1
COMP9721 Assessment 3, S1-2018
COMP9721- Enterprise Information Security
Assessment 3 - Completion of Contingency Plan: Implementation, Guideline
& Timeline Proposal
Semester 1, 2018
Details:
Title: Assessment 3 – Completion of Contingency Plan: Implementation, Guideline
& Timeline Proposal
Due Date: 5.00 PM (GMT+8) Friday, 8th June 2018
Value: 40% of the final mark for the topic
Length: Maximum of 6000 words (excluding cover page and references)
Note: This Assessment 3 is not the same as for COMP3721 (undergraduate topic) – there
are additional research component on compliance to regulation and standards, as noted
in the task section below.
Purpose of this assignment:
The purpose of this assignment is to support the following Learning Outcomes (LO) for this
topic:
LO1: Understand the purpose and context of a range of typical business information
systems.
LO2: Understand the importance of securing the information of an organisation.
LO3: Recognise the security issues associated with the integration of various information
systems within an enterprise.
LO4: Understand the principles of computer security.
LO5: Analyse security risks and prepare information and computer security plans.
LO6: Prepare and present consultant's reports on aspects of computer security.
LO7: Critically analyse publications in the area of computer security.
The assessments in this topic follow on from one another (formative) across the three assessments.
This means that you will to use the preceding assessment to complete the following one. For
instance, you will need the outcome from Assessment 1 to be able to complete Assessment 2, and
the outcome from Assessment 2 to complete Assessment 3.
Case Study:
Megacorp, a subsidiary of Generico Inc., have hired you to undertake a full risk assessment of
their cu
ent security posture as they prepare to move to operating on a multinational scale.
2
COMP9721 Assessment 3, S1-2018
Megacorp cu
ently processes and stores financial and client data in-house, with cloud
services for operational usage and productivity.
Staff work on Windows desktops, with an ad hoc patching cycle. There is also a backup system
for the legacy in-house Windows servers, although the details of how this is configured is
unknown as the System Administrator responsible for this process has recently left the
company and did not leave any documentation on this. Megacorp use an old storage room as
their server room, as the legacy software sometimes requires easy physical access to the
servers running them for maintenance. The office is open-plan, and staff are encouraged to
get up and move around during the day. The cloud system is used mainly for document
collection, although there is not a mandated service specified by the company.
Given the quality of your preceding documents, the company has asked that you provide
ecommendation of timelines, implementation recommendations and ongoing maintenance
guidelines, in reference to your analysis. Given the period of cu
ent rapid expansion,
management wants only a report for the most critical risks identified in the analysis.
Task:
Based upon your risk assessment and risk register from Assessment 2, you must complete the
contingency plans to expand on Assessment 2.
A report for the CEO, CIO and CISO, providing an outline of steps required for implementing
controls, along with a rough timeline and maintenance aspects. This report should cover:
- Deployment and implementation guidelines for specific risk controls
- Maintenance guidelines on each presented control
- Timelines for each aspect
- Summary of your preceding content and documentation
In addition, you must research and identify the regulations, legislation and international
standards that should/could be used in the contingency planning measures from Assessment
2.
Report Requirements:
Must Contain
Cove
Title Page
This must contain the topic code and title, assignment title, your name
and student identification, due date.
Executive Summary
Table of Contents
This must accurately reflect the content of your report and must be
generated automatically in Microsoft Word with page numbers.
Introduction
3
COMP9721 Assessment 3, S1-2018
A
ief outline of what the document includes, how it is structured and
what you based your decisions in the report on.
Main content .
You should structure this under appropriate headings.
References
A list of end-text references formatted according to the Flinders APA
Referencing XXXXXXXXXXPDF 95KB) requirements. It is recommended that
Endnote is used to manage references. Your references should comprise
of books, journal articles, and conference papers.
Format
This report should be no more than 6,000 words (excluding references
and diagrams) and labelled as
studentlastname_studentfirstname>.docx and should be in a single file.
Your assignments must be word-processed and the diagrams be
developed using graphics software (most word-processors provide this
facility). The text must be no smaller than 12pt and font Times New
Roman
Marking Ru
ic:
40% Total = 40 marks
Assessment criteria Maximum marks for
this element
Student mark
Previous Content
All Critical Risks identified are
present
2
Appropriate Diagrams/Tables 2
Summarised co
ectly 2
Maintenance Guidelines
Relevant to each asset 2
Timeline is appropriate for the
asset
2
Included relevant
esponsibilities / roles /
outcomes
4
Links to implementation
guidelines
4
Implementations
Detailed Outcomes 1
Justifications are adequate &
ealistic
2
Appropriate to the asset 1
In-line with the risk-analysis and
Business Impact Analysis
2
Timeline for implementations
are realistic and achievable
2
Applicable solutions proposed 2
http:
www.flinders.edu.au/slc_files/Documents/Blue%20Guides/APA%20Referencing%20%282017%29.pdf
http:
www.flinders.edu.au/slc_files/Documents/Blue%20Guides/APA%20Referencing%20%282017%29.pdf
4
COMP9721 Assessment 3, S1-2018
Regulations/Legislation
Regulation identified are
applicable
1
Justification of regulations 4
Standards
Standards identified are
applicable
1
Justification of standards 4
Report
Layout & Readability 0.5
Language Usage 0.5
Content Covered 0.5
Referencing 0.5
Total mark 40 (Maximum)
Late submission:
As stated in the official Statement of Assessments Methods (S XXXXXXXXXXfor this topic, an
assessment submitted after the fixed or extended time for submission shall incur a penalty to
e calculated as 5% of the total mark for the assessment for each day, (or part thereof) up to
5 business days (Monday-Friday) it is late. After 5 days the assessment will be awarded a zero
(0) mark.
Academic Misconduct (Including Plagiarism):
Flinders University regards academic misconduct of any form as unacceptable. Academic
misconduct, which includes but is not limited to, plagiarism; unauthorised collaboration;
cheating in examinations; theft of other students’ work; collusion; inadequate and inco
ect
eferencing; will be dealt with in accordance with the Flinders Policy on Academic Integrity
Policy.
http:
www.flinders.edu.au/academicintegrity/
http:
www.flinders.edu.au/academicintegrity/student.cfm
Turnitin:
Turnitin is expected to be used for all assignments across the University. More information and links
to Turnitin can be found on FLO. It is recommended that you submit a draft of your work via the
Turnitin draft mechanism, to check it for e
ors in advance. Leave sufficient time for this process,
which can be up to 24 hours.
Extensions:
If you require an extension for submission, you may request one, on an individual basis through the
automated extension request tool located on FLO. This is in the ‘General’ section on the FLO topic
page.
http:
www.flinders.edu.au/academicintegrity
http:
www.flinders.edu.au/academicintegrity/student.cfm
1
COMP9721 Assessment 1, S1-2018
COMP9721- Enterprise Information Security
Assessment 1 – Case Study Analysis and Risk Register
Semester 1, 2018
Details:
Title: Assessment 1- Case Study Analysis and Risk Register
Due Date: 5.00 PM (GMT+8) Friday, 30th March 2018
Value: 30% of the final mark for the topic
Length: Maximum of 2000 words (excluding cover page)
Purpose of this assignment:
The purpose of this assignment is to support the following Learning Outcomes (LO) for this
topic:
LO1: Understand the purpose and context of a range of typical business information systems
LO2: Understand the importance of securing the information of an organisation
LO3: Recognise the security issues associated with the integration of various information
systems within an enterprise
LO4: Understand the principles of computer security
LO5: Analyse security risks and prepare information and computer security plans
LO6: Prepare and present consultant's reports on aspects of computer security
The assessments in this topic follow on from one another (formative) across the three assessments.
This means that you will to use the preceding assessment to complete the following one. For
instance, you will need the outcome from Assessment 1 to be able to complete Assessment 2, and
the outcome from Assessment 2 to complete Assessment 3.
Case Study:
Before the design of new security solutions can begin, the security analyst must first
understand the cu
ent state of the organization and its relationship to security. Megacorp, a
subsidiary of Generico Inc., have hired you to undertake a full risk assessment of their cu
ent
security posture as they prepare to move to operating on a multinational scale. Megacorp
cu
ently processes and stores financial and client data in-house, with cloud services for
operational usage and productivity.
Staff work on Windows desktops, with an ad hoc patching cycle. There is also a backup system
for the legacy in-house Windows servers, although the details of how this is configured is
2
COMP9721 Assessment 1, S1-2018
unknown as the System Administrator responsible for this process has recently left the
company and did not leave any documentation on this. Megacorp use an old storage room as
their server room, as the legacy software sometimes requires easy physical access to the
servers running them for maintenance. The office is open-plan, and staff are encouraged to
get up and move around during the day. The cloud system is used mainly for document
collection, although there is not a mandated service specified by the company.
Task:
This assessment is designed to demonstrate your knowledge and analysis of a specific security
context Using the case study provided, create a risk register for the threat environment for
Megacorp as they move towards an international operation. This