Assignment Brief Unit 05 Security Sep 2022
Assignment Brief Unit 05 Security Sep 2022
SUBMISSION FORMAT
THE SUBMISSION IS IN THE FORM OF A PRESENTATION, ALONG WITH A SECURITY AWARENESS HANDBOOK AND A DETAILED SECURITY POLICY.
THE SECURITY AWARENESS HANDBOOK, AS WELL AS THE SECURITY POLICY, WILL DISCUSS THE IT SECURITY RISKS, PROCEDURES AND POLICIES WHICH
MUST BE FOLLOWED. THESE DOCUMENTS SHOULD BE WRITTEN IN A CONCISE, FORMAL BUSINESS STYLE USING SINGLE SPACING AND FONT STYLE
TIMES NEW ROMAN AND SIZE 11. YOU ARE REQUIRED TO USE HEADINGS, PARAGRAPHS AND SUBSECTIONS AS APPROPRIATE, AND ALL WORK MUST
BE SUPPORTED WITH RESEARCH AND REFERENCED USING THE HARVARD REFERENCING SYSTEM. PLEASE ALSO PROVIDE A BIBLIOGRAPHY USING THE
HARVARD REFERENCING SYSTEM AT THE END OF THE REPORT AND A POWERPOINT PRESENTATION. YOUR REPORT SHOULD BE DIVIDED INTO
MULTIPLE SECTIONS WITH THE FOLLOWING SUBMISSION FORMATS:
SECTION 1: LO1 & LO2
THE SUBMISSION IS IN THE FORM OF A 15-20 SLIDE PRESENTATION ON THE IT SECURITY RISKS FOR GOVERNMENT INSTITUTES ALONG WITH A COVER
SLIDE AND A CONCLUSION SLIDE. YOU WILL ALSO MAINTAIN THE PRESENTER’S NOTES. YOU ARE REQUIRED TO USE HEADINGS, PARAGRAPHS AND
SUBSECTIONS AS APPROPRIATE, AND ALL WORK MUST BE SUPPORTED WITH RESEARCH AND REFERENCED USING THE HARVARD REFERENCING SYSTEM.
SECTION 2: LO3 & LO4
PRODUCE AN IT SECURITY AWARENESS HANDBOOK, WHICH IS PROVIDED TO ALL ATTENDEES OF PAKISTAN CYBER SECURITY CONFERENCE 2022. THE
BOOKLET SHOULD BE WRITTEN IN A CONCISE, FORMAL BUSINESS STYLE USING SINGLE SPACING AND FONT STYLE TIMES NEW ROMAN AND SIZE 11.
YOU ARE REQUIRED TO USE HEADINGS, PARAGRAPHS AND SUBSECTIONS AS APPROPRIATE, AND ALL WORK MUST BE SUPPORTED WITH RESEARCH AND
REFERENCED USING THE HARVARD REFERENCING SYSTEM.
SECTION 3: LO3 & LO4
THE FINAL COMPONENT OF THE PAKISTAN CYBER SECURITY CONFERENCE 2022 WILL BE THE PRODUCTION OF A SECURITY POLICY, WHICH CAN BE
USED BY GOVERNMENT INSTITUTIONS TO EVALUATE THEIR SECURITY WORK ENVIRONMENT. THESE WILL BE PRODUCED ACCORDING TO THE TEMPLATE
PROVIDED TO THE IT PROFESSIONAL, INCLUDING A DISASTER RECOVERY PLAN.
SECURITY POLICY TEMPLATES TO BE USED BY STUDENTS: HTTPS://WWW.TEMPLATE.NET/BUSINESS/POLICY/SECURITY-POLICY/
THE POLICY SHOULD BE WRITTEN IN A CONCISE, FORMAL BUSINESS STYLE USING SINGLE SPACING AND FONT STYLE TIMES NEW ROMAN AND SIZE 11.
YOU ARE REQUIRED TO USE HEADINGS, PARAGRAPHS AND SUBSECTIONS AS APPROPRIATE, AND ALL WORK MUST BE SUPPORTED WITH RESEARCH AND
REFERENCED USING THE HARVARD REFERENCING SYSTEM.
NOTE: SECTIONS 2 & 3 SHOULD BE 1500 – 2000 WORDS IN LENGTH EACH, HOWEVER, THERE WILL BE NO PENALTY ON EXCEEDING THIS LIMIT.
SECTION 1 – GUIDANCE
THE SUBMISSION IS IN THE FORM OF A 15-20 SLIDE PRESENTATION ON THE IT SECURITY RISKS FOR GOVERNMENT INSTITUTIONS. THIS PRESENTATION
WILL INCLUDE REFERENCES TO THE FOLLOWING:
THE DIFFERENT TYPES OF SECURITY RISKS WHICH ARE FACED BY GOVERNMENT INSTITUTIONS
AN OVERVIEW OF HOW IT SECURITY RISKS CAN BE ASSESSED AND MANAGED
WHAT SECURITY RISKS DO YOU THINK ARE AT POSED AT THE PAKISTAN CYBER SECURITY CONFERENCE 2022 AND HOW CAN THOSE RISKS BE
MITIGATED?
WAYS IN WHICH CONFIGURATION OF FIREWALL POLICIES AND VIRTUAL PRIVATE NETWORKS CAN BE MANAGED AND IMPACT OF THEM ARE
NOT CONFIGURED ACCORDING TO NEEDS OF GOVERNMENT INSTITUTIONS
WAYS IN WHICH BACKUP PLANS CAN BE MANAGED TO IMPROVE NETWORK SECURITY BY IMPLEMENTING A STATIC IP, NAT AND A DMZ.
THREE WAYS IN WHICH NETWORK MONITORING CAN LEAD TO IMPROVEMENTS IN IT SYSTEM .
THIS PRESENTATION SHOULD ALSO ALLOW A NETWORKING OPPORTUNITY FOR YOU TO DISCUSS THE DIFFERENT TYPES OF SECURITY MEASURES WHICH
CAN BE EMPLOYED FOR THE COMPANY TO INCREASE THE INTEGRITY OF THE ORGANIZATIONAL SECURITY WHICH MUST BE FOLLOWED FOR THE COMPANY.
SUGGEST THREE BENEFITS OF MONITORING OF SYSTEMS FOR NETWORKS WITHIN THE PAKISTAN CYBER SECURITY CONFERENCE. THE PRESENTATION WILL
EXAMINE AT LEAST THREE VIRTUAL AND SECURITY MEASURES WHICH CAN BE INTEGRATED FOR THE ORGANIZATION SECURITY WITHIN GOVERNMENT
INSTITUTIONS. YOU WILL ALSO NEED TO PROVIDE ACCOMPANYING NOTES WHICH ARE NEEDED TO EVALUATE THE PHYSICAL AND VIRTUAL SECURITY
MEASURES (KEEPING IN MIND, GOVERNMENT OF PAKISTAN SECURITY POLICIES).
SECTION 2 – GUIDANCE
PRODUCE AN IT SECURITY AWARENESS HANDBOOK, WHICH IS PROVIDED TO ALL ATTENDEES OF PAKISTAN CYBER SECURITY CONFERENCE
2022. THIS BOOKLET WILL PROVIDE DETAILS ON THE DIFFERENT TYPES OF IT RISKS, AND THE BEST WAY TO MANAGE THESE RISKS.
MOREOVER, THE BOOKLET WILL ALSO DISCUSS THE ORGANIZATIONAL SECURITY ARRANGEMENTS AND POLICIES WHICH ARE BEING FOLLOWED
IN A GOVERNMENT INSTITUTION AND WAYS IN WHICH THESE POLICIES CAN ALIGN. AS PART OF THIS SECURITY AWARENESS HANDBOOK, YOU
WILL BE REQUIRED TO ADDRESS THE FOLLOWING ISSUES:
DATA PROTECTION: THE MAIN REGULATIONS AND PROCESSES WHICH GOVERNMENT INSTITUTIONS NEED TO FOLLOW. ALSO, APPLY THESE TO
THE PAKISTAN CYBER SECURITY CONFERENCE 2022.
RISK ASSESSMENTS: OVERVIEW OF THE ISO 31000 RISK MANAGEMENT METHODOLOGY AND WAYS IN WHICH THIS IS APPLIED TO IT
SECURITY WITHIN GOVERNMENT INSTITUTIONS
IT SECURITY POLICY: WHAT IS THE ROLE OF IT SECURITY AUDIT IN GOVERNMENT INSTITUTIONS? WAYS IN WHICH ORGANIZATIONAL POLICY
(IN GOVERNMENT INSTITUTIONS) CAN BE ALIGNED WITH IT SECURITY POLICY? HOW WELL DO THESE POLICIES CATER TO PAKISTAN CYBER
SECURITY CONFERENCE 2022 AND WHAT FURTHER MEASURES CAN BE INCLUDED TO IMPROVE IT SECURITY IN SUCH VIRTUAL EVENTS IN THE
FUTURE? ALSO, EVALUATE THE SUITABILITY OF VARIOUS TOOLS WHICH CAN BE USED FOR ORGANIZATIONAL IT SECURITY POLICY.
SECTION 3- GUIDANCE
THE FINAL COMPONENT FOR STUDENTS WILL BE THE PROVISION OF AN IT SECURITY POLICY WHICH WILL BE PRODUCED BY THE IT SECURITY
PROFESSIONAL, INCLUDING A DISASTER RECOVERY PLAN. THIS INITIATE WHICH WILL HELP IN THE DESIGN OF A SECURITY POLICY FOR THE
GOVERNMENT INSTITUTIONS AND EXAMINE WAYS IN WHICH THE IMPLEMENTATION CAN BE CATERED ACCORDING TO THEIR PARTICULAR
NEEDS OF THE MAIN STAKEHOLDERS. YOU WILL BE DESIGNING AND IMPLEMENTING A SECURITY POLICY FOR THE GOVERNMENT INSTITUTION,
WHICH IS RELEVANT TO THE SECURITY WORK ENVIRONMENT FOR GOVERNMENT INSTITUTES. YOU WILL ALSO EVALUATE HOW WELL THE
SECURITY TOOLS USED WITH IN THE POLICY CAN MITIGATE RISKS IN FUTURE VIRTUAL IT CONFERENCES.