Choose any IT system that helps in managing a business and carry out a detailed case study on IT security management aspects of it.The case study report should cover the following with respect to the chosen system.
1. Clear description of the chosen system that covers the following: [7 Marks]
. Type, nature, Organization /company where it is used and its major functions for
running the business of an Organization
. lnformation Security professionals working in the Organization and their roles
o Location of the company, Major assets
. Types of users, customers
. Major threats to lnformation Security (lS)
2. Ms. Zainab has been newly appointed as an /S Manager of the considered organization.
Suggest the most suitable lS certification that can support Ms.Zainab to manage the lS of
the considered system and analyze the key responsibilities of her with respect to any two
key CBK domains. [9 marks]
3. Apply the risk management procedure by identifying possible risks and its impact in
profiVreputation of the organization. Provide the deliverable worksheets at the end of each
step of risk management process by making your own assumptions with clear description.
[15 marks]
4.
Explain various needs by which the access control requirements are driven by, with
respect to the chosen system. [5 marks]
Explain the minimal access requirements for each of the involved principals in the
system and identify the suitable access control mechanisms to be adopted with
appropriate
justifications
[5 marks]
Configure user access controls and permissions with Active Directory in Windows
2000 server and demonstrate the steps involved along with screenshots. [15 marks]
5. Analyze any three possible intellectual property violations that could be performed by the
cybercriminals in the considered system and how does IPR helps to combat them.
[6 marksl
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more
Recent Comments