1 - Unit 5 - Assignment Brief 2
1 - Unit 5 - Assignment Brief 2
Submission Format:
Format:
● The submission is in the form of an individual written report. This should be written in a concise,
formal business style using single spacing and font size 12. You are required to make use of
headings, paragraphs and subsections as appropriate, and all work must be supported with
research and referenced using the Harvard referencing system. Please also provide a bibliography
using the Harvard referencing system.
Submission
● Students are compulsory to submit the assignment in due date and in a way requested by the
Tutor.
● The form of submission will be a soft copy posted on http://cms.greenwich.edu.vn/.
● Remember to convert the word file into PDF file before the submission on CMS.
Note:
● The individual Assignment must be your own work, and not copied by or from another student.
● If you use ideas, quotes or data (such as diagrams) from books, journals or other sources, you
must reference your sources, using the Harvard style.
● Make sure that you understand and follow the guidelines to avoid plagiarism. Failure to comply
this requirement will result in a failed assignment.
Unit Learning Outcomes:
1
LO3 Review mechanisms to control organizational IT security.
LO4 Manage organizational security.
Assignment Brief and Guidance:
Assignment scenario
You work for a security consultancy as an IT Security Specialist.
A manufacturing company “Wheelie good” in Ho Chi Min City making bicycle parts for export has
called your company to propose a Security Policy for their organization, after reading stories in the
media related to security breaches, etc. in organizations and their ramifications.
Task 1
In preparation for this task, you will prepare a report considering:
The security risks faced by the company.
How data protection regulations and ISO risk management standards apply to IT security.
The potential impact that an IT security audit might have on the security of the organization.
The responsibilities of employees and stakeholders in relation to security.
Task 2
Following your report:
You will now design and implement a security policy
While considering the components to be included in disaster recovery plan for Wheelie good,
justify why you have included these components in your plan.
Task 3
In addition to your security policy, you will evaluate the proposed tools used within the policy and how
they align with IT security. You will include sections on how to administer and implement these
policies.
2
Learning Outcomes and Assessment Criteria (Assignment 1):
Learning Outcome Pass Merit Distinction
LO3 P5 Discuss risk M3 Summarise the D2 Consider how IT
assessment ISO 31000 risk security can be
procedures. management aligned with
methodology and its organisational policy,
P6 Explain data application in IT detailing the security
protection processes security. impact of any
and regulations as misalignment.
applicable to an M4 Discuss possible
organisation. impacts to
organisational security
resulting from an IT
security audit.
LO4 P7 Design and M5 Discuss the roles D3 Evaluate the
implement a security of stakeholders in the suitability of the tools
policy for an organisation to used in an
organisation. implement security organisational policy.
audit
P8 List the main recommendations.
components of an
organisational disaster
recovery plan,
justifying the reasons
for inclusion.