Organisational Systems Security Assignment 2 tips (available on Wiki also)

Slides:



Advertisements
Similar presentations
Patient Movement in the Midst of a Disaster
Advertisements

Apples Physical, Technological and Human Resources
Assessment Literacy Series
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Service Design – Section 4.5 Service Continuity Management.
Security Controls – What Works
Factors to be taken into account when designing ICT Security Policies
1 Risk management and Investigation Peter Roberts
Developing Tools for the Random Selection Process Brian Baker (Cambridge Systematics) & Mike Redington (US DOT/Volpe Center) 1.
Session 3 – Information Security Policies
1 Performance Auditing  In IT Environment  Evidence Gathering & Analysis Techniques  Computer Assisted Techniques  Use of IDEA.
ICT School Policies 6 th November Suggested Policies for Schools Not always a requirement, but useful to cover you, your school and the students.
Essays & Assignments Planning Study Skills Workshops 2014.
Introduction to Information System Development.
PowerPoint Introduction Data Service Center. What is PowerPoint n Software program n Creates professional presentations n Creates creative presentations.
Evolving IT Framework Standards (Compliance and IT)
Level 2 IT Users Qualification – Unit 1 Improving Productivity
Describe How Software and Network Security Can Keep Systems and Data Secure P3. M2 and D1 Unit 7.
Customer Service and Organisational Procedures
What do you think? an advert in the KM reads “Childminder required: preferably a young Spanish woman, must be qualified and bilingual.” * is the employer.
Cyber Security & Fraud – The impact on small businesses.
1 BTEC HNC Systems Support Castle College 2007/8 Systems Analysis Lecture 13 Post-Implementation Training.
PowerPoint Presentation for Dennis, Wixom & Tegarden Systems Analysis and Design Copyright 2001 © John Wiley & Sons, Inc. All rights reserved. Slide 1.
Information Systems Security Operations Security Domain #9.
13.6 Legal Aspects Corporate IT Security Policy. Objectives Understand the need for a corporate information technology security policy and its role within.
UNIT 15 WEEK 9 CLASS 1 LESSON OVERVIEW Pete Lawrence BTEC National Diploma Organisational System Security.
Mr C Johnston ICT Teacher BTEC IT Unit 05 - Lesson 12 Network Security Policy.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 1 Slide 1 Professional and ethical responsibility l Software engineering involves wider.
1 Construction Chapter Key Concepts Be familiar with the system construction process. Understand different types of tests and when to use Understand.
Chapter 11: Policies and Procedures Security+ Guide to Network Security Fundamentals Second Edition.
Introduction to Information Security
SecSDLC Chapter 2.
Developing Tools for the Random Selection Process Brian Baker (Cambridge Systematics) & Mike Redington (US DOT/Volpe Center)
M ORAL AND ETHICAL ISSUES. Use and Abuse of Personal and Private Data All the information stored on Computer is governed by law or legislation. The main.
? Moral principles of right and wrong Used by individuals/organisations To guide behaviour.
Welcome to the ICT Department Unit 3_4 Code of Conduct.
Unit 1 Government, Policies and the public services
Operational Issues. Operational Changes It is important to organisations to ensure that they abide by the Law when caring for the safety of their employees,
ONLINE TOPIC Legislation & Codes of Practice. This PowerPoint will support you in working through the requirements of Theory Assignment 2: ‘Identify the.
SEC 420 Entire Course (UOP) SEC 420 Week 1 DQ 1 (UOP)  SEC 420 Week 1 Individual Assignment Responsibilities of Personal Protection Officers Paper 
Equality, Diversity and Rights BTEC Care/Health Studies.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 7 EMPLOYMENT CONTRACTS & CODES OF CONDUCT.
SEC 420 aid Expect Success/sec420aiddotcom FOR MORE CLASSES VISIT
SEC 420 UOP professional tutor / sec420dotcom.  SEC 420 Entire Course (UOP)  SEC 420 Week 1 DQ 1 (UOP)  SEC 420 Week 1 Individual Assignment Responsibilities.
Welcome to the ICT Department Unit 3_5 Security Policies.
Governance, Risk and Ethics. 2 Section A: Governance and responsibility Section B: Internal control and review Section C: Identifying and assessing risk.
Review of IT General Controls
Project Management Business Management.
REPORT WRITING.
Unit 13 IT Systems Troubleshooting and Repair Anne Sewell
Sample Presentation. Slide 1 Info Slide 2 Info.
Unit 7 – Organisational Systems Security
BIS 221 Education for Service-- tutorialrank.com
CMGT 431 STUDY Education for Service- -cmgt431study.com.
Handout 6: Unit assessment preparation
PT2520 Unit 9: Database Security II
Unit 7 – Organisational Systems Security
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
Unit 3 Information Systems
فلوشیپ اخلاق زیست پزشکی استادیار دانشگاه علوم پزشکی ایران
Cambridge TECHNICALS- LEVEL 3
Natural Disaster Brochure
Operational procedures for preventing misuse
Handout 9: Organisational policies and procedures
How it affects policies and procedures
Why important? Heavy reliance on IT Pressure to deliver IT services Increasing range of threats.
Induction Checklist Contact your mentors within 3 days of them expressing interest Match your mentors with your mentees using our filtered search tool.
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

Organisational Systems Security Assignment 2 tips (available on Wiki also)

Task 1 – Disaster Recovery (P5) Pick a disaster,i.e fire flood (not extreme as in earthquake or tsunami) List discovery plan in steps on PowerPoint slides as to how to recover (add additional info in notes as required) Think about the systems… initial plan.. Assessment of damage etc, middle road and then long term… Security Policies (session 13 for a guide)

Task 2 – Link legislation to tools and policies (P6/P7) Start by looking at legislation (law) handout (session 14) Match it with the security policy, that helps to ensure legislation is met (session 11 employment contracts and codes of conduct and session 13 for security policies) See sample slide for example layout

Eg. Computer Misuse Act Explain what this act covers in your own words. Then explain which security policy/contract/tools will cover this in an organisation (P6) – maybe use a table with 2 columns Use additional notes to explain how Contract of Employment, Codes of Conduct should include rules or guidelines See notes…. (P7)

Task 2 Full Example Legislation Computer Missus Act covers……… and ……… …… Security Policy Updating Security Procedures & Scheduling Security Audits Security audits – physical & networked systems – at regular intervals

Task 3 – Systems accessed without damaging data Read PowerPoint again in session 2 – Network Analysis Software Choose 2 different threats whereby information can be accessed without damage – i.e Scanners This is a MERITt question so a certain amount of research and understanding is required.

Task 4 – (D2) – Assess acceptable behaviour Suggested layout – REPORT Assess behaviour Research professional bodies and discuss what they consider to be acceptable behaviour. (session 13 – Security Policies lists professional bodies) Evaluate the usefulness – give your opinion of what works – DISTINCTION question requires that you understand, research and compare in order to give your opinion