do presentation for the project , I want speaker notes for the presentation please
Here is a link for the book if needed
https://drive.google.com/drive/folders/1z9w7oFCBdG…
College of Computing and Informatics
Project
Deadline: Tuesday 8/06/2023 @ 23:59
[Total Mark is 14]
Student Details:
CRN:
Name:
Name:
Name:
Name:
ID:
ID:
ID:
ID:
Instructions:
• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).
• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.
• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.
• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.
Pg. 01
Project Description and Instructions
Project Description and Instructions
• In this project, every group of students is required to apply the knowledge gained
throughout the course by choosing any organization/company, profit or non-profit.
Carefully read and study the organization’s culture, information security
strategy, policies, and practices. Based on your study and observation, answer the
required questions.
• The work on this project must be performed by a group (minimum 3 and a
maximum of 4 students).
• The leader of each group must send an email with the group member’s
details (name, id) before 30/04/2023 (midnight), and the group leader must submit
the project with all group member details mentioned on the cover page.
• You are required to cite the resources and references.
• The work should be your own. Copying from students or other resources will
result in ZERO marks.
• You are advised to make your work clear and well presented; marks may be reduced
for poor presentation. This includes filling in your information on the cover page.
• You MUST show all your work, and text must not be converted into an image
unless specified otherwise by the question.
• Late submission will result in ZERO marks being given.
• Use Times New Roman font with font size 12.
Question One
Pg. 02
Learning
Outcome:
Question One
(Title of the Company/Organization with WEBSITE)
CLO1:
Explain
networking and
security, security
issues, trends,
and security
resource
CLO4:
2 Marks
To answer the project’s questions, you must select an organization that you would like
to help in building and improving its performance at many levels (e.g., IT security and
policies, productivity, innovation). You must write the title of the organization and its
website’s link along with using the organization’s information when appropriate (use
references).
•
What are the main pillars you would use to build a proper corporate culture for
the organization?
Analyze problems
related to the field
•
By using the pillars, develop a corporate culture for the organization.
of Security and
•
How would you help the organization to earn an ISO 27001 certification?
Information
Assurance
CLO3:
Develop security
policies and put in
place an effective
security
architecture that
comprises
modern hardware
and software
technologies and
protocols
Question Two
Pg. 03
Learning
Outcome:
CLO1:
Explain
networking and
security, security
issues, trends,
and security
resource
CLO3:
Develop security
policies and put in
place an effective
security
architecture that
comprises
modern hardware
and software
technologies and
protocols
Question Two
2 Marks
Suppose you are given a task to protect the assets of the organization using
the best IT security practices and standards.
•
Discuss and list the information security policies you plan to use to
establish strong protections for the organization’s assets in detail.
Question Three
Pg. 04
Learning
Outcome:
CLO3:
Develop security
policies and put in
place an effective
security
architecture that
comprises
modern hardware
and software
technologies and
protocols
Question Three
2 Marks
Develop an Acceptable Use Agreement for the organization. The
agreement must obtain the following:
a. The activities that are prohibited and encouraged.
b. The guidelines which would encourage users to be security
conscious.
c. The sanction policy
d. The employee expectation of privacy
Question Four
Pg. 05
Learning
Outcome:
CLO3:
Develop security
policies and put in
place an effective
security
architecture that
comprises
modern hardware
and software
technologies and
protocols
CLO6:
Demonstrate
processes to
implement and
enforce policy
Question Four
2 Marks
• What kind of information security policies you would adopt to protect
the organization during the COVID-19 pandemic!
• Suggest some of the new trends that have emerged in response to the
pandemic’s security threats.
• Write the policies, in a proper format, so that they would be used and
enforced.
Question Five
Pg. 06
Learning
Outcome:
CLO4:
Analyze problems
related to the field
of Security and
Information
Assurance
6 Marks
Question Five
Conduct a risk assessment for the organization using any risk assessment
tool (you may use the “smart sheet” tool), and fill in the following tables:
a. Risk assessment (at least two assets): (2 marks)
Assets
Threats
Vulnerabilities
Risk
b. Risk Matrix (at least two threats for each asset): (4 marks)
Threats
Potential
area of
impact
Financial
impact
Risk severity
Risk
likelihood
Risk level