehensive information security education and 0 1 2 3 4 5 6 7 8 9 10
awareness programme.
9 Effectiveness of the recommendations/best practices for the 0 1 2 3 4 5 6 7 8 9 10
organization.

10 Presentation skills. 0 1 2 3 4 5 6 7 8 9 10

PG-IS-ASSIGNMENT-ECM84CS-FALL15

Get a 5 % discount on an order above $ 150
Use the following coupon code :
2018DISC
Women living in Poverty with Mental Illness
macroeconomics

Category: Completed Assignments

Our Services:
Order a customized paper today!