Information Security Strategy Development

Assignment Brief
As part of the formal assessment for the programme you are required to submit an
Information Security Strategy Development assignment. Please refer to your Student
Handbook for full details of the programme assessment scheme and general information on
preparing and submitting assignments.
Learning Outcomes:
After completing the module, you should be able to:
1) Evaluate the basic external and internal threats to electronic assets and
countermeasures to thwart such threats by utilising relevant standards and best
practice guidelines.
2) Analyse the legalities of computer forensics phases and the impact of the legal
requirements on the overall information security policy.
3) Critically assess the boundaries between the different service models (SaaS, PaaS,
IaaS) and operational translations (i.e. cloud computing) and to identify the associated
risks.
4) Critically investigate a company information security strategy to provide consultation
and coaching through reporting and communication.
5) Assess, compare and judge computer media for evidentiary purposes and/or root
cause analysis.
6) Apply relevant standards, best practices and legal requirements for information security
to develop information security policies.
7) Lifelong Learning: Manage employability, utilising the skills of personal development
and planning in different contexts to contribute to society and the workplace.
Your assignment should include: a title page containing your student number, the module
name, the submission deadline and a word count; the appendices if relevant; and a
reference list in Arden University (AU) Harvard format. You should address all the elements
of the assignment task listed below. Please note that tutors will use the assessment criteria
set out below in assessing your work.
Maximum word count: 2,500 words
Please note that exceeding the word count will result in a reduction in grade proportionate to
the number of words used in excess of the permitted limit.
You must not include your name in your submission because Arden University operates
anonymous marking, which means that markers should not be aware of the identity of the
student. However, please do not forget to include your STU number.
This assignment is worth 50% of the total marks for the module.
Using your current or previous workplace1 as the case study, please answer the
following:
1) Critically analyse the different types of software acquisition models and try to relate that
to those systems you are using at your workplace. [LO3]
(10 marks)
2) Do you have a handbook that describes the policies, processes, and procedures in
place? Evaluate the security strategy in that handbook for network activity monitoring,
for instance? What are the issues missing in the handbook? You need to discuss the
legal issues raised by this handbook as many companies consider a handbook as part
of the contract. [LO4]
(20 marks)
3) What is the information security strategic plan in place and how it is implemented?
[LO4, LO6]
(10 marks)
4) Analyse the external and internal threats to information systems in your workplace and
show how your security strategy should protect against those threats. Report your risk
assessment methodology in a flowchart-like figure. You can have a look at Stoneburner
(2002) work to understand how you should relate all the activities together. Please do
not copy the work from (Stoneburner, 2002) as you need to compile your own risk
assessment methodology as part of your security strategy plan. You also need to
discuss how you are going to manage the identified risks. [LO1, LO5]
(20 marks)
5) Critically analyse the access control strategy? If you are to rewrite that part of your
security plan, what would you change? Why? What sort of a strategy you will use here?
proactive or reactive? Justify your answer. [LO4, LO6]
(20 marks)
6) What do you recommend for a proper incident management strategy? How would you
implement it? Hint: Stakeholders and role responsibilities. [LO4, LO6, LO7]
(10 marks)
7) Compile a brief security strategy that suits the business requirements as well as the
security requirements of this workplace. [LO4, LO6, LO7]
(10 marks)

Information Security Strategy Development

Assignment Brief
As part of the formal assessment for the programme you are required to submit an
Information Security Strategy Development assignment. Please refer to your Student
Handbook for full details of the programme assessment scheme and general information on
preparing and submitting assignments.
Learning Outcomes:
After completing the module, you should be able to:
1) Evaluate the basic external and internal threats to electronic assets and
countermeasures to thwart such threats by utilising relevant standards and best
practice guidelines.
2) Analyse the legalities of computer forensics phases and the impact of the legal
requirements on the overall information security policy.
3) Critically assess the boundaries between the different service models (SaaS, PaaS,
IaaS) and operational translations (i.e. cloud computing) and to identify the associated
risks.
4) Critically investigate a company information security strategy to provide consultation
and coaching through reporting and communication.
5) Assess, compare and judge computer media for evidentiary purposes and/or root
cause analysis.
6) Apply relevant standards, best practices and legal requirements for information security
to develop information security policies.
7) Lifelong Learning: Manage employability, utilising the skills of personal development
and planning in different contexts to contribute to society and the workplace.
Your assignment should include: a title page containing your student number, the module
name, the word count; the appendices if relevant; and a reference list in Arden University
(AU) Harvard format. You should address all the elements of the assignment task listed
below. Please note that tutors will use the assessment criteria set out below in assessing
your work.
Maximum word count: 2,500 words
Assignment Task: Part 2
This assignment is worth 50% of the total marks for the module.
1) A Denial of Service attack (DoS) represents one of the most widespread types of
cyber-threats to businesses of all sizes. DoS prevents users of an online IT system
from accessing vital services for an extended period of time, creating both financial and
reputational losses for the affected company. Many DoS attacks have blocked websites
of private, public and government organisations from serving their clients, customers
and partners for hours or even days. Addressing corporate vulnerability to DoS attacks
is now becoming more and more critical due to the growing adoption of cloud-based
architectures and information sharing platforms. As such, a consideration of DoS
related risks should be placed at the core of any information security strategy.
Critically analyse the most typical scenarios leading to the increased exposure to DoS
attacks. Suggest specific counter-measures which could be incorporated to the
corporate information security strategy. These should include:
a) infrastructures to minimise the likelihood of the occurrence of such an event
(preventive approach)
b) mechanisms to mitigate the issues created by the occurrence of such an event
(the reactive approach)
c) policies which recognise this threat as an overall business risk rather than merely
technical risk.
(70 marks)
(LOs 1, 4, 5, 6 & 7)
2) Using WinHex or a similar tool, try to load your operating system swap file for digital
forensics investigation. Report your findings about:
a) Recovered deleted files
b) Extracting used passwords
(30 marks)
(LO2)

Social Media and Technology

The final course assignment is to reflect on the film/novel you were assigned this week and tie this to last week’s readings as well as current technological issues in this society as they relate to the film/novel.
This is a reflective essay statement where you are to use personal with additional facts and reference to specific aspects in the novel/film and to critical assess our participation including where we are heading.assigned a fitting novel that depicts in rather obvious terms what our complicity could well result in, especially if one considers the world today.
Please as you ponder this week, think of today’s current social media and Internet power and what is already being compiled with our own help.
Upon completion of this module, students will be able to critically analyze the role of social media and technology in crimes of the powerful.
Students will be able to synthesize last weeks readings to critical asses their own everyday life choices and decision-making in relation to crimes of the powerful.
Recommended Task: The Feed on Amazon and The novel The Circle https://www.amazon.com/Official-Trailer/dp/B07Z6RZX83/ref=sr_1_1?crid=1FV297Y7IED37&keywords=the+feed&qid=1579190191&s=instant-video&sprefix=the+fee%2Caps%2C246&sr=1-1
Consider your own consent and consumption of current social media and technology and how that plays into the ongoing fusion centers’ data collection.

Social Media and Technology

The final course assignment is to reflect on the film/novel you were assigned this week and tie this to last week’s readings as well as current technological issues in this society as they relate to the film/novel.
This is a reflective essay statement where you are to use personal with additional facts and reference to specific aspects in the novel/film and to critical assess our participation including where we are heading.assigned a fitting novel that depicts in rather obvious terms what our complicity could well result in, especially if one considers the world today.
Please as you ponder this week, think of today’s current social media and Internet power and what is already being compiled with our own help.
Upon completion of this module, students will be able to critically analyze the role of social media and technology in crimes of the powerful.
Students will be able to synthesize last weeks readings to critical asses their own everyday life choices and decision-making in relation to crimes of the powerful.
Recommended Task: The Feed on Amazon and The novel The Circle https://www.amazon.com/Official-Trailer/dp/B07Z6RZX83/ref=sr_1_1?crid=1FV297Y7IED37&keywords=the+feed&qid=1579190191&s=instant-video&sprefix=the+fee%2Caps%2C246&sr=1-1
Consider your own consent and consumption of current social media and technology and how that plays into the ongoing fusion centers’ data collection.

History of Autonomous Vehicles (AV)

Required 
Concise history of autonomous vehicles (9 pages). Include timeline of major achievements.

History of Autonomous Vehicles (AV)

Required 
Concise history of autonomous vehicles (9 pages). Include timeline of major achievements.

Information Technology in the Department of Homeland Security (DHS)

Instructions  
Discuss the importance of Information Technology in the Department of Homeland Security (DHS) (350-450 words)

Role of Artificial Intelligence in Future Technology

Role of Artificial Intelligence in Future Technology
-Scientific paper.
-Use scientific source/notation.
-Harvard Style.
-lead to a conclusion
*[IMPORTANT, the last paragraph (that agrees that AI will have a beneficial impact )]
-in every paragraph, every sentence that is from a scientific source should be marked with an index in the end of that specific sentence and in the bottom of the essay should the source listed.
-100% written from scratch
-it should be separated in paragraphs to indicate points that AI role will be beneficial in the future using sources

Dynamics In IT and Organizational Communication

Discuss the Dynamics In IT and Organizational Communication in your organization (850 words).

Integrated Management System (IMS)

What is Integrated Management System (IMS). Discuss how it can be applied effectively in an organization. What are the benefits of IMS?