Unit Name/Code ISY3006 Information Security Assessment Type Report Assessment Number Assessment Three Assessment Name Report Unit Learning LO3 - Research, develop, and document a basic security...

1 answer below »
Hello, Please find Assessment Details, and I have selected "Westmead Hospital" as my Report topics.


Unit Name/Code ISY3006 Information Security Assessment Type Report Assessment Number Assessment Three Assessment Name Report Unit Learning LO3 - Research, develop, and document a basic security policy, Outcomes Assessed and analyse, record, and resolve all security incidents LO4 - Identify and assess the threats to, and vulnerabilities of networks Due Date and Time Friday, 31 January, 2020 by 5:00pm Weighting 20% Assessment This assessment is designed to help students to research and Description analyze hot topics related to information security. Detailed Submission Submit a word document through Turnitin in the unit Moodle Requirements page Assessment Details Total Marks: 20 Length Minimum = 1,800 words Maximum = 2,200 words Report Type Individual Report Assignment This is an individual assessment. This report gives you the opportunity to research, formulate, develop and document a basic security policy for a specific organization in Australia ECXEPT for BANKING/MORTGAGE organisation. Moreover, you are required to analyze, record, resolve security incidents and identify and assess the threats to, and vulnerabilities of the organisation’s networks. This report will use many of the concepts and techniques discussed in this unit throughout the semester. Please note, you will need to either choose from the list of examples of the industries provided below or come up with your own idea for a chosen specific organisation. Hospital/Medical Centre Supermarket Vehicle rental Tourism agency Hotel/Motel Australian Institute of Higher Education CRICOS Provider Code: 03147A Level 3 & 4 545 Kent Street Sydney NSW 2000 Australia T: +612 9020 8050 W: www.aih.nsw.edu.au http://www.aih.nsw.edu.au/ School/University Library Aviation operator Property Management Please discuss your chosen organisation and or ideas with your lecturer before you start your research. You must send the organization that you have chosen to your lecturer by Week 5. Please note you might NOT be allowed to choose the same or similar specific organisation as other in your class. You should aim at research, develop, and document answers to questions (a.) and (b.) below. Do not copy the examples of information security policies used in class! You should state clearly: the name of the organisation you have chosen the stakeholders of the organisation the nature of the business and answer questions (a) and (b). Questions: (a.) Research, formulate, develop and document a strategic security policy for your chosen organisation based on the nature of the organisation and the stakeholders in the organisation. (b.) Based on the security policy you have researched, formulated, developed and documented in the item (a.) above, identify and assess the potential threats and vulnerabilities of the company’s network and discuss how such threats and vulnerabilities can be mitigated based on your research. Referencing and Plagiarism All information in the report should be in your own words and not copied from other sources. Any idea used should be referenced appropriately according to AIH policies and procedures. The report will be submitted through Turnitin and similarities may attract large penalties according to AIH policies and procedures. Please refer to the AIH Academic Misconduct Policy: http://www.aih.nsw.edu.au/content/1-home/8- more-info-tabs/3-official-policies/academic-misconduct-policy.pdf It is essential to use IN TEXT referencing. If you are using the exact words from a reference then you must use quotation marks. You can use Harvard Style referencing with numbers, with a listing at the end of the report. Microsoft Word has an EndNote plugin that makes this style very easy and clear to follow. https://library.sydney.edu.au/subjects/downloads/citation/Harvard_Complete.pdf Australian Institute of Higher Education CRICOS Provider Code: 03147A Level 3 & 4 545 Kent Street Sydney NSW 2000 Australia T: +612 9020 8050 W: www.aih.nsw.edu.au http://www.aih.nsw.edu.au/ DO NOT COPY AND PASTE FROM THE INTERNET OR COPY OTHER STUDENTS’ WORK! Submission You are required to submit a digital copy of the report to Turnitin on Moodle by Friday, 31st January, 2020. You will NOT need to submit a hard copy. Late submissions will attract a 5% late penalty (of the maximum mark) per day (or part thereof) as per the late submission policy. Report Structure Cover Page - your name, ID, subject, date, report title and WORD COUNT Executive Summary Table of Contents - listed sections (and sub-sections if required) Introduction - Brief and clear introduction Body References-listing of all cited literature. A small number of high-quality references strategically used is the main aim here. Formatting Guide Font: Times New Roman 12pt for paragraph text, 14pt bold for headings, with single paragraph breaks between paragraphs. Line Spacing: 1.5, Margins: 2cm all around Alignment: left-aligned. Page numbering: Insert page number Australian Institute of Higher Education CRICOS Provider Code: 03147A Level 3 & 4 545 Kent Street Sydney NSW 2000 Australia T: +612 9020 8050 W: www.aih.nsw.edu.au http://www.aih.nsw.edu.au/ Marking Guide Element Ranking 1 2 3 4 5 Possible Actual marks marks Poor Fair Good Very good Excellent 3 Format, Basic and Basic and partially Clear and Clear and Clear and Sources, and partially correct format, less correct format, correct format, correct format, grammar correct format, recent fair-quality recent fair- recent high- recent high- non- articles, scholarly quality quality quality articles, contemporary language not used articles, articles, scholarly low-quality and poor attention scholarly scholarly language articles, to detail language language throughout and scholarly Few partly used mostly used thorough language not sections/paragraphs and good and quite attention to used and poor smoothly and thorough thorough detail attention to logically linked attention to attention to sections/ detail detail detail paragraphs Little evidence Some Most sections/ smoothly and of smooth sections/ paragraphs logically linked linking and paragraphs smoothly and logical linking smoothly and logically linked logically linked 0.5 mark 1 mark 1.5 marks 2 marks 3 marks Research, Very basic Some basic Good basic Sound overall Detailed and 3 formulate, research and research and research and research and excellent with develop and documentation documentation of a documentation documentation research and document a of a strategic strategic security of a strategic of a strategic documentation strategic security policy policy security policy security policy of a strategic security security policy policy for 0.5 mark 1 mark 1.5 marks 2 marks 3 marks your chosen organisation identify and Very basic Some basic Good basic Sound overall Detailed and 3 assess the identification identification and identification identification excellent potential and assessment of the and and identification threats and assessment of potential threats assessment of assessment of and vulnerabilities the potential and vulnerabilities the potential the potential assessment of threats and threats and threats and the potential vulnerabilities vulnerabilities vulnerabilities threats and and mitigation vulnerabilities 0.5 mark 1 mark 1.5 marks 2 marks 3 marks Discuss how Very basic Some basic Good basic Sound overall Detailed and 3 such threats mitigation of mitigation of the mitigation of mitigation of excellent and the potential potential threats the potential the potential mitigation of the vulnerabilities threats and and vulnerabilities threats and threats and potential threats can be vulnerabilities vulnerabilities vulnerabilities and mitigated vulnerabilities 0.5 mark 1 mark
Answered Same DayJan 23, 2021

Answer To: Unit Name/Code ISY3006 Information Security Assessment Type Report Assessment Number Assessment...

Arunavo answered on Jan 30 2021
133 Votes
ISY3006 INFORMATION SECURITY
(WESTMEAD HOSPITAL)
Table of Contents
Introduction    3
Background of Westmead Hospital    3
Strategic Security Policy    3
Potential Security Threats    5
Conclusion    7
References    8
Introduction
In the fast growing business sector, the security of information is a big concern for any organisation. As more and more examples of the security compromise like hacking and attack of viruses in th
e IT system, the need for an advance security policy must be adopted to protect and keep their information secure. In the following report, the discussion will be done on the security policy of Westmead Hospital, which is one of the renowned hospitals of West Sydney. As in the hospital, there are much vital information and also the transaction and account information that are kept and there are many chances that they might be compromised due to the attack on the IT security. Therefore, steps and measures should be adopted to keep the data secured and the further discussion of the methods and their protection from potential venerable attacks is discussed.
Background of Westmead Hospital
Westmead Hospital or also known as Western Sydney Local Health District (WSLHD) is one of the leading clinical services, research and education provider, which is serving providing a diverse healthcare facilities to more than 946,000 peoples in Sydney’s west, part and to others part also. The hospital is responsible for providing and managing a $1.7 billion in public healthcare, which spans around 120 suburbs, which is approximately 780 kilometres. The hospital provides innovative healthcare services, which comes from the diverse economic, social and cultural background. Westmead Hospital is one of the specialised hospitals for the western metropolitan area and a major teaching hospital of the University of Sydney for medical and dental pursuing students (Westmead Hospital, 2020).
The major stakeholders or the partners of the hospital are many and they include the NSW Ministry of Health, major local strategic and operational partner like Aboriginal Medical Service Western Sydney, the Western Sydney Medical local and many more. The range of stakeholder has proven that there is a major quality of services that the hospital is providing to the community people of Sydney (Westmead Hospital, 2020).
Strategic Security Policy
In an organisation, the security is major issue of concern and the management will try to formulate an effective security policy to tackle the vulnerabilities. According to Gerber et al. (2016), the main purpose or the goal of security is keep itself free from danger. The increase in security will increase the protection and chances of theft; however, the convenience to access the information will be reduced. The securing of information in the digital platform is done as the information is manipulated by a microprocessor, it is preserved on a storage device and the information is transmitted over a network.
The security system of the information protects the confidentiality, integrity and availability of the information. A strong security system will be helpful, as it will prevent the data theft, thwarting identity theft, avoiding the legal consequences for not adopting a strong security system for the information, maintaining the productivity and avoiding the cyber terrorism. Therefore, the organisation needs to adopt a strong and secured security policy to protect their information. Policy is an organisation’s grand plan or strategy that defines the overall goals and objectives. Security policy has four important aspects (Helms, 2019). The assets of healthcare information security must be identified, the identification should be done who will be responsible for classifying and valuing information assets, describing the role that should be played by the staffs of hospital regarding the information security, and finally constructing an effective infrastructure for information.
The techniques that will be applied for the enhanced security system must be technically sophisticated, as that will be effective in protecting the information. The information security system will have two levels, one is vertical...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here