Assignment title: Information


.INF80043 IS/IT Risk Management Project Due Date : Friday, 20th April 2017, 11:59 PM Required Length : MAX 4000 words (not including reference list & appendices) Marks Allocated : 40% Submission Procedure : Electronic submission through blackboard (more info on submission procedure will be released closer to the due date). The assignment declaration (available through blackboard in due time) with your signature need to be submitted as part of the submission. The following MUST be included as part of the submission: ▪ Fully completed assignment cover sheet (available through blackboard), ▪ Any relevant appendices to the report (please note: appendices do not count towards the word limit), ▪ A complete and accurate reference list as per the Harvard and/or APA style, Please note that marks may be deducted if the assignment fails to comply with above specifications!Assignment tasks Your need to provide as assigned to: • Carry out an extensive review of risks on the company’s IS/IT/Information security management practices by: o Identifying and detailing all key components of risk, vulnerabilities, threat as well as their impact to the company. o The risk assessment needs to be conducted in accordance to the best practice prescribed by one (or a hybrid) of the leading standards, guidelines, or framework pertaining IS/IT/Information security. • Identify further opportunities of risk management activities within thecompany. • A coherent IS/IT/Information security risk mitigation strategy that provides proactive solutions for the risks identified in the Risk Assessmentstage • Produce a risk analysis report of the company to be submitted to the company’s senior executive (remember: the audience of your report is going to be the senior executives – the C-level individuals of the organisation) Your task is to produce a report addressing the above requirements. It is important to note that the use of established standards, frameworks and best practice in the process is highly valued and sought after by the senior executives. (It is even more important to remember that this is an academic assignment, as such, you need to adhere to a scholarly standard in your report by providing adequate justifications by using good quality scholarly and peer-reviewed literature and reference them accordingly throughout the report)INF80043 IS/IT Risk Management Project - Assessment Rubric Criteria Need Improvement Developing Mastering 0 1 2 3 4 5 The use of salient features of an established Risk Mitigation framework (for example: using international standards like ISO/IEC 27001 and ISO/IEC 27002 for control selection that address multiple risks). Does not demonstrate an understanding of how to use the standards in the analysis and development of risk analysis & mitigation; lacked the details required for a coherent risk analysis & mitigation report. Demonstrates a basic but accurate understanding of how to use the standards in the analysis and development of risk analysis & mitigation, but lacks some detail required for a coherent risk analysis & mitigation report. Demonstrates a sophisticated understanding of how to use the standards in the analysis and development of the risk analysis & mitigation report. Identification and analysis of most threats & vulnerabilities within the organisation - technical, operational and managerial. Does not attempt or fails to identify and analyse accurately. Analysis is disorganized, incomplete, or completely lacking in evidence on identification of threats. Approach to the analysis is egocentric or sociocentric. Does not relate issue to broader but critical organisational contexts. Analysis is grounded in absolutes, with little acknowledgement of the team’s own biases. Does not recognize context or surface assumptions and underlying implications (or does so in a superficial manner). Summarizes threats, though some aspects are incorrect or unclear. Key details are missing or glossed over. Presents and explores relevant contexts and assumptions regarding the vulnerabilities, although in a limited way. Analysis includes some outside verification, but primarily relies on established authorities. Provides some recognition of context and assumptions and implications. Clearly identifies the threats and subsidiary, implicit aspects of the threat. Identifies integral relationships essential in analysing the threats. Analyses the vulnerabilities with a clear sense of scope and context. Considers other integral contexts. Analysis acknowledges complexity and bias of vantage and values. Identifies influence of context and questions assumptions, addressing other dimensions underlying the vulnerability. Impact analysis (both technical, system, and organisational) with quantitative and/or qualitative methods Demonstrates an inadequate understanding of impact analysis. Demonstrates a basic and accurate understanding of impact analysis. Demonstrates a sophisticated understanding of impact analysis.Thorough control assessment and likelihood analysis relating to all critical vulnerabilities identified Demonstrates an inadequate understanding of control assessment and likelihood analysis. No evidence of source evaluation skills. Repeats information provided without question or dismisses evidence without adequate justification. Does not demonstrate an understanding of control as part of Risk Mitigation; lacked the details required for an effective implementation of control mechanisms. Demonstrates a basic and accurate understanding of control assessment and likelihood analysis Demonstrates adequate skill in evaluating. Use of evidence is qualified and selective. Demonstrates a basic but accurate understanding of how to use the control to mitigate risk, but lacks some detail required for an effective use of control in risk mitigation. Demonstrates a sophisticated understanding of control assessment and likelihood analysis Evidence of selection and evaluation skills; notable identification of uniquely salient resources. Examines evidence; questions its accuracy & completeness. Demonstrates a sophisticated understanding of how to use appropriate control to mitigate risk. Risk assessment tables Demonstrates an inadequate understanding of what should be contained in the risk assessment tables. Offers some proper matrices with adequate details, although some aspects may require further clarifications. Identification concise, accurate, logical explanation. Understanding of Legal and Regulatory requirements as well as other key environmental factors affecting the organisation Demonstrates an inadequate understanding of these requirements. Demonstrates an inadequate understanding of other key environmental factors affecting the organisation Offers some understanding of both the legal and regulatory requirements. Offers some understanding of other key environmental factors affecting the organisation Concise, clear, accurate, logical explanation of what is required to cover the company on the legal and regulatory aspects, as well as other key environmental factors affecting the organisation Presentation and Supportive evidence Uses colloquial, simplistic language Uses language and syntax that is unclear Appropriate report format not used No reference list using correct Harvard or APA Style Inappropriate or less than satisfactory report quality given the intended target audience Uses language that is satisfactory for the report but better proofreading is required. Not all required report sections are included Limited reference list using correct Harvard or APA Style Reasonable report quality given the intended target audience Uses language that is stylistically sophisticated and appropriate report format. Uses other relevant and appropriate literary devices to enhance the report. Comprehensive reference list using correct Harvard or APA Style Excellent report quality given the intended target audiencePreparation of the report covering the nature of investigations, using any of the frameworks discussed, summary of results and security management along with the recommendations. Demonstrates an inadequate understanding of how to present or use information or inappropriate recommendations chosen. Demonstrates a basic but accurate understanding of how to present information gathered and suggests recommendations appropriate for the given context. Demonstrates a sophisticated understanding of how to present information gathered and suggests recommendations. Rationale, Justification & Critical Thinking The report does not reflect a mature and reasonable rationale in considering various key aspects in the IS/IT/Information security domain, particularly in the Risk Mitigation area. Does not show critical thinking in the key phases/steps of Risk Mitigation. The report shows some reasonable rationale as well as some aspects of critical thinking in considering various key aspects in the IS/IT/Information security domain, particularly in the Risk Mitigation area. The report provides a mature and reasonable rationale, as well as ample demonstration of critical thinking, in considering various key aspects in the IS/IT/Information security domain, particularly in the Risk Mitigation area.