Due date: 1 August 2016
Objectives: • Demonstrate an understanding of the skills required to work in non¬traditional and virtual working environments by planning security measures for information systems.
• Demonstrate an understanding of change on organisations in the global environment and the impact of these on organisational systems by planning business continuity.
Students are expected to identify their own “real-world” organisation. If some students do not have access to a “real-world” organisation, a fictitious organisation based on a real world organisation will be acceptable.
Finding a “real-world” organisation:
• If you are linked to an organisation (government or private organisation for an example) ask what the need for improving the security level, choose the highest priority and work around that.
• Do you have any family or friends involved in business organisation, or do you know anyone with a business organisation? Ask them about the security level that they need (keep it simple, you can’t solve all their problems).
• Otherwise do you have any friends with ideas for a business organisation? What would be the major security level that they need for this organisation?
• Do not try to solve all the security problems for the organisation in the few weeks you have and focus on one security level.
ASSIGNMENT 1 (ESSAY)
TSK 1: Organisation Background
Briefly introduce your organisation in terms of name, the industry it operates within, products and services, clients, suppliers, major competitors and competing products/services, major processes, ownership, key personnel and key issues/challenges.
TASK 2: Time Management Plan
Students are required to provide an effective time management plan that will lead to successful submission of all your assessments (Research paper 1, 2, and 3), and the completion of the required activities that included in these assessments. The following table outlines each of the subsequent assessments and required activities that need to be completed for each assessment:
Assessment Activities required
Research paper 1 • This assessment item covers chapters 1-4 of your textbook.
• Report on the current security state of the selected organisation.
• Suggest improvements to level of security in organisation.
Research paper 2 • This assessment item covers the chapters 5-8 of your textbook.
• Based on the size of the selected organisation (small, medium, large) you are asked to assist in developing a security program.
• Provide a plan to make these changes incorporating training requirements.
Research paper 3 • This assessment item covers chapters 1-12 of your textbook.
• Within this assessment, you are addressing controlling risk, protection mechanisms, personnel and security, law and ethics specifically.
• Provide the organisation with the necessary guidelines for
• You are also required to review the PRT Network Monitor that you can find on this web site http://www.paessler.com/prtg.
TASK 2.1: Work Breakdown Structure
Develop a work breakdown structure (WBS) for your project with date, and summary of project activities. Use a table with columns for activity number, date, activity name, activity description, planned action, status, and any other notes. The purpose of WBS is to identify each task in your project and include an estimated duration.
TASK 2.2: Task-Sequencing Approaches
After WBS has been designed, students need to present the project details that are mentioned in the WBS using one of the following Task-Sequencing Approaches:
• Network Scheduling
• PERT Chart
• Gantt Chart
Students need to briefly justify their choice of the task-sequencing approaches.
Use the study schedule and the course material to get an understanding of the material you need to cover. Level of expertise and background knowledge will be different for each student. Determine where you need to spend more time.
Chapter 1 of the current fourth edition of the textbook provides project planning information that you need to use.
You need to submit your assignment 1 via the assignment 1 submission link on your study desk.
Do not email your work to the course leader. If you are unable to upload, notify the course leader of the issue so that it may be resolved for you to upload the assessment.
Please note that all assessment items in this course must adhere to the correct Harvard citing and referencing. For this purpose links have been provided to you on the study desk. However, you can consult the library web site for further details and clarifications.