logo

ISY3006 Information Security Report 2022

   

Added on  2022-10-01

12 Pages2628 Words23 Views
Information Security
ISY3006
10/3/2019
System04113

ISY3006 1
Executive Summary
As the use of technology by organizations is getting an increase, similarly risk associated
with the relevant information also spreading its roots. In the report, an introduction has been
provided where the route map of the report has been discussed. The report has been prepared
for Australian catholic university. Further, the IT security policy of the company has been
discussed. Defining the roles and responsibilities of different parties, providing training to
system users, limiting unauthorized access and remote access are few of the major points
covered by this policy. Further weak passwords, unauthorized access, inappropriate use of
email are some of the vulnerabilities that can be mitigated by taking measures adopted an
underdeveloped and documented policy.

ISY3006 2
Contents
Executive Summary...................................................................................................................1
Introduction................................................................................................................................2
Discussion..................................................................................................................................2
Nature and stakeholders.........................................................................................................2
Development of strategic security policy for ACU................................................................3
Risk, threats, and mitigation...................................................................................................7
Conclusion..................................................................................................................................8
References................................................................................................................................10

ISY3006 3
Introduction
IT systems always expose to uncertain risks that are extremely necessary to identify and
mitigate to secure the information that such a system consists of. When an organization
adopts the use of information technology, different kinds of risk are presented there which
includes general IT threats, criminal IT threats, and risk of natural disasters
(Business.qld.gov.au, 2019). The information security policy of the organization plays an
important role here. This policy refers to a set of rules, which ensure that all the networks,
and data of its structure is secure from unauthorized access and use and are in the
organization's authority (Rouse, 2019). Many of the cases related to data breach used to
report in media that increases the significance of IT security policy. The purpose of the report
is to develop an understanding of IT threats and policy of an organization.
In the presented report, the discussion will lead to a brief introduction to the selected
organization. Further, a strategic policy of the organization will be presented after providing
basic research and formulation of the same. Lastly, the risk and vulnerabilities of the
organizational network and the manner in which the same can be resolved would also be
discussed.
Discussion
Nature and stakeholders
Australian catholic university (ACU) is engaged in providing meaningful education and life-
changing opportunities to students (Acu.edu.au, 2019). Since it is a university, the lead
stakeholders of the same are its church, staff, alumni, students, communities, and employers
that include government and nonprofit organizations. University also provides international

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ISY3006 Business And Corporation Law Assignment
|12
|2398
|13

Information Security: Holiday Inn Australia
|11
|3103
|1

Importance of IT in Business and Corporation Law
|7
|2421
|91

Information Security: The Royal Children's Hospital
|11
|3171
|107

Strategic Security Policy: A Case Study of Walmart
|11
|2894
|291

Information Security in Woolworths Supermarket, Australia
|11
|3130
|129