Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Unit Name/Code ISY3006 Information Security Assessment Type Report Assessment Number Assessment Three Assessment Name Report Unit Learning LO3 - Research, develop, and document a basic security...

1 answer below »
Unit Name/Code ISY3006 Information Security
Assessment Type Report
Assessment Number Assessment Three
Assessment Name Report
Unit Learning LO3 - Research, develop, and document a basic security policy,
Outcomes Assessed and analyse, record, and resolve all security incidents
LO4 - Identify and assess the threats to, and vulnerabilities of
networks

Due Date and Time Friday, 31 January, 2020 by 5:00pm
Weighting 20%
Assessment This assessment is designed to help students to research and
Description analyze hot topics related to information security.
Detailed Submission Submit a word document through Turnitin in the unit Moodle
Requirements page



Assessment Details

Total Marks: 20
Length Minimum = 1,800 words Maximum = 2,200 words
Report Type Individual Report


Assignment

This is an individual assessment. This report gives you the opportunity to research, formulate, develop
and document a basic security policy for a specific organization in Australia ECXEPT for
BANKING/MORTGAGE organisation. Moreover, you are required to analyze, record, resolve security
incidents and identify and assess the threats to, and vulnerabilities of the organisation’s networks. This
eport will use many of the concepts and techniques discussed in this unit throughout the semester.

Please note, you will need to either choose from the list of examples of the industries provided below or
come up with your own idea for a chosen specific organisation.

Hospital/Medical Centre
Supermarket
Vehicle rental
Tourism agency
Hotel/Motel



Australian Institute of Higher Education
CRICOS Provider Code: 03147A
Level 3 & 4 545 Kent Street Sydney NSW 2000 Australia
T: XXXXXXXXXXW: www.aih.nsw.edu.au
http:
www.aih.nsw.edu.au






School/University
Li
ary
Aviation operator
Property Management
Please discuss your chosen organisation and or ideas with your lecturer before you start your research.
You must send the organization that you have chosen to your lecturer by Week 5. Please note you might
NOT be allowed to choose the same or similar specific organisation as other in your class. You should aim
at research, develop, and document answers to questions (a.) and (b.) below. Do not copy the examples of
information security policies used in class!
You should state clearly:
the name of the organisation you have chosen
the stakeholders of the organisation
the nature of the business and
answer questions (a) and (b).
Questions:

(a.) Research, formulate, develop and document a strategic security policy for your
chosen organisation based on the nature of the organisation and the stakeholders
in the organisation.
(b.) Based on the security policy you have researched, formulated, developed and documented
in the item (a.) above, identify and assess the potential threats and vulnerabilities of the
company’s network and discuss how such threats and vulnerabilities can be mitigated
ased on your research.


Referencing and Plagiarism
All information in the report should be in your own words and not copied from other sources. Any idea used
should be referenced appropriately according to AIH policies and procedures. The report will be submitted
through Turnitin and similarities may attract large penalties according to AIH policies and procedures.
Please refer to the AIH Academic Misconduct Policy: http:
www.aih.nsw.edu.au/content/1-home/8-
more-info-tabs/3-official-policies/academic-misconduct-policy.pdf
It is essential to use IN TEXT referencing. If you are using the exact words from a reference then
you must use quotation marks.
You can use Harvard Style referencing with numbers, with a listing at the end of the report. Microsoft
Word has an EndNote plugin that makes this style very easy and clear to follow.
https:
li
ary.sydney.edu.au/subjects/downloads/citation/Harvard_Complete.pdf



Australian Institute of Higher Education
CRICOS Provider Code: 03147A
Level 3 & 4 545 Kent Street Sydney NSW 2000 Australia
T: XXXXXXXXXXW: www.aih.nsw.edu.au
http:
www.aih.nsw.edu.au







DO NOT COPY AND PASTE FROM THE INTERNET OR COPY OTHER STUDENTS’ WORK!

Submission
You are required to submit a digital copy of the report to Turnitin on Moodle by Friday, 31st January, 2020.
You will NOT need to submit a hard copy.
Late submissions will attract a 5% late penalty (of the maximum mark) per day (or part thereof) as per
the late submission policy.

Report Structure
Cover Page - your name, ID, subject, date, report title and WORD COUNT
Executive Summary
Table of Contents - listed sections (and sub-sections
if required) Introduction - Brief and clear introduction
Body
References-listing of all cited literature. A small number of high-quality references strategically used
is the main aim here.
Formatting Guide

Font: Times New Roman 12pt for paragraph text, 14pt bold for headings, with single
paragraph
eaks between paragraphs.
Line Spacing: 1.5, Margins: 2cm all around

Alignment: left-aligned.

Page numbering: Insert page number






















Australian Institute of Higher Education
CRICOS Provider Code: 03147A
Level 3 & 4 545 Kent Street Sydney NSW 2000 Australia
T: XXXXXXXXXXW: www.aih.nsw.edu.au
http:
www.aih.nsw.edu.au






Marking Guide

Element Ranking

XXXXXXXXXXPossible Actual
XXXXXXXXXXmarks marks
Poor Fair Good Very good Excellent

XXXXXXXXXX
Format, Basic and Basic and partially Clear and Clear and Clear and
Sources, and partially co
ect format, less co
ect format, co
ect format, co
ect format,
grammar co
ect format, recent fair-quality recent fair- recent high- recent high-
non- articles, scholarly quality quality quality articles,
contemporary language not used articles, articles, scholarly
low-quality and poor attention scholarly scholarly language
articles, to detail language language throughout and
scholarly Few partly used mostly used thorough
language not sections/paragraphs and good and quite attention to
used and poor smoothly and thorough thorough detail
attention to logically linked attention to attention to sections/
detail detail detail paragraphs
Little evidence Some Most sections/ smoothly and
of smooth sections/ paragraphs logically linked
linking and paragraphs smoothly and
logical linking smoothly and logically linked
logically linked
0.5 mark 1 mark 1.5 marks 2 marks 3 marks

Research, Very basic Some basic Good basic Sound overall Detailed and 3
formulate, research and research and research and research and excellent with
develop and documentation documentation of a documentation documentation research and
document a of a strategic strategic security of a strategic of a strategic documentation
strategic security policy policy security policy security policy of a strategic
security XXXXXXXXXXsecurity policy
policy for 0.5 mark 1 mark 1.5 marks 2 marks 3 marks
your chosen
organisation
identify and Very basic Some basic Good basic Sound overall Detailed and 3
assess the identification identification and identification identification excellent
potential and assessment of the and and identification
threats and assessment of potential threats assessment of assessment of and
vulnerabilities the potential and vulnerabilities the potential the potential assessment of
threats and threats and threats and the potential
vulnerabilities vulnerabilities vulnerabilities threats and
XXXXXXXXXXand mitigation vulnerabilities
0.5 mark 1 mark 1.5 marks 2 marks 3 marks
Discuss how Very basic Some basic Good basic Sound overall Detailed and 3
such threats mitigation of mitigation of the mitigation of mitigation of excellent
and the potential potential threats the potential the potential mitigation of the
vulnerabilities threats and and vulnerabilities threats and threats and potential threats
can be vulnerabilities vulnerabilities vulnerabilities and
mitigated XXXXXXXXXXvulnerabilities
0.5 mark 1 mark
Answered Same Day Jan 23, 2021

Solution

Arunavo answered on Jan 30 2021
153 Votes
ISY3006 INFORMATION SECURITY
(WESTMEAD HOSPITAL)
Table of Contents
Introduction    3
Background of Westmead Hospital    3
Strategic Security Policy    3
Potential Security Threats    5
Conclusion    7
References    8
Introduction
In the fast growing business sector, the security of information is a big concern for any organisation. As more and more examples of the security compromise like hacking and attack of viruses in the IT system, the need for an advance security policy must be adopted to protect and keep their information secure. In the following report, the discussion will be done on the security policy of Westmead Hospital, which is one of the renowned hospitals of West Sydney. As in the hospital, there are much vital information and also the transaction and account information that are kept and there are many chances that they might be compromised due to the attack on the IT security. Therefore, steps and measures should be adopted to keep the data secured and the further discussion of the methods and their protection from potential venerable attacks is discussed.
Background of Westmead Hospital
Westmead Hospital or also known as Western Sydney Local Health District (WSLHD) is one of the leading clinical services, research and education provider, which is serving providing a diverse healthcare facilities to more than 946,000 peoples in Sydney’s west, part and to others part also. The hospital is responsible for providing and managing a $1.7 billion in public healthcare, which spans around 120 subu
s, which is approximately 780 kilometres. The hospital provides innovative healthcare services, which comes from the diverse economic, social and cultural background. Westmead Hospital is one of the specialised hospitals for the western metropolitan area and a major teaching hospital of the University of Sydney for medical and dental pursuing students (Westmead Hospital, 2020).
The major stakeholders or the partners of the hospital are many and they include the NSW Ministry of Health, major local strategic and operational partner like Aboriginal Medical Service Western Sydney, the Western Sydney Medical local and many more. The range of stakeholder has proven that there is a major quality of services that the hospital is providing to the community people of Sydney (Westmead Hospital, 2020).
Strategic Security Policy
In an organisation, the security is major issue of concern and the management will try to formulate an effective security policy to tackle the vulnerabilities. According to Ge
er et al. (2016), the main purpose or the goal of security is keep itself free from danger. The increase in security will increase the protection and chances of theft; however, the convenience to access the information will be reduced. The securing of information in the digital platform is done as the information is manipulated by a microprocessor, it is preserved on a storage device and the information is transmitted over a network.
The security system of the information protects the confidentiality, integrity and availability of the information. A strong security system will be helpful, as it will prevent the data theft, thwarting identity theft, avoiding the legal consequences for not adopting a strong security system for the information, maintaining the productivity and avoiding the cyber te
orism. Therefore, the organisation needs to adopt a strong and secured security policy to protect their information. Policy is an organisation’s grand plan or strategy that defines the overall goals and objectives. Security policy has four important aspects (Helms, 2019). The assets of healthcare information security must be identified, the identification should be done who will be responsible for classifying and valuing information assets, describing the role that should be played by the staffs of hospital regarding the information security, and finally constructing an effective infrastructure for information.
The techniques that will be applied for the enhanced security system must be technically sophisticated, as that will be effective in protecting the information. The information security system will have two levels, one is vertical...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here