COIT20263 Information Security Management (HT1, 2020) Assessment Item 2 - Group Discussion Due dates: 8:00am AEST, Monday, Week 8 ASSESSMENT Weighting: 25% 2 Length: No word count limit. Objectives...

1 answer below »
cv


COIT20263 Information Security Management (HT1, 2020) Assessment Item 2 - Group Discussion Due dates: 8:00am AEST, Monday, Week 8 ASSESSMENT Weighting: 25% 2 Length: No word count limit. Objectives This assessment task relates to Unit Learning Outcomes 1 and 5 and can be undertaken in a group of up to 4 members or individually. Distance students can form groups with on-campus students as well. You will analyse the scenario given on page 3 and discuss the issues given in the Assessment Task below by contributing to the Group Discussion Forum of your group in Moodle during weeks 3, 4, 5, 6 & 7. Assessment Task Each one of you in the group is required to analyse the scenario given on page 3 and discuss the following issues in the specified weeks by contributing to the Group Discussion Forum of your group. Your contributions should contain in-depth information to earn a high mark. Your contributions should be new or beyond (extensions of) what has already been contributed by the others in your group. a) Two legal issues related to mishandling of information by the data analyst of F4F (Due in week 3). b) Two ethical issues in InfoSec to be followed by the delivery staff of F4F (Due in week 4). c) Two measures that F4F should take to prevent its staff members from handling information unethically (Due in week 5). d) Two procedure and process documentations that you would include in the InfoSec program of F4F (Due in week 6). e) Two InfoSec policies that you would recommend for F4F (Due in week 7). Check the unit website at least once a week for further information relating to this assessment task. Please ensure that you use your own words in your discussion blogs to avoid possible plagiarism and copyright violation. You can understand the Plagiarism Procedures by following the corresponding link in the CQUniversity Policies section of the Unit Profile. Assessment Criteria Each one of you are assessed individually on your ability to address the issues given in the Assessment Task and make meaningful contributions to the Group Discussion Forum of your group in Moodle in the specified weeks. Please note that your contributions should be new or beyond what has already been contributed by the others in your group. The marking criteria for Assessment Item 2 are provided on page 4. You need to familiarise yourself with the marking criteria to ensure that you complete this assessment task timely and properly. Submission Each one of you should copy/paste your individual contributions that you made in the Group Discussion Forum to a Word document and upload it through the COIT20263 Moodle unit website assessment block on or before the due date. . The Scenario for Information Security Management Assessment Tasks Farmers 4 Farmers (F4F) is a cooperative society of farmers located in Brisbane, QLD, Australia. The company that designs and deploys the network for F4F has sub-contracted your company the task of developing a suitable information security management program for F4F. F4F was established to supply fresh produce from the farmers to the clients who are retailers at a cost-effective and efficient manner. A second objective of F4F is to provide better prices for the produce to the farmers. A third objective of F4F is to provide fertilizer and other required items for the farmers. The Brisbane office of F4F consists of the managing director, a data analyst, a logistics manager and an accountant. The data analyst will need to deal with large volumes of clients and sales data as well as product information of the farmers. F4F has a fleet of delivery trucks that operate in various regions in QLD. Clients should be able to place their delivery orders for produce and pay using the web interface of F4F. Delivery vehicles collect the produce listed in the delivery orders from the closest farmers and deliver them to the clients. The clients can communicate with the delivery trucks and view the produce on line before giving their approval to purchase them. A software program ensures this whole process. All financial transactions related to the farmers and the clients are handled by the Brisbane office. For the protection of client and business information, F4F has deployed a highly secure network for the Brisbane office and the delivery trucks. Note: This scenario was created by Dr Rohan de Silva on 3rd January 2020 and no part of this scenario should be reproduced by any individual or organisation without written permission from CQUniversity, Australia. 2 | 4 Marking Criteria Discussion Week HD D C P F Max Mark Mark Obtained 5 4 3.5 2.5 2 1 0 Week 3 Relevant and new information specific to the scenario with sufficient details. Relevant and new information specific to the scenario with some details. Relevant and new information specific to the scenario but too brief. Relevant and new information but generic. No new contribution. Just summarising or paraphrasing the contributions of others of the group or agreeing or disagreeing to them. Not relevant contribution. Not attempted. 5   Week 4 Relevant and new information specific to the scenario with sufficient details. Relevant and new information specific to the scenario with some details. Relevant and new information specific to the scenario but too brief. Relevant and new information but generic. No new contribution. Just summarising or paraphrasing the contributions of others of the group or agreeing or disagreeing to them. Not relevant contribution.. Not attempted. 5   Week 5 Relevant and new information specific to the scenario with sufficient details. Relevant and new information specific to the scenario with some details. Relevant and new information specific to the scenario but too brief. Relevant and new information but generic. No new contribution. Just summarising or paraphrasing the contributions of others of the group or agreeing or disagreeing to them. Not relevant contribution.. Not attempted. 5 Week 6 Relevant and new information specific to the scenario with sufficient details. Relevant and new information specific to the scenario with some details. Relevant and new information specific to the scenario but too brief. Relevant and new information but generic. No new contribution. Just summarising or paraphrasing the contributions of others of the group or agreeing or disagreeing to them. Not relevant contribution.. Not attempted. 5   Week 7 Relevant and new information specific to the scenario with sufficient details. Relevant and new information specific to the scenario with some details. Relevant and new information specific to the scenario but too brief. Relevant and new information but generic. No new contribution. Just summarising or paraphrasing the contributions of others of the group or agreeing or disagreeing to them. Not relevant contribution.. Not attempted. 5     Plagiarism penalty     Late submission penalty     Total 25   COIT20263 Information Security Management (HT1, 2020) Assessment Item 2 - Group Discussion Due dates: 8:00am AEST, Monday, Week 8 ASSESSMENT Weighting: 25% 2 Length: No word count limit. Objectives This assessment task relates to Unit Learning Outcomes 1 and 5 and can be undertaken in a group of up to 4 members or individually. Distance students can form groups with on-campus students as well. You will analyse the scenario given on page 3 and discuss the issues given in the Assessment Task below by contributing to the Group Discussion Forum of your group in Moodle during weeks 3, 4, 5, 6 & 7. Assessment Task Each one of you in the group is required to analyse the scenario given on page 3 and discuss the following issues in the specified weeks by contributing to the Group Discussion Forum of your group. Your contributions should contain in-depth information to earn a high mark. Your contributions should be new or beyond (extensions of) what has already been contributed by the others in your group. a) Two legal issues related to mishandling of information by the data analyst of F4F (Due in week 3). b) Two ethical issues in InfoSec to be followed by the delivery staff of F4F (Due in week 4). c) Two measures that F4F should take to prevent its staff members from handling information unethically (Due in week 5). d) Two procedure and process documentations that you would include in the InfoSec program of F4F (Due in week 6). e) Two InfoSec policies that you would recommend for F4F (Due in week 7). Check the unit website at least once a week for further information relating to this assessment task. Please ensure that you use your own words in your discussion blogs to avoid possible plagiarism and copyright violation. You can understand the Plagiarism Procedures by following the corresponding link in the CQUniversity Policies section of the Unit Profile. Assessment Criteria Each one of you are assessed individually on your ability to address the issues given in the Assessment Task and make meaningful contributions to the Group Discussion Forum of your group in Moodle in the specified weeks. Please note that your contributions should be new or beyond what has already been contributed by the others in your group. The marking criteria for Assessment Item 2 are provided on page 4. You need to familiarise yourself with the marking criteria to ensure that you complete this assessment task timely and properly. Submission Each one of you should copy/paste your individual contributions that you made in the Group Discussion Forum to a Word document and upload it through the COIT20263 Moodle unit website assessment block on or before the due date. . The Scenario for Information Security Management Assessment Tasks Farmers 4 Farmers (F4F) is a cooperative society of farmers located in Brisbane, QLD, Australia. The company that designs and deploys the network for F4F has sub-contracted your company the task of developing a suitable information security management program for F4F. F4F was established to supply fresh produce from the farmers to the clients who are retailers at a cost-effective and efficient manner. A second objective of F4F is to provide better prices for the produce to the farmers. A third objective of F4F is to provide fertilizer and other required items for the farmers. The Brisbane office of F4F consists of the managing director, a data analyst, a logistics manager and an accountant. The data analyst will need to deal with large volumes of clients and sales data as well as product information of the farmers. F4F has a fleet of delivery trucks that operate in various regions in QLD. Clients should be able to place their delivery orders for produce and pay using the web interface of F4F. Delivery vehicles collect the produce listed in the delivery orders from the closest farmers and deliver them to the clients. The clients can communicate with the delivery trucks and view the produce on line before giving their approval to purchase them. A software program ensures this whole process. All financial transactions related to the farmers and the clients are handled by the Brisbane office. For the protection of client and business information, F4F has deployed a highly secure network for the Brisbane office and the delivery trucks
Answered Same DayMay 02, 2021COIT20263Central Queensland University

Answer To: COIT20263 Information Security Management (HT1, 2020) Assessment Item 2 - Group Discussion Due...

Akriti answered on May 04 2021
147 Votes
I. Two legal issues related to mishandling of information by the data analyst of F4F
Data analytics comprises of the program designed and deliberated to derive valuable and expedient information by acquiring, extracting and evaluating the data collected. The application of the Privacy Act, 1988 [1] read in juxtaposition with Australian Privacy Principles (APP) [2] has a crucial impact on how data analytical activities are legally required to be carried out. Interpretation of the same by the Office of the Australian Information Commissioner (OAIC)
should also have a bearing on coming up with legally sound information security management decisions.
Data analyst of F4F is legally required to de-identify personal data as much as possible, give out clear notices of the usage of personal and sensitive data, etc. Legal fallouts on this count can be consciously and unconsciously done. In this segment, the author has tried to bring out how the data analyst can be at fault, legally, despite ‘not’ having acted with any mala-fide intention.
Arising out of these, following are the two prime legal issues, inter alia many others, related to incompetence in handling of information by the data analyst wing of F4F:
1. Problem of construction of personal information by data analytics
An inadvertent and an unconscious misuse of information can be caused by construction of personal information by data analytics. Explanatorily, such creation of information through data analytics is possible wherein the information develops into identified/identifiable in the process of analyzing non-identifiable information.
Another example of the same can be creation of information by a tracked pattern collected by fitness devices or fitness apps, which after a long time develops into a clear-cut pattern and leads to creation of personal information with respect to health of an individual. Considering the fact that the data analyst of F4F is engaging with huge volumes of data ranging from product information & sales data to client information, it is likely that he/she may come across collection of information.
Such “creation of information” is also covered under the ambit of collection of personal information. So, it needs to be checked that if the personal data, so created, could not be covered under APP 3, it needs to be either completely destructed or de-identified. De-identification or anonymization or confidentialisation is a process adopted after which the information is no longer categorized as personal information, such as, by removing personal information and instead assigning unique numbers to represent it. [3]
2. Usage of data outside the scope allowed by the Privacy Policy
Another hidden and usually the less emphasized issue wherein the data analyst can be held legally liable for mishandling information is by using the data outside the scope allowed by the Privacy Policy. It might be done intentionally, as well as unconsciously. The conscious mishandling can be unauthorized use of the information by selling off the information or by using it in marketing without prior consent, etcetera.
The unconscious mishandling is possible in a scenario if the data analyst of F4F has no clue in initial stages of processing the huge voluminous data around what exactly this data will be used for. Also, every stage of processing might unravel new prospects for usage of data. In such scenario, usage of data beyond previously stated privacy policy can be problematic. To deal with this, it is a better practice to try to emphasize the objectives of usage of data, even when their exact use cannot be determined.
II. Two ethical issues in InfoSec to be followed by the delivery staff of F4F
The delivery fleet of F4F is in contact with a lot of data which can include sensitive data as well, such as names, phone numbers of clients, their residential addresses, geo-political locations, preferred times of delivery, etc. Such information can be prone to be deployed to unethical and unfair use by the delivery staff, if it is not well managed.
1. Gaining unsolicited and unauthorized access to personalized information can lead to breach of the core right of privacy and confidentiality. This is one of the prime ethical issues while handling information by delivery employees, and comes off as a ‘creepy’ tactic.
2. Another major and very serious ethical issue is the risk of information sharing by the employees in contravention to the organization’s privacy policy and domestic information security laws. This information can be shared for money to anyone who might put it to use in a range of activities such as marketing, employing in behavioral study, blackmailing, etc., all without any adequate disclosure to the individuals whose information is being shared against their right to autonomy. Such practices on part of employees are bereft of loyalty to their organization (by breaching its privacy commitments made to clients and jeopardizing its integrity and trustworthiness) as well as fundamental ethic of respecting one’s right to personal space.
III. Two measures to prevent staff members of F4F from handling information unethically
The success of information security management efforts of an organization largely depends on conduct of its employees. In such cases, it is highly imperative to determine and establish strong measures to extract compliance to ethical information security practices from the staff members. Two measures to address the same issue are:-
1....
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here