Home / Expert Answers / Other / 14-mtc-stay-h-15-47-elearning-nust-na-1-this-case-study-can-be-attempted-by-a-minimum-of-two-2-and-a

(Solved): 14% MTC-Stay H 15:47 elearning.nust.na 1. This case study can be attempted by a minimum of two (2) ...




14% MTC-Stay H 15:47 elearning.nust.na 1. This case study can be attempted by a minimum of two (2) and a maximum of three (3)
14% MTC-Stay H 15:47 elearning.nust.na 1. This case study can be attempted by a minimum of two (2) and a maximum of three (3) members per group. 2. You are required to submit your work on Moodle (e-learning). 3. You should keep a backup copy of your submission 4. Plagiarism is a serious academic offence, therefore adhere to the rules. Provide your references in accordance with APA citing/referencing guide. 5. No late submissions will be accepted. 6. Apply your knowledge gained in the course to do this case study. 7. Be guided by the marks allocated to each task. 1) Come up with a specific business / organisation that you can think of. It can be a new one or an existing one. Provide a brief description of what the business/organisation is all about, or what services it offers. The goals and objectives must also be thoroughly explained 110 2) Identify all information assets that form part of the organisation. Perform asset valuation to determine asset value or worth of each asset identified [15] 3) Identify threats and vulnerabilities for each asset identified. You can merge some threat(s) and vulnerabilities if possible. You can also categorise them according to their impact 1121 4) Plan a risk management strategy / assessment to address the threats and vulnerabilities you had identified in 3). 181 5) With explanations/motivations, rank the risks in priority orders. For example, low, medium and high 161 6) In the field of Information Security, there are a variety of policies that organisations need to put in place. Apply the knowledge that you had gained in the course and develop any three (suitable) policies of your choice that can be deployed in the organisation that you had identified at the beginning. Ensure that the policies adhere to an appropriate standard or encompass necessary attributes. [217 marks for each policyll 7) Explain in detail how you would ensure continuity of the business / organisation after a serious information security breach. 181 coccocc END >>


We have an Answer from Expert

View Expert Answer

Expert Answer


Answer to 14% MTC-Stay H 15:47 elearning.nust.na 1. This case study can be attempted by a minimum of two (2) and a maximum of thre...
We have an Answer from Expert

Buy This Answer $5

Place Order

We Provide Services Across The Globe