Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Assessment item 2 Assessment Item 2 Value: 25% Due date: 28-Aug-2017 Return date: 18-Sep-2017 Length:2500 Words Submission method options Alternative submission method Task Examine the following case...

1 answer below »
Assessment item 2
Assessment Item 2
Value:25%
Due date:28-Aug-2017
Return date:18-Sep-2017
Length:2500 Words
Submission method options
Alternative submission method
Task
Examine the following case study:
https://www.cpdp.vic.gov.au/images/content/pdf/data_security/ XXXXXXXXXX%20VPDSF%20Framework%20June%202016%20v1.0.pdf
1. Use a diagram (produced by the means of using Rationale, Visio or any other relevant software application of your choice) to illustrate current security risks and concerns considered by the VIC government.
2. Provide detailed explanation of the diagram and identify the areas of: high, medium, medium-low, and low risk exposure.
3. Carry out comparative analysis of the Deliberate and Accidental Threats and rank those threats in order of importance. Justify your rankings not only
Document Preview:

Assessment item 2 Assessment Item 2 Value: 25% Due date: 28-Aug-2017 Return date: 18-Sep-2017 Length: 2500 Words Submission method options Alternative submission method Task Examine the following case study:   HYPERLINK "https://www.cpdp.vic.gov.au/images/content/pdf/data_security/ XXXXXXXXXX%20VPDSF%20Framework%20June%202016%20v1.0.pdf" https://www.cpdp.vic.gov.au/images/content/pdf/data_security/ XXXXXXXXXX%20VPDSF%20Framework%20June%202016%20v1.0.pdf 1. Use a diagram (produced by the means of using Rationale, Visio or any other relevant software application of your choice) to illustrate current security risks and concerns considered by the VIC government. 2. Provide detailed explanation of the diagram and identify the areas of: high, medium, medium-low, and low risk exposure. 3. Carry out comparative analysis of the Deliberate and Accidental Threats and rank those threats in order of importance. Justify your rankings not only on the basis of the case study but also by the means of doing further research and drawing upon other relevant case studies (e.g. Security guidelines for other private and public organizations) that you can identify. 4. While drawing upon theories, tools and patterns covered in the subject as well as your own research, explain the challenges that the VIC government is going to face while deciding on whether security/risk management should be carried out internally or externally (e.g. via outsourcing). 5. Explain the difference between the concepts of ‘’Risk’’ and ‘’Uncertainty’’ (make sure that your discussion is linked to the case considered). 6. Discuss and evaluate (with examples) different approaches available to the VIC government for risk control and mitigation. Rationale This assignment is for students to meet the following learning outcomes. be able to critically analyse the various approaches for mitigating security risk, including when to use insurance to transfer IT risk; be able to critically evaluate IT security risks in terms...

Answered Same Day Dec 26, 2021

Solution

Robert answered on Dec 26 2021
113 Votes
Introduction
In this report we study about Victorian law and data security. The data privacy act was came in
2000, the act as information privacy act 2000. In 2005 data security act was come name of
commission for law enforce security act 2005. In 2014 Victorian law came with the combination
of both data privacy act and data security act.
Cu
ent security risks and concerns considered by the VIC government.

Threats exploit Vulnerabilities



protect against increase increase Expose


Security Controls reduce Security Risks Asset(Data)
met by indicate increase have
Security
Data(Asset) Values
&
Requirements Potential Impacts
DATA PRIVACY AND PROTECTIONS
Data privacy and protection is main issue for every organization..we knew that each information
is important for organization. Data means gather the information in form of data files, payment
detail etc so we expect this act protect the organization regarding the data security. Victoria law
enforce in2014 for privacy security and data security.
DATA PRIVACY AND PROTECTION VALUES (AND POTENTIAL IMPACTS)
The main issue for any company who is doing business the main issue is data privacy and
protection if company respects these two aspects then business may increase. Any organization
needs to provide integrity, security confidentiality.
Data privacy and protection are used interchangeable. Data privacy act secure the personal
information and data protection means protect the data values for business purpose. Hacking is a
ig problem now days due to hacking steel the information by hacker and they misuse it. So data
protection act s punished those people who misuse the information
THREATS
Threats means unwanted entry on computer or due to unwanted events may hack the system and
loss the information. Some events may modification data or application or Co
uption or
modification of a Data privacy and protection (data, applications);
 Theft, removal or loss of an Data privacy and protection (equipment, data, applications);
 Disclosure of a Data privacy and protection (data);
 Inte
uption of services;
 A threat would need to exploit the vulnerability of the Data privacy and protection
Unauthorized entry
The organization most important point is data protection from unauthorized entry is a critical
element of any security system. Important point to be remember Removal of hiding places
ï‚· Compound or facility access control
ï‚· Multiple processes of layer protection
ï‚· Mechanical locking systems
ï‚· Man-passable ba
iers in the open places such as culverts, air vents, and utility openings
ï‚· Remote controlled gates, traffic control, hydraulic ba
iers, anti-ram hydraulic drop arms and
parking control systems.
1. Perimeter intrusion detection systems
ï‚· Alarms
ï‚· Detection devices (infrared, motion, acoustic)
ï‚· Clear zones
ï‚· CCTV and video surveillance technology
2. Data and Information Protection
ï‚· Secure access to networks, hardware, and equipment e.g. telephone and satellite systems
ï‚· Electronic security devices shielding
ï‚· Acoustic shielding
ï‚· Computer screen shields
4. Personal identification systems
ï‚· Tailgating policies
ï‚· Fingerprints, access control, ID cards, biometrics
ï‚· Credentials management
ï‚· Primary and secondary credential systems
Insider Threats
The main threat regarding the security inside people, they can misuse the facility and access the
data. Unlimited access is also problem for security purpose. Standard categories here include
employees or individual they can manage the procedure in proper manner.
The most convenient ways to mitigate risks are:
ï‚· CCTV and video surveillance technology
ï‚· Limited access to sensitive areas
ï‚· Introduction of background checks and personnel reliability policies
ï‚· The use of two-man...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here