Information Security Management

Project description
Learning Outcomes
1. Undertake basic information security management tasks
2. Contribute towards the development and implementation of appropriate measures for the
management of information security.
3. Contribute towards the development of a business organisation’s computer incident
response and disaster recovery plans.
Professional Skill Outcomes
1. Contribute to a corporate information security management policy committee.
2. Contribute to a corporate business continuity policy committee.
3. Assist in the formulation and implementation of a policy to accommodate corporate
information security requirements.
4. Contribute to corporate due diligence and governance processes relating to information
security activities.
5. Undertake the necessary documentation associated with basic information security
management tasks.

Assignment 1 Background
Corporate businesses are realising the significance of the challenges they face trying to
understand not only their own vast stores of data and the extraordinary amount of data that flows
in and around their businesses, but also the potential value of this data. Business information
security contingency planning must of necessity rely on appropriate measures to ensure data
confidentiality, availability, and integrity.
You are an employee of a large international organisation operating from the Perth central
business district where you are a member of the Information Security Group. Your direct line
manager is the Chief Information Security Officer; he in turn is responsible to the Chief
Information Officer. The Chief Information Officer has been requested by the Chief Executive
Officer to investigate what tools, techniques, and methods are currently considered best practice
for managing the business continuity components of corporate data.

Your Task
You have been tasked with investigating the topic and delivering a concise appraisal. Your
appraisal should include basic analysis (strengths, weaknesses, opportunities, and threats); policy
considerations; software tools; certifications; techniques; and methods.
You and the CISO are busy people and understand that nobody has the time to read long winded
reports. The CISO has instructed you to keep it simple, just give her the facts. With this in mind,
your report will probably consist of two to three pages together with a list of references and the
required data presented in either a set of tables or an attached spreadsheet. The CISO values your
contribution and asks for your impressions as to which of the programs you think could be most
beneficial to the company.

READ ALSO :   Intelligence and Homeland Security

Report
Presentation of collected Data: logical flow, easy to understand, balanced,
complete, suitable as an appendix to later reports and presentations.

Introduction, Findings, and Conclusion with
appropriate language and grammar.

PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET AN AMAZING DISCOUNT 🙂