0% found this document useful (0 votes)
52 views5 pages

ITNET301A - 2021 S2 Assessment 1

The document outlines an assessment for an ITNET301A Mobile Computing and Security course. Students are asked to develop a mobility policy for an organization of their choice that addresses policy, security, manageability, enforceability, and usability. The policy must identify the organization and industry, threat vectors, and rationale for policy choices. It provides requirements for the policy report, including defining the organization, use cases, and providing policies, standards, and procedures with rationale. It also requires a process flow chart for one specific mobile policy procedure.

Uploaded by

puru oli
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views5 pages

ITNET301A - 2021 S2 Assessment 1

The document outlines an assessment for an ITNET301A Mobile Computing and Security course. Students are asked to develop a mobility policy for an organization of their choice that addresses policy, security, manageability, enforceability, and usability. The policy must identify the organization and industry, threat vectors, and rationale for policy choices. It provides requirements for the policy report, including defining the organization, use cases, and providing policies, standards, and procedures with rationale. It also requires a process flow chart for one specific mobile policy procedure.

Uploaded by

puru oli
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

ITNET301A Mobile Computing and Security S1 2020

Assessment 1: Individual Report 1


In this assessment students are required to develop a mobility policy for a nominated
organisation that is enforceable, manageable, user friendly, and secure. Students must identify
the unique policy and security challenges of their organisation and its industry, enumerate
threat vectors, and provide rationale for policy choices.

• Assessment Weighting: 30%


• Learning Outcomes Assessed: 1 - 3
• Due Date: Week 8 - Sunday, 19th Sept 2021, 11:55 PM

Introduction
You are the IT Manager of an organisation of your choice. You are required to design the
organisation’s mobility policy and present the report to the company’s CEO.
The primary goal of the policy is end user enablement; at the same time, the policy must also
be enforceable, manageable, user friendly (hence adoption and compliance), and secure. The
report must include the use of academic evidence from journal articles with at least five
academic citations.

Minimum Requirement
1. Define which organisation you are working form, real or fictitious are both acceptable.
Minimum users in your organisation – 25
2. Describe the organisation type (corporations, governments, international, charities,
educational institutions, finance etc.) and the security challenges
3. Define Mobility Use Case such as:
• Business to employee (B2E) o Employee app with non-sensitive data o Employee
app with sensitive data
• Business to customer (B2C) o Consumer Financial services app o Consumer
insurance app o Consumer retail app
• Business to business (B2B)
• note that most organisations will have multiple use cases for their devices

Page 1 of 5
4. Detail the policies, standards, baselines, guidelines and procedures explain your
rationale. The following questions may be useful while defining the polices:
• Is BYOD Allowed?
• Physical Security
• Do you have a standardised device type, what happened when they are end-of-life?
• What is the minimum OS requirement?
• Lost and Stolen Policy, Device Pool Replenishment?
• Are users allowed to install their personal apps?
• Is personal use allowed? Limits on personal use? Can the organisation wipe
personal data?
• Device passcode requirement/ Encryption requirement
• Is SD Cards on devices allowed?
• Periodic Wipe?
• Compromise Device Policy (i.e. what would you constitute a compromised device
that is consider unsafe?)
• Must the user bring their device to work? What if they didn’t?
• Can the organisation track the owner’s location? Do we tell them they are being
tracked?
5. Draw the procedure/process of ONE of the following using Cross-Functional Flow Chart:
o Lost or Stolen
o Security Breach
o New Device/Breach
o Device Troubleshooting
o App Troubleshooting
o New Device Procurement /
Provisioning
o Any other relevant procedure/
process

Assignment Format
Professional Report, approximately 8-10 pages long, including table of contents, executive
summary, and references of the report.

• Filename: firstname_lastname_A1.docx
• Has your full name and number in the footer of every page.
• Submitted using Turnitin via Moodle, hence, don’t include cover sheet

Page 2 of 5
Marking criteria and standards :
Criteria High Distinction Credit Pass Fail
Distinction

Your description of Has given an Has given an Has given a Has given a Has given a
the effective and effective analysis good analysis of clear analysis of brief or unclear
organisation type & comprehensive of the company/ the the analysis of the
security challenges analysis of the organisation organisation organisation organisation
organisation type, and has type, and has type, and has type, and has
poorly shown a
type, and has shown a clear shown a good shown some
minimal
thoroughly understanding of, understanding understanding
understanding
discussed and its security of, its security of, its security
of, its security
shown a clear challenges challenges challenges
challenges
understanding
of, its security
challenges

8.50 to 10.00% 7.50 to 8.49% 6.50 to 7.49% 5.00 to 6.49% 0.00 to 4.99%

Your definition of Has given an Has given an Has given a Has given a Has given a
the Mobility use effective and effective good definition clear definition brief or unclear
case(s) comprehensive definition of the of the use cases, of the use cases, definition of
definition of use cases, and and shown a and shown a the use cases,
the use cases, shown a clear good some and shown a
and has understanding of understanding understanding minimal
the end uses of the end uses of the end uses
thoroughly understanding
need. And need. need
discussed and of the end uses
included multiple
shown a clear uses cases need
understanding
of the end uses
need.
organisation
type

17.00 to 20.00% 15.00 to 16.98% 13.00 to 14.98% 10.00 to 12.98% 0.00 to 9.99%

Page 3 of 5
Your critique and Has given an Has given an Has given a Has given a Has given
analysis of the effective effective good rationale clear rationale unclear
policies, standards, rationale of the rationale of the of the policy, of the policy, rationale of the
baselines, policy, policy, standard, standard, standard, policy,
guidelines and standard, baseline, baseline, baseline, standard,
procedures baseline, guideline, and guideline, and guideline and baseline,
guideline and procedures, and procedures, and procedures, and guideline and
procedures, given accurate focus on given some procedures,
and given policies that are policies that are policies that are and used
comprehensive unique to the unique to the unique to the language that
policies that use cases use cases use cases is vague or
are unique to copied from
the use cases text without
clarification

25.50 to 30.00% 22.50 to 25.49% 19.50 to 22.49% 15.00 to 19.49% 0.00 to 14.49%

Your Has given a Has given a clear Has given a Has given a Has given
procedure/process clear flow flow chart. Has clear flow clear flow incorrect flow
/using chart. Has included most chart. Has chart. Has chart, or
CrossFunctional included all essential included included some unclear and
Flow essential elements. All essential essential hard to follow
Chart elements. All processes elements. All
elements. The diagram with
processes terminate processes
chart presented wrong use of
terminate properly. The terminate
in a clear way elements
properly. The chart presented properly. The
chart presented in a clear way chart presented that is easier to
in a clear way that is easier to in a clear way comprehend.
that is easier to comprehend that is easier to
comprehend comprehend

17:00 to 20% 15.00 to 16.99% 13.00 to 14.99% 10.00 to 12.99% 0.00 to 9.99%

A wide range of Several highly Small range of Supported by Little or no


In-text citations/ use highly relevant relevant academic relevant only a few reference to
of academic academic publications. academic relevant academic
publications publications. academic publications.
evidence (Depth of
and other publications.
research)
reputable or or
At least 5 credible or or
references that relate publications. Academic evidence Poor use of
to the topic and used (more than 3 Satisfactory use Less than 2 sources;
evidence of their use academic citations) of sources with at academic in-text inadequate in-
within the report least 3 academic citations text citations.
citations.

Page 4 of 5
8.50 to 10.00% 7.50 to 8.49% 6.50 to 7.49% 5.00 to 6.49% 0.00 to 4.99%

Your structure, Has used a Has used an Has used a good Has used some Has used an
layout, format, clear and effective format format and kind of format unclear or
language, written effective and layout. Has layout. Has used and layout. Has inconsistent
expression, and format and used effective clear and used format and
Harvard references layout. Has language. Excellent understandable understandable layout. Has used
of the report used clear and variety of sources, language. Good language. Some some unclear
and citation variety of variety of language. Poor
professional
formats are sources, and sources, and variety of
language.
correct. citation formats citation formats sources, and
Excellent are correct. are correct. citation formats
variety of are incorrect.
sources, and
citation
formats are
correct.

8.50 to 10.00% 7.50 to 8.49% 6.50 to 7.49% 5.00 to 6.49% 0.00 to 4.99%

Page 5 of 5

You might also like