logo

INFORMATION SECURITY.

   

Added on  2022-11-24

10 Pages2601 Words1 Views
 | 
 | 
 | 
Running head: INFORMATION SECURITY
Information Security
Name of the Student
Name of the University
Author Note
INFORMATION SECURITY._1

INFORMATION SECURITY
1
Table of Contents
Introduction:...................................................................................................................2
Background of Southern Cross University:...................................................................2
Current Stakeholder of Southern Cross University:.......................................................2
Nature of the Business:..................................................................................................2
Strategic Security Policy for the Southern Cross University:........................................3
Policies for Security of Information:..........................................................................3
Potential Threat and Vulnerability within University’s Network:.............................5
Conclusion:....................................................................................................................6
References:.....................................................................................................................7
INFORMATION SECURITY._2

INFORMATION SECURITY
2
Introduction:
Security of the organizations is very much important to ensure proper flow of the
business processes of them. In this aspect the information security of the organizations is very
much important which helps to ensure that the organization is currently secured from various
of external thefts. It has been assessed that most of the organizations are having a proper
security policies so that they can protect themselves (Peltier 2016). Thus this policies must be
developed in a proper way for the appropriate development of the security of the
organization.
In this document security policies will be developed for the Southern Cross
University. It has been assessed that for development of the security policies it is very much
important for identification of the stakeholders of the organization. Thus stakeholder analysis
will be also done in this report. Potential threat and vulnerabilities that are present within the
network of the organization will be also discussed in this context.
Background of Southern Cross University:
Southern Cross University or the SCU is public university of Australia with having
campuses across Coffs Harbour, Lismore and New South Wales. Also, at the southern end
this university is having campuses on Queensland and Gold Coast. Currently this university is
governed by a particular Council. The CEO or the Chief Executive Officer of the University
reports to the Council. All the affairs of the university is currently managed by this Council.
Currently various type of academic programs are offered by the Southern Cross University.
Current Stakeholder of Southern Cross University:
Considering the Southern Cross University they are currently having several of
stakeholder. The main stakeholder of the Southern Cross University are the governing
entities, administration department, faculties, students, education material providers, direct
competitors (other universities) and Australian Department of Education and Training. The
above identified stakeholders are very much important for the Southern Cross University so
that they can manage their daily operations within the university.
Nature of the Business:
From the above discussions it has been assessed that the Southern Cross University is
a public university of Australia. As this university is a public university, that means, most of
INFORMATION SECURITY._3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Risk Assessment of Southern Cross University
|13
|2466
|317

BYOD Risk Assessment Task 1: Critical Components 2 2 Cyber Security Name of University Author
|15
|2429
|149

Cyber Security Management for Australian Red Cross Blood Service
|9
|1783
|385

What Is Information Security (InfoSec)?
|9
|2498
|19

Cyber security - Assignment PDF
|11
|2072
|1067

Developing a Security Policy for Commonwealth Bank: Mitigating Potential Threats and Vulnerabilities
|13
|2983
|97