Information Security Policy and Human Resource Considerations

Verified

Added on  2019/09/24

|10
|667
|203
Report
AI Summary
This report examines the development and implementation of a comprehensive security policy for a software development company, addressing network security, resource management, and human resource considerations. The report begins by exploring existing information security management frameworks and their benefits, then proposes a customized security policy tailored to the company's specific needs, including network design, access control, and data protection. It also details the tools and strategies for effective resource management, ensuring data integrity and system availability. Furthermore, the report identifies and provides solutions for human resource issues that arise during security audits, such as employee training and awareness, addressing potential vulnerabilities and promoting a security-conscious culture. The report adheres to strict formatting guidelines, including proper referencing, to ensure clarity and academic rigor. The report emphasizes the importance of a well-defined security strategy for protecting sensitive data and maintaining operational efficiency.
Document Page
Report
Learning outcomes covered
LO 3 - Be able to implement policies for the organizational network security.
Scenario and the Task
SOFT DEVELOPERS is software developing company which is located in Colombo. They are
planning to open a new branch in Kandy. Their business activities will be started within three
month time. In future they are planning to develop websites as well.
Proposed Network
1. 10 PC’s for front office – 05 PC’s & 02 Laptops
2. 5 PC’s for type setting
3. 2 PC’s for the Branch manager ( 1 laptop )
4. 35 PC’s for the Programming department
5. 2 PC’s for the Project Manager ( 1 laptop )
6. 5 PC’s for the Finance Department
7. IT Administration and System support department will have 10 PCs. (minimum 3 servers)
8. 10 PC’s for the Web Development Department
9. Each user will get a login to access the intranet site.
10. Files are to be stored in a central location.
11. Centralized control of the network.
12. One printer for each department.
13. The network admin can access the server remotely
14. The users can access internet through the proxy server
15. Each department and labs are to be in different networks.
16. Each department uses different class C IP address (private IP address range)
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
17. The network has the facility to provide IPs dynamically as well.
TASKS
1. Give examples of existing information security management frameworks. What are the
advantages can be obtained by the company if they implement the above security
management frameworks? Create your own security policy for the mentioned organization
and critically evaluate the suitability how the implemented security policy will benefit for
the organisation. (35 Marks )
2. Resource management is also a part of a company security policy. What are the appropriate
tools that can be used to control and monitor access to resources in the mentioned company?
Briefly explain each solution highlighting their benefits and Cleary Justify the decisions you
made in designing the security policy. (35 Marks )
3. Discuss the human resource issues that have to be considered when carrying out security
audits. You may suggest possible ways to overcome from those. (20 Marks )
4. Proper Report Format should be maintained. (10 Marks )
2
Document Page
Assessment Criteria
This
submission
will be
assessed as
follows
Depth of the task MARKS
TASK 1 Give two examples of existing information security
management frameworks which are most commonly used by
the IT organizations
Explain the benefits the which the organization can gain by
implementing the selected security framework
Create your own security policy for the mentation organization
10
10
15
TASK 2 Explain the resource management tools and how those tools can
be used to control and monitor the organizations resources.
Produce a resource management policy for this organization
and justify how that resource management security policy will
be benefit for the organization.
10
10
15
TASK 3 Identify the human resource issues that have to be considered
when carrying out security audits.
Produce solutions to overcome the human resource issues.
10
10
TASK 4 Proper document Structure should be followed
Proper Harvard referencing method should be followed
5
5
3
Document Page
This submission will be assessed as follows Total marks
Allocated
Marks obtained by
the student for the
answer provided
TASK 1 35
TASK 2 35
TASK 3 20
TASK 4 10
Total Marks 100
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Submission Guidelines
Submission format Report
Paper Size: A4
Words: 3000 words
Printing Margins: LHS; RHS: 1 Inch
Binding Margin: ½ Inch
Header and Footer: 1 Inch
Basic Font Size: 12
Line Spacing: 1.5
Font Style: Times New Roman
Referencing should be done strictly using Harvard system
5
Document Page
Acknowledgement
6
Document Page
Introduction
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
Acknowledgement...........................................................................................................................8
Introduction......................................................................................................................................9
Table of Figures.............................................................................................................................11
Task 1.............................................................................................................................................12
8
Document Page
Table of Figures
9
Document Page
Task 1
10
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]