diff_months: 15

Information Security Policy and Procedures Assignment

Download Solution Now
Added on: 2023-02-17 12:54:24
Order Code: CLT300379
Question Task Id: 0
  • Country :

    Australia

Section 1: Prepare to gather threat data

1. Network infrastructure
a.Provide a broad overview of the network infrastructure/system.
b.List the security device or devices in use. Also provide information on:

  • the router type
  • firewall/s in place
  • sources of threat data that can be used from the network.

2. Legislative requirements and policies and procedures

  • List at least two legislation that apply to gathering, interpreting and analysing threat data. Explain the relevance of this legislation to gathering, interpreting and analysing threat data.
  • List the name of the policy and procedure relevant to gathering, interpreting and analysing threat data. Discuss its key inclusions including data log requirements and overall strategy regarding threat data.

If you are completing this assessment in your RTO, this will be as per the ICTCYS407 Simulation Pack. If you are completing this for your workplace, this will be relevant workplace policies and procedures.

3. Gathering data

  • Discuss the data that you will collect and rationale for this. Also include a description of your strategy for gathering, analysing and interpreting this data. This should include how you will log the data and the analytic platform you will used to analyse the data.

Section 2: Gather, analyse and interpret threat data

1. Data collection
For the device and type of data you have identified, you are to collect information from alerts, logs and reported events and create a dataset following workplace policies and procedures.
If you are completing this assessment in your RTO, this will be as per the ICTCYS407 Simulation Pack. If you are completing this for your workplace, this will be relevant workplace policies and procedures.
Provide evidence of the information you have collected and dataset you have created in a suitable form such as screenshot. Attach it to your Portfolio.

2. Data analysis
a.Describe the analytic platform you have used for the data.
b.What results did the analysis provide to you?
c.How consistent or reliable were these results?
d.Were there any false positive or false negative results?
e.What inconsistencies or discrepancies did you identify in the data. Identify at least three.

3. Risk
Based on the data you analysed above, discuss the threats you have identified, as well as the risk of each threat including the likelihood of occurrence and impact.

4. Lessons learned
Based on your work to date, consider and report on:

  • What have you learned?
  • What are your recommended actions/mitigation strategies in relation to the threats identified? List at least two.

5. Files
File all your work in logical folder and store according to your workplace policies and procedures.
If you are completing this assessment in your RTO, this will be as per the ICTCYS407 Simulation Pack. If you are completing this for your workplace, this will be relevant workplace policies and procedures.

Get your Information Security Policy and Procedures assignment solved by our Computer Science Experts from Exam Question Bank . Our Assignment Writing Experts are efficient to provide a fresh solution to all question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing Style. Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered.

You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turn tin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

  • Uploaded By : Katthy Wills
  • Posted on : February 17th, 2023
  • Downloads : 0
  • Views : 157

Download Solution Now

Can't find what you're looking for?

Whatsapp Tap to ChatGet instant assistance

Choose a Plan

Premium

80 USD
  • All in Gold, plus:
  • 30-minute live one-to-one session with an expert
    • Understanding Marking Rubric
    • Understanding task requirements
    • Structuring & Formatting
    • Referencing & Citing
Most
Popular

Gold

30 50 USD
  • Get the Full Used Solution
    (Solution is already submitted and 100% plagiarised.
    Can only be used for reference purposes)
Save 33%

Silver

20 USD
  • Journals
  • Peer-Reviewed Articles
  • Books
  • Various other Data Sources – ProQuest, Informit, Scopus, Academic Search Complete, EBSCO, Exerpta Medica Database, and more