本次澳洲代写作业案例是一个网络安全代写管理的assignment

 

Learning outcomes

In this assignment, you will be focusing on the following unit learning outcome (ULO):

ULO2: Assess security risks, threats and vulnerabilities to the organisation and implement
appropriate information security protection mechanisms by analysing requirements, plans and
IT security policies.

This ULO will contribute to three of your Deakin graduate learning outcomes (GLOs) in the form
of discipline knowledge (GLO1), critical thinking (GLO4) and problem solving (GLO5).

Brief description of assessment task

This task requires students to demonstrate their understanding of contemporary approaches
to performing cyber security risk management for corporate organisations. Students will be
required to evaluate approaches to cyber security risk management. Students will be assessed on their
ability to analyse benchmarked cyber security risk management approaches and demonstrate how
the selected approach can be applied to the scenario provided for an organisation.

This is an individual assessment task. The student is required to submit their solution for given
problems along with the exhibits to support findings, and a bibliography.

The solution sheet should consist of:

• Risk framing
• Risk identification and management for privacy
• Transcon risk management

Background information

This assessment has been designed for you to demonstrate and apply understanding of approaches
to cyber security risk management and assessment.

A real world example of a SAD (Solution Architecture Document) has been provided by Secureworx,
one of Deakin University’s cyber security industry partners to create a fun and engaging experience.
This is available in the assignments folder and MUST be used for this assessment task.

NOTE: The organisation represented in this document will be used as the reference corporation for
all of the assessments in this Unit.

The purpose is to provide you with the experience necessary to learn and apply cyber security risk
management practice within an organization you may or already are working for.

TransCon needs to have an understanding of the risks associated with the New Organisational
Management System (NOMS) being developed and implemented across the organization. You have
been consulted to provide an evaluation of contemporary cyber security risk management
approaches and recommend the most appropriate for Transcon based on your analysis. Once you
have justified the selection of your approach you will perform risk identification for Transcon.