Assignment title: Management


Information Security Management (COMP 0400) –Fall– 16 – CW2 – QP In Semester Assignment Module: Information Security Management (COMP 0400) Level: 3 Max. Marks: 100 Work proposal submission: 10.12. 2016 Submission Date: 03.01.2017 OBJECTIVES This assignment is designed to assess students' ability to:  Analyze the security frameworks challenges, risk and threats. .  Develop skills of dealing with new security trends. And enhance:  The student's knowledge through literature review.  Use of CU Harvard referencing system to cite and reference academic resources OUTCOME Students must have an understanding of the following points 1. Critically evaluate Information Security requirements 2. Analyse risk management process. 3. Develop information security baseline(s). Task 1: Submitting the assignment work proposal (10 Marks) Task 2: Most organizations these days are moving towards a more technology based environment. Applying risk management frameworks will help to address the incremental risks associated with adopting these developing technologies such as BYOD, Cloud computing and virtualizations. Therefore, as an information security manager choose one of these technologies and: a. Through two research papers analyse two frame works of Risk Management that can be used for your chosen technology/environment. (35 Marks) b. Through a case study show case the implementation process of risk management in any one of the environments. (35 Marks) Task 3: Raising awareness is a critical part of the whole risk management process. In your opinion, as an information security officer discuss the different methods and techniques to raise security awareness. (20 Marks)Information Security Management (COMP 0400) –Fall– 16 – CW2 – QP Provide the following information in the report: TASKS DESCRIPTION AND MARKS DISTRIBUTION Th e marks allocation scheme for the assignment is as follows: Task 1: Expectation: Submitting the assignment work proposal which includes the student understanding and plan on how to complete the deliverables, which resources to use and the time line. Task 2: a. Through two research papers analyse two frame works of Risk Management that can be used for your choosen technology/environment. Expectation: To define BYOD, cloud or virtualization and discuss two Risk Management frameworks that can be applied to these technologies to avoid risk and threats. b. Through a case study show case the implementation process of risk management in any one of the environments. Expectation: Analyse a case study where an organization that is adopting one the technologies has implemented risk management, showcasing the advantages , strengths and weaknesses. Task 3: Raising awareness is a critical part of the whole risk management process. In your opinion, as an information security officer discuss the different methods and techniques to raise security awareness. Expectations: add your own opinion on various techniques and methedolgies to help raise staff awareness of the importance of information security. ASSIGNMENT EVALUATION CRITERIA Students will be evaluated on the following point  Originality of answer, i.e. writing in your words with some amount of referenced material  Correct information and presentation in document form  Adequate referencing and citation provided  Submitting work proposal which include student solution plan and this will carry 10% of the marks  Oral Examination/VIVA: Assignment marks are based on the VIVA which will be conducted upon submission of assignment. The VIVA will be based on the tasks given in the assignment. ZERO marks will be awarded to the student if he/she is absent for VIVA. GUIDELINES  The report should have 2500 words approximately.  The document should be well presented and neatly done  Assignment should be computer typed using Calibri 12 font and the soft copy should be submitted through Moodle,Information Security Management (COMP 0400) –Fall– 16 – CW2 – QP duly checked by TurnItIn to check the similarity of work. Please note the time mentioned above and also go through the Middle East College plagiarism policy given below.  The report must have a Title Page, table of contents (optional), reference/ bibliography and page number. Every page must have header & footer.  At least EIGHT references are required which must be referenced by using Harvard Reference System.  Heading should be with Font Size 14, Bold, and Underline.  Each student has to do the assignment individually. Please submit one hard copy to myself (during class or office hour) and upload soft copies through Moodle in time.  You are welcome to discuss about the assignment with the lecturer in his/her office hours. PLAGIARISM POLICY Plagiarised documents, in parts or whole, submitted by the students will be rejected. For the first offence of plagiarism, a student enrolled in undergraduate programme is penalised with a deduction of 25% of the maximum marks on the assessment as per the plagiarism policy statement and is allowed to re-submit the work once, within a week's period. The student has the right to appeal against the decision made, to the respective Programme Coordinator. Further appeal on decision taken may be made to the Head of the concerned department. If the student is not satisfied by the decisions taken by the department, he/she can appeal to the Plagiarism Appeals Committee. For the second offence of plagiarism against the student, (committed in any semester after the semester of the student's first offence of plagiarism in the tenure of the student in the undergraduate programme), the student is awarded zero in the assessment where plagiarised content was found. The student is not allowed to resubmit the assessment. The student has the right to appeal against the decision made to the respective Programme Coordinator. Further appeal on decision taken may be made to the Head of the concerned department. If the student is not satisfied by the decisions taken by the department, s/he can appeal to the Plagiarism Appeals Committee. Repeated offences of plagiarism by the student (more than two times) are dealt with as per the college policy on Academic Dishonesty as mentioned in the Student Handbook (6.2). All decisions on plagiarism related offences will be communicated to the student by the respective module instructors, using routine channels of communication with students, currently used by the college, preferably on the same day the charges are confirmed or the very next working day. The student has the right to appeal against the decision informed by the module instructor to the Respective Program Coordinator. Further appeal on decision taken may be made to the Head of the c o n c e r n e d d e p a r t m e n t . If the student is not satisfied by the decisions taken by the department, s/he can appeal to the Plagiarism Appeals Committee. In certain cases, the student may be required to appear for an interview with the module instructor, if deemed necessary. The maximum time limit given to a student to raise appeal against the charges of plagiarism is two working days including the day on which the matter is informed to the student. It is preferable that the appeals are made on the same day ofInformation Security Management (COMP 0400) –Fall– 16 – CW2 – QP the college on which the student is informed of the issue. All appeals must be made during regular working hours of the college. LATE SUBMISSION POLICY Penalty for late submission - 5% of the maximum mark specified for the assessment will be deducted for each working day. Assessment documents submitted beyond a period of 1W EEK after the last date of submission will not be accepted and will be marked as zero for that assessment. FEEDBACK TO STUDENTS  The feedback will be given to the students work proposal within one week after the submission.  Feedback, on assignment, will be provided to the students (through moodle/emails/oral) within ONE week, after the submission date. RULES & REGULATION If two assignments/essays are similar in all aspects then marks will be deducted from both assignments. Your source of information should be mentioned in the reference page clearly. (For example: If it's from book, you have to mention the full details of the book with title, author name, and edition and publishers name. or if it is from internet you have to mention the correct complete URL) Note: If you have any questions, please ask {during class timings or office hours).Information Security Management (COMP 0400) –Fall– 16 – CW2 – QP In Semester Assignment Module: Information Security Management (COMP 0400) Level: 3 Max. Marks: 100 Work proposal submission: 10.12. 2016 Submission Date: 03.01.2017 ASSESSMENT EVALUATION SHEET  All tasks will be evaluated through the VIVA Total Marks Penalty Final Marks Task 2 A Expectation 0-9 10-20 21-31 32-35 Marks Through two research papers analyse two frame works of Risk Management that can be used for your chosen technology/environm ent. To define BYOD, cloud or virtualization and discuss two Risk Management frameworks that can be applied to these technologies to avoid risk and threats. Incomplete/ Plagiarized report General discussion on the research papers. Analyze two research papers where it demonstrates different risk management frameworks Analyze two research papers where it demonstrates different risk management frameworks with adding the student opinion and analysis Task 2 B Expectation 0-9 10-20 21-31 32-35 Marks Through a case study show case the implementation process of risk management in any one of the environments. Analyse a case study where an organization that is adopting one the technologies has implemented risk management, showcasing the advantages , strengths and weaknesses. Incomplete/ Plagiarized report General discussion on the case study Analyze a case study showcasing advantages , strengths and weaknesses of the risk mngt implementation Analyze a case study showcasing advantages , strengths and weaknesses of the risk mngt implementation . with adding the student opinion and analysis Task 3 Expectation 0 1-20 Marks In your opinion, as an information security officer discuss the different methods and techniques to raise security awareness. Demonstrate an understanding to raising information security awareness Plagiarized report Student's opinion with significant evidence Task 1 Expectation 0 1-10 Marks Proposal submission Submitting the proposal correctly No submissions Submitted