SlideShare a Scribd company logo
1 of 5
1 | 4
Need this or a similar Assignment
Contact: qualityonewriters@gmail.com
Whatsapp/Call: +91-9502220077
COIT20263 Information Security Management (Term 1, 2017)
Assessment Item 2—Practical and Written Assessment
Due date: 11:30pm AEST, Friday, Week 7 ASSESSMENT
Weighting: 35%
2
Length: 2000 words (±500 words)
Objectives
This assessment task can be undertaken in a group of up to 4 members or individually. Each
group/student will analyse the scenario given on page 3, and develop and document the specified
Issue Specific Security Policy (ISSP) for the organisation.
Assessmentcriteria
The students are assessed against their ability to analyse the given scenario and develop the specified
ISSP.
The marking criteria for Assessment Item 2 are provided on page 4.Students need to familiarise
themselves with the marking criteria to ensure that they have addressed them when preparing the
document for this assessment item.
Assessment Task
Each group/studentis required to analyse the scenario given on page 3 and develop a ‘Use of Personal
Digital Devices Policy’ for the organisation described in the scenario.
The ISSP should include:
1. Statement of Purpose
2. Authorised Uses
3. Prohibited Uses
4. Systems Management
5. Violations of Policy
2 | 4
6. Policy Review and Modification
7. Limitations of Liability
You also need to include a section containing the justification of the contents of your policy as well as
any assumptions that you have made.
Note:Each student in the group needsto upload the ISSP document of their group to Moodle. You
must follow the Harvard citation and referencing guidelines when writing the ISSP document and
include a reference list.
Please do not include an executive summary, a table of contents, an introduction or a conclusion.
Please use the ‘Template for Your Answers’ Section of this document and upload only that template.
Check the unit website at least once a week for further information relating to this assessment task.
Please ensure that you write your answers in your own words to avoid possible plagiarism and
copyright violation. You can understand the Plagiarism Procedures by following the corresponding
link in the CQUniversity Policies section of the Unit Profile.
Submission
To be submitted online through the COIT20263 Moodle unit website assessment block on or before
the due date.
3 | 4
The Scenario for Information Security Management Assessment Tasks
Auto-fishing Group (AG) is a cooperative society of fishermen in Tasmania establisheda year ago.
AG was established to increase the fish yield of its member fishermen and supply the fish to the
consumers as quickly as possible at a reasonable price. Using sophisticated technology, including
Unmanned Aerial Vehicles (UAVs),the fishermen locate the schools of fish suitable for consumption
without catching them indiscriminately and thereby reducing over fishing. AG directly supply the fish
from the fishermen to the customers without an intermediary. To this end, AG has its own vehicles,
ten distribution centres along the coast of the state and three distribution vehicles at each distribution
centre. Each fisherman will be affiliated to a distribution centre.
AG operates from a small office in Hobart. When a customer places an order using the application of
AG or over the phone, the order is processed using a proprietary software program of AG. By using
this software,AG is only be able to receive the optimum quantity of fish from the fishermen on time
but also be able to deliver the order to the customers quickly. This whole process is automated with
the help of on-board computers on the distribution vehicles connected to the office of AG and the
mobile devices of the fishermen.
The fishermen can get connected to the Internet and post questions to online forums. AG also has an
online banking society that provides most of the main banking facilities of other banks to its member
fishermen.
AG also has a marine and fisheries training centre in Hobart. The centre has a managing director, a
secretary and two instructors. There are 20 students at any time in the training centre,participating in
the classes. The instructors can show the students the live videos of fish shoals and schools as well as
the techniques used by the fishermen. The network of the training centre is a part of the network of
AG. AGneeds the guarantee that their proprietary application, and various data and information in
their information system are secured.
After the success in Tasmania, AG expanded its services to fishermen and customers in Victoria as
well.
As the society was established last year, the information security policies have not yet been
developed. The society is now in the process of developing a comprehensive set of information
security policies for its information system.
Note: This scenario was createdby Dr Rohande Silva on 10thDecember2016andno part of this scenario shouldbe reproducedby any
individual or an organisationwithout written permissionfromCQUniversity, Australia.
4 | 4
Marking Criteria
Section
HD D C P F
Max Mark Mark
6 5.1 4.8 4.5 4.2 3.9 3.6 3 2.7 0
Assumptions Listedall assumptions.
Some assumptions
missing.
Most assumptions
missing.
Not clear and most
assumptions
missing.
All assumptions missing. 6
Section
HD D C P F
3 2.55 2.4 2.25 2.1 1.95 1.8 1.5 1.35 0
Statement ofPurpose Containedall information in detail.
Containedall information
but not enough detail.
Had too brief or
missing information.
Not clear but
contained most
information.
Not clear and most
information missing. 3
Authorised Uses Containedall information in detail.
Containedall information
but not enough detail.
Had too brief or
missing information.
Not clear but
contained most
information.
Not clear and most
information missing.
3
Prohibited Uses Containedall information in detail.
Containedall information
but not enough detail.
Had too brief or
missing information.
Not clear but
contained most
information.
Not clear and most
information missing. 3
Systems Management Containedall information in detail.
Containedall information
but not enough detail.
Had too brief or
missing information.
Not clear but
contained most
information.
Not clear and most
information missing. 3
Violations ofPolicy Containedall information in detail.
Containedall information
but not enough detail.
Had too brief or
missing information.
Not clear but
contained most
information.
Not clear and most
information missing. 3
Policy Review and Modification Containedall information in detail.
Containedall information
but not enough detail.
Had too brief or
missing information.
Not clear but
contained most
information.
Not clear and most
information missing. 3
Limitations and Liability Containedall information in detail.
Containedall information
but not enough detail.
Had too brief or
missing information.
Not clear but
contained most
information.
Not clear and most
information missing. 3
Section
HD D C P F
6 5.1 4.8 4.5 4.2 3.9 3.6 3 2.7 0
Justification
Focussed and contained all
information in detail.
Focussed and contained
but not enough detail.
Focussed but some
information missing.
Not clear but
contained most
information.
Not clear and most
information missing.
6
Section
HD D C P F
2 1.7 1.6 1.5 1.4 1.3 1.2 1 0.9 0
References
All references are listedaccordingto
Harvardreferencestyle.
A few referencingerrors.
Not all references are
listed but correctly
referenced..
Many references
missing
No or incorrect reference
list.. 2
5 | 4
TEMPLATE FOR YOUR ANSWERS
COIT20263 Information Security Management - Assessment Item 2 (Term 1, 2017)
Names and student numbers of group members:
Use ofPersonal Digital Devices Policy Mark
allocated
Mark
earned
Assumptions 6
1 Statement of Purpose 3
2 Authorised Uses 3
3 Prohibited Uses 3
4 Systems Management 3
5 Violations of Policy 3
6 Policy Review and Modification 3
7 Limitations of Liability 3
Justification 6
References 2
Late submission penalty
Plagiarism penalty
Total 35

More Related Content

Similar to Coit20263 information security management assignment 2

Discipline: Policy and Procedure
Discipline: Policy and ProcedureDiscipline: Policy and Procedure
Discipline: Policy and ProcedureManage Train Learn
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation Jim Kaplan CIA CFE
 
CPDone: Is the BPO Industry Ready for External Compliance Focus?
CPDone: Is the BPO Industry Ready for External Compliance Focus?CPDone: Is the BPO Industry Ready for External Compliance Focus?
CPDone: Is the BPO Industry Ready for External Compliance Focus?CPDone
 
Essay About How To Prepare Your Favorite Dish
Essay About How To Prepare Your Favorite DishEssay About How To Prepare Your Favorite Dish
Essay About How To Prepare Your Favorite DishStephanie Green
 
Webheath e safety policy 2013
Webheath e safety policy 2013Webheath e safety policy 2013
Webheath e safety policy 2013webheathfsa
 
Food Safety and Defense: Key Factors to Safely Manufacture, Package and Handl...
Food Safety and Defense: Key Factors to Safely Manufacture, Package and Handl...Food Safety and Defense: Key Factors to Safely Manufacture, Package and Handl...
Food Safety and Defense: Key Factors to Safely Manufacture, Package and Handl...GlobalCompliancePanel
 
RiskWatch for Credit Unions™
RiskWatch for Credit Unions™RiskWatch for Credit Unions™
RiskWatch for Credit Unions™CPaschal
 
University Of Georgia Essay Prompts 2015
University Of Georgia Essay Prompts 2015University Of Georgia Essay Prompts 2015
University Of Georgia Essay Prompts 2015Lisa Laseter
 
Post 11. Long term GoalThe Group’s goal is to offer attr
Post 11. Long term GoalThe Group’s goal is to offer attrPost 11. Long term GoalThe Group’s goal is to offer attr
Post 11. Long term GoalThe Group’s goal is to offer attranhcrowley
 
Implementing And Managing A Multinational Privacy Program
Implementing And Managing A Multinational Privacy ProgramImplementing And Managing A Multinational Privacy Program
Implementing And Managing A Multinational Privacy ProgramMSpadea
 
Whistleblower presentation
Whistleblower presentationWhistleblower presentation
Whistleblower presentationMustapha Mugisa
 
IHST - SMS for Small Helicopter Fleets
IHST - SMS for Small Helicopter FleetsIHST - SMS for Small Helicopter Fleets
IHST - SMS for Small Helicopter FleetsIHSTFAA
 
UNIVERSITY OF THE CUMBERLANDS ITS 833 – INFORMATION GOVER.docx
UNIVERSITY OF THE CUMBERLANDS  ITS 833 – INFORMATION GOVER.docxUNIVERSITY OF THE CUMBERLANDS  ITS 833 – INFORMATION GOVER.docx
UNIVERSITY OF THE CUMBERLANDS ITS 833 – INFORMATION GOVER.docxouldparis
 
3.0 iSwimband_Business_Plan
3.0 iSwimband_Business_Plan3.0 iSwimband_Business_Plan
3.0 iSwimband_Business_PlanPaul Chu
 
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd PartiesPACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd PartiesPace IT at Edmonds Community College
 
Extended Essay Final Deadline 2014
Extended Essay Final Deadline 2014Extended Essay Final Deadline 2014
Extended Essay Final Deadline 2014Amber Lina
 
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020Delphix
 

Similar to Coit20263 information security management assignment 2 (20)

Discipline: Policy and Procedure
Discipline: Policy and ProcedureDiscipline: Policy and Procedure
Discipline: Policy and Procedure
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
 
CPDone: Is the BPO Industry Ready for External Compliance Focus?
CPDone: Is the BPO Industry Ready for External Compliance Focus?CPDone: Is the BPO Industry Ready for External Compliance Focus?
CPDone: Is the BPO Industry Ready for External Compliance Focus?
 
Essay About How To Prepare Your Favorite Dish
Essay About How To Prepare Your Favorite DishEssay About How To Prepare Your Favorite Dish
Essay About How To Prepare Your Favorite Dish
 
IT Security & Governance Template
IT Security & Governance TemplateIT Security & Governance Template
IT Security & Governance Template
 
Webheath e safety policy 2013
Webheath e safety policy 2013Webheath e safety policy 2013
Webheath e safety policy 2013
 
Food Safety and Defense: Key Factors to Safely Manufacture, Package and Handl...
Food Safety and Defense: Key Factors to Safely Manufacture, Package and Handl...Food Safety and Defense: Key Factors to Safely Manufacture, Package and Handl...
Food Safety and Defense: Key Factors to Safely Manufacture, Package and Handl...
 
RiskWatch for Credit Unions™
RiskWatch for Credit Unions™RiskWatch for Credit Unions™
RiskWatch for Credit Unions™
 
University Of Georgia Essay Prompts 2015
University Of Georgia Essay Prompts 2015University Of Georgia Essay Prompts 2015
University Of Georgia Essay Prompts 2015
 
Post 11. Long term GoalThe Group’s goal is to offer attr
Post 11. Long term GoalThe Group’s goal is to offer attrPost 11. Long term GoalThe Group’s goal is to offer attr
Post 11. Long term GoalThe Group’s goal is to offer attr
 
Implementing And Managing A Multinational Privacy Program
Implementing And Managing A Multinational Privacy ProgramImplementing And Managing A Multinational Privacy Program
Implementing And Managing A Multinational Privacy Program
 
Whistleblower presentation
Whistleblower presentationWhistleblower presentation
Whistleblower presentation
 
IHST - SMS for Small Helicopter Fleets
IHST - SMS for Small Helicopter FleetsIHST - SMS for Small Helicopter Fleets
IHST - SMS for Small Helicopter Fleets
 
PACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other DocumentsPACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other Documents
 
UNIVERSITY OF THE CUMBERLANDS ITS 833 – INFORMATION GOVER.docx
UNIVERSITY OF THE CUMBERLANDS  ITS 833 – INFORMATION GOVER.docxUNIVERSITY OF THE CUMBERLANDS  ITS 833 – INFORMATION GOVER.docx
UNIVERSITY OF THE CUMBERLANDS ITS 833 – INFORMATION GOVER.docx
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
3.0 iSwimband_Business_Plan
3.0 iSwimband_Business_Plan3.0 iSwimband_Business_Plan
3.0 iSwimband_Business_Plan
 
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd PartiesPACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
 
Extended Essay Final Deadline 2014
Extended Essay Final Deadline 2014Extended Essay Final Deadline 2014
Extended Essay Final Deadline 2014
 
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
 

More from Sandeep Ratnam

Networ routingnswitching
Networ routingnswitchingNetwor routingnswitching
Networ routingnswitchingSandeep Ratnam
 
Melbourne t1 2016-assignment_2_mn504
Melbourne   t1 2016-assignment_2_mn504Melbourne   t1 2016-assignment_2_mn504
Melbourne t1 2016-assignment_2_mn504Sandeep Ratnam
 
Itech 1006 assignment 2 sem1 2017
Itech 1006 assignment 2 sem1 2017Itech 1006 assignment 2 sem1 2017
Itech 1006 assignment 2 sem1 2017Sandeep Ratnam
 
Itech 1006 assignment 2 sem1 2017 (2)
Itech 1006 assignment 2 sem1 2017 (2)Itech 1006 assignment 2 sem1 2017 (2)
Itech 1006 assignment 2 sem1 2017 (2)Sandeep Ratnam
 
Itc597 201730 sm_i-28_january_2017-version_1 (1)
Itc597 201730 sm_i-28_january_2017-version_1 (1)Itc597 201730 sm_i-28_january_2017-version_1 (1)
Itc597 201730 sm_i-28_january_2017-version_1 (1)Sandeep Ratnam
 
Itc561 201730 sm_i-21_january_2017-version_1
Itc561 201730 sm_i-21_january_2017-version_1Itc561 201730 sm_i-21_january_2017-version_1
Itc561 201730 sm_i-21_january_2017-version_1Sandeep Ratnam
 
Itc560 201730 sm_i-14_january_2017-version_1
Itc560 201730 sm_i-14_january_2017-version_1Itc560 201730 sm_i-14_january_2017-version_1
Itc560 201730 sm_i-14_january_2017-version_1Sandeep Ratnam
 
Itc548 system analysis
Itc548 system analysisItc548 system analysis
Itc548 system analysisSandeep Ratnam
 
Itc544 computer organization
Itc544 computer organizationItc544 computer organization
Itc544 computer organizationSandeep Ratnam
 
Itc508 objective modelling
Itc508 objective modellingItc508 objective modelling
Itc508 objective modellingSandeep Ratnam
 
Itc504 201730 sm_i-25_january_2017-version_1
Itc504 201730 sm_i-25_january_2017-version_1Itc504 201730 sm_i-25_january_2017-version_1
Itc504 201730 sm_i-25_january_2017-version_1Sandeep Ratnam
 
Coit20268 t1 17_port_prac2_spec
Coit20268 t1 17_port_prac2_specCoit20268 t1 17_port_prac2_spec
Coit20268 t1 17_port_prac2_specSandeep Ratnam
 
Coit20268 t1 17_port_prac1_spec
Coit20268 t1 17_port_prac1_specCoit20268 t1 17_port_prac1_spec
Coit20268 t1 17_port_prac1_specSandeep Ratnam
 
Coit20264 network design assignment 2
Coit20264 network design assignment 2Coit20264 network design assignment 2
Coit20264 network design assignment 2Sandeep Ratnam
 
Coit20247 ass1 requirementdba1 spec (1)
Coit20247 ass1 requirementdba1 spec (1)Coit20247 ass1 requirementdba1 spec (1)
Coit20247 ass1 requirementdba1 spec (1)Sandeep Ratnam
 
Coit20247 database design and development
Coit20247   database design and developmentCoit20247   database design and development
Coit20247 database design and developmentSandeep Ratnam
 

More from Sandeep Ratnam (20)

Req
ReqReq
Req
 
Network switching
Network switchingNetwork switching
Network switching
 
Networ routingnswitching
Networ routingnswitchingNetwor routingnswitching
Networ routingnswitching
 
Melbourne t1 2016-assignment_2_mn504
Melbourne   t1 2016-assignment_2_mn504Melbourne   t1 2016-assignment_2_mn504
Melbourne t1 2016-assignment_2_mn504
 
Itech 1006 assignment 2 sem1 2017
Itech 1006 assignment 2 sem1 2017Itech 1006 assignment 2 sem1 2017
Itech 1006 assignment 2 sem1 2017
 
Itech 1006 assignment 2 sem1 2017 (2)
Itech 1006 assignment 2 sem1 2017 (2)Itech 1006 assignment 2 sem1 2017 (2)
Itech 1006 assignment 2 sem1 2017 (2)
 
Itc597 201730 sm_i-28_january_2017-version_1 (1)
Itc597 201730 sm_i-28_january_2017-version_1 (1)Itc597 201730 sm_i-28_january_2017-version_1 (1)
Itc597 201730 sm_i-28_january_2017-version_1 (1)
 
Itc561 201730 sm_i-21_january_2017-version_1
Itc561 201730 sm_i-21_january_2017-version_1Itc561 201730 sm_i-21_january_2017-version_1
Itc561 201730 sm_i-21_january_2017-version_1
 
Itc560 201730 sm_i-14_january_2017-version_1
Itc560 201730 sm_i-14_january_2017-version_1Itc560 201730 sm_i-14_january_2017-version_1
Itc560 201730 sm_i-14_january_2017-version_1
 
Itc548 system analysis
Itc548 system analysisItc548 system analysis
Itc548 system analysis
 
Itc544 computer organization
Itc544 computer organizationItc544 computer organization
Itc544 computer organization
 
Itc508 objective modelling
Itc508 objective modellingItc508 objective modelling
Itc508 objective modelling
 
Itc504 201730 sm_i-25_january_2017-version_1
Itc504 201730 sm_i-25_january_2017-version_1Itc504 201730 sm_i-25_january_2017-version_1
Itc504 201730 sm_i-25_january_2017-version_1
 
Dba2 spec
Dba2 specDba2 spec
Dba2 spec
 
Csce 5580 001_s17_pa2
Csce 5580 001_s17_pa2Csce 5580 001_s17_pa2
Csce 5580 001_s17_pa2
 
Coit20268 t1 17_port_prac2_spec
Coit20268 t1 17_port_prac2_specCoit20268 t1 17_port_prac2_spec
Coit20268 t1 17_port_prac2_spec
 
Coit20268 t1 17_port_prac1_spec
Coit20268 t1 17_port_prac1_specCoit20268 t1 17_port_prac1_spec
Coit20268 t1 17_port_prac1_spec
 
Coit20264 network design assignment 2
Coit20264 network design assignment 2Coit20264 network design assignment 2
Coit20264 network design assignment 2
 
Coit20247 ass1 requirementdba1 spec (1)
Coit20247 ass1 requirementdba1 spec (1)Coit20247 ass1 requirementdba1 spec (1)
Coit20247 ass1 requirementdba1 spec (1)
 
Coit20247 database design and development
Coit20247   database design and developmentCoit20247   database design and development
Coit20247 database design and development
 

Recently uploaded

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

Coit20263 information security management assignment 2

  • 1. 1 | 4 Need this or a similar Assignment Contact: qualityonewriters@gmail.com Whatsapp/Call: +91-9502220077 COIT20263 Information Security Management (Term 1, 2017) Assessment Item 2—Practical and Written Assessment Due date: 11:30pm AEST, Friday, Week 7 ASSESSMENT Weighting: 35% 2 Length: 2000 words (±500 words) Objectives This assessment task can be undertaken in a group of up to 4 members or individually. Each group/student will analyse the scenario given on page 3, and develop and document the specified Issue Specific Security Policy (ISSP) for the organisation. Assessmentcriteria The students are assessed against their ability to analyse the given scenario and develop the specified ISSP. The marking criteria for Assessment Item 2 are provided on page 4.Students need to familiarise themselves with the marking criteria to ensure that they have addressed them when preparing the document for this assessment item. Assessment Task Each group/studentis required to analyse the scenario given on page 3 and develop a ‘Use of Personal Digital Devices Policy’ for the organisation described in the scenario. The ISSP should include: 1. Statement of Purpose 2. Authorised Uses 3. Prohibited Uses 4. Systems Management 5. Violations of Policy
  • 2. 2 | 4 6. Policy Review and Modification 7. Limitations of Liability You also need to include a section containing the justification of the contents of your policy as well as any assumptions that you have made. Note:Each student in the group needsto upload the ISSP document of their group to Moodle. You must follow the Harvard citation and referencing guidelines when writing the ISSP document and include a reference list. Please do not include an executive summary, a table of contents, an introduction or a conclusion. Please use the ‘Template for Your Answers’ Section of this document and upload only that template. Check the unit website at least once a week for further information relating to this assessment task. Please ensure that you write your answers in your own words to avoid possible plagiarism and copyright violation. You can understand the Plagiarism Procedures by following the corresponding link in the CQUniversity Policies section of the Unit Profile. Submission To be submitted online through the COIT20263 Moodle unit website assessment block on or before the due date.
  • 3. 3 | 4 The Scenario for Information Security Management Assessment Tasks Auto-fishing Group (AG) is a cooperative society of fishermen in Tasmania establisheda year ago. AG was established to increase the fish yield of its member fishermen and supply the fish to the consumers as quickly as possible at a reasonable price. Using sophisticated technology, including Unmanned Aerial Vehicles (UAVs),the fishermen locate the schools of fish suitable for consumption without catching them indiscriminately and thereby reducing over fishing. AG directly supply the fish from the fishermen to the customers without an intermediary. To this end, AG has its own vehicles, ten distribution centres along the coast of the state and three distribution vehicles at each distribution centre. Each fisherman will be affiliated to a distribution centre. AG operates from a small office in Hobart. When a customer places an order using the application of AG or over the phone, the order is processed using a proprietary software program of AG. By using this software,AG is only be able to receive the optimum quantity of fish from the fishermen on time but also be able to deliver the order to the customers quickly. This whole process is automated with the help of on-board computers on the distribution vehicles connected to the office of AG and the mobile devices of the fishermen. The fishermen can get connected to the Internet and post questions to online forums. AG also has an online banking society that provides most of the main banking facilities of other banks to its member fishermen. AG also has a marine and fisheries training centre in Hobart. The centre has a managing director, a secretary and two instructors. There are 20 students at any time in the training centre,participating in the classes. The instructors can show the students the live videos of fish shoals and schools as well as the techniques used by the fishermen. The network of the training centre is a part of the network of AG. AGneeds the guarantee that their proprietary application, and various data and information in their information system are secured. After the success in Tasmania, AG expanded its services to fishermen and customers in Victoria as well. As the society was established last year, the information security policies have not yet been developed. The society is now in the process of developing a comprehensive set of information security policies for its information system. Note: This scenario was createdby Dr Rohande Silva on 10thDecember2016andno part of this scenario shouldbe reproducedby any individual or an organisationwithout written permissionfromCQUniversity, Australia.
  • 4. 4 | 4 Marking Criteria Section HD D C P F Max Mark Mark 6 5.1 4.8 4.5 4.2 3.9 3.6 3 2.7 0 Assumptions Listedall assumptions. Some assumptions missing. Most assumptions missing. Not clear and most assumptions missing. All assumptions missing. 6 Section HD D C P F 3 2.55 2.4 2.25 2.1 1.95 1.8 1.5 1.35 0 Statement ofPurpose Containedall information in detail. Containedall information but not enough detail. Had too brief or missing information. Not clear but contained most information. Not clear and most information missing. 3 Authorised Uses Containedall information in detail. Containedall information but not enough detail. Had too brief or missing information. Not clear but contained most information. Not clear and most information missing. 3 Prohibited Uses Containedall information in detail. Containedall information but not enough detail. Had too brief or missing information. Not clear but contained most information. Not clear and most information missing. 3 Systems Management Containedall information in detail. Containedall information but not enough detail. Had too brief or missing information. Not clear but contained most information. Not clear and most information missing. 3 Violations ofPolicy Containedall information in detail. Containedall information but not enough detail. Had too brief or missing information. Not clear but contained most information. Not clear and most information missing. 3 Policy Review and Modification Containedall information in detail. Containedall information but not enough detail. Had too brief or missing information. Not clear but contained most information. Not clear and most information missing. 3 Limitations and Liability Containedall information in detail. Containedall information but not enough detail. Had too brief or missing information. Not clear but contained most information. Not clear and most information missing. 3 Section HD D C P F 6 5.1 4.8 4.5 4.2 3.9 3.6 3 2.7 0 Justification Focussed and contained all information in detail. Focussed and contained but not enough detail. Focussed but some information missing. Not clear but contained most information. Not clear and most information missing. 6 Section HD D C P F 2 1.7 1.6 1.5 1.4 1.3 1.2 1 0.9 0 References All references are listedaccordingto Harvardreferencestyle. A few referencingerrors. Not all references are listed but correctly referenced.. Many references missing No or incorrect reference list.. 2
  • 5. 5 | 4 TEMPLATE FOR YOUR ANSWERS COIT20263 Information Security Management - Assessment Item 2 (Term 1, 2017) Names and student numbers of group members: Use ofPersonal Digital Devices Policy Mark allocated Mark earned Assumptions 6 1 Statement of Purpose 3 2 Authorised Uses 3 3 Prohibited Uses 3 4 Systems Management 3 5 Violations of Policy 3 6 Policy Review and Modification 3 7 Limitations of Liability 3 Justification 6 References 2 Late submission penalty Plagiarism penalty Total 35