ICT705 Cyber Security Governance and Management Project Support
Evaluate Overview
ID Evaluate Item When due Weighting ULO# CLO# for MITS
1 Research File (Particular particular person)
(1000 Phrases)
2 Case Thought File (Particular particular person)
(1500 Phrases)
3* Likelihood Evaluate and Contingency Notion
Fragment A: File
(2000 Phrases) (Neighborhood)
Session 6 20% 1, 2 1, 2 Session 8 30% 2, 3, 4 2, 3 Session 12 30% 1, 2, 3, 4 1, 2, 3, 4
Point out: * denotes ‘Hurdle Evaluate Item’ that students must accomplish now now not lower than 40% on this merchandise to cross the unit.9
Referencing guides
You would possibly want to reference the total sources of recordsdata it’s in all probability you’ll perhaps also grasp got extinct on your assessments. Please use the IEEE referencing style when referencing on your assessments on this unit. Consult with the library’s referencing guides for extra recordsdata.
Tutorial misconduct
VIT enforces that the integrity of its students’ tutorial reviews follows an acceptable level of excellence. VIT will adhere to its VIT Policies, Procedures and Types the put it explains the importance of staff and student honesty in relation to tutorial work. It outlines the types of behaviours that are”tutorial misconduct”, including plagiarism.
Leisurely submissions
In circumstances the put there are now now not any licensed mitigating circumstances as certain through VIT Policies, Procedures and Types, gradual submission of assessments will lead automatically to the imposition of apenalty. Penalties shall be applied as quickly because the deadline is reached.
Short extensions and special consideration
Particular Consideration is a quiz for:
• Extensions of the due date for an evaluate, diversified than an examination (e.g. task extension).
• Particular Consideration (Particular Consideration when it comes to a Accomplished evaluate, including an stop-of-unit Examination).
Students wishing to quiz Particular Consideration when it comes to an evaluate the due date of whichhas now now not yet passed must engage in written emails to the instructing crew to Request for Particular Consideration as early as that you’re going to be in a residing to imagine and old to originate time of the evaluate due date, alongside with any accompanying paperwork, such as scientific certificates.
For added recordsdata, consult with VIT Policies, Procedures and Types.
Inclusive and equitable evaluate
Cheap adjustment in evaluate systems shall be made to accommodate students with a documented disability or impairment. Contact the unit instructing crew for added recordsdata.
Contract Cheating
Contract dishonest infrequently entails shopping an task or piece of research from yet every other celebration. This shall be facilitated by a fellow student or buddy or bought on a web page online. The unauthorized use of generative Synthetic Intelligence (AI) can even be conception about dishonest. Diversified forms of contract dishonest encompass paying yet every other particular person to sit down an exam within the scholar’s teach.
Contract dishonest warning:
• By paying someone else to entire your tutorial work, you don’t be taught as mighty as that you’re going to be in a residing to imagine if you happen to did the work yourself.
• It is in all probability you’ll perhaps presumably also be now now not willing for the requires of your future employment.
• It is in all probability you’ll perhaps presumably also be realized responsible of tutorial misconduct.
• Many of for pay-contract dishonest companies recycle assignments despite guarantees of “real, plagiarism-free work”, so the similarity is without peril detected by Turnitin .
• Penalties for educational misconduct encompass suspension and exclusion.
• Students in some disciplines are required to expose any findings of guilt for academicmisconduct sooner than being licensed into particular professions (e.g., law).
• It is in all probability you’ll perhaps presumably also expose your private and monetary recordsdata unsafely, leaving yourselfopen to many risks, including that you’re going to be in a residing to imagine identification theft.
• You furthermore may well leave yourself birth to blackmail – if you happen to pay someone else to manufacture an task, they realize it’s in all probability you’ll perhaps also grasp got engaged in incorrect behaviour and can constantly blackmail you.
Grades
We determine your grades to the following Grading Plot:
Grade Percentage
A 80% – 100%
B 70% – 79%
C 60% – 69%
D 50% – 59%
Evaluate 1: Research File
Overview
Weight Size Due date ULO
Introduction
In this individual evaluate, you will pick out a nation and repair the legislated cyber safety law, laws and ethics. It is in all probability you’ll perhaps presumably also aloof provide your idea on your findings. It is in all probability you’ll perhaps presumably also be required to reference real laws (e.g. commlaw) or court docket circumstances and to present all references (PDFs, links, etc).
Research and focus on about cyber components advise. Name and compare your chosen nation and applicable laws in each and every teach (Australian-Pacific, Europe, The US, and Asia). Recommend what form of policy/procedures an organisation can even aloof grasp in teach on the difficulty (fabricate now now not write the policy/direction of) Recommend any diversified initiatives (to illustrate, Counter Ransomware Initiative) that can even very successfully be applicable.
Your final memoir must encompass the following:
Project Veil Page: (Exercise the quilt sheet provided. Embody the Title,
Project number, Pupil Names and IDs, Subject)
Govt summary
Physique (A large series of headings and textual inform material at the write alternative)
References/ Bibliography
Issues:
No two students can fabricate the identical topic. It is in all probability you’ll perhaps presumably also be now now not restricted to topics beneath.
Students Subject
– Who will it hurt and who will it defend? (In actuality, now now not appropriate who it is
intended for)
Pupil Name: Pupil Quantity:
Bitcoins
– Research bitcoins. How it works and how it is extinct. (e.g. Bitcoin mining) – Cloak its advantages and downsides in element (e.g. can or now now not it’s tracked?)
– Fraud
Freedom of Speech verses Security of Childhood
– Cloak diversified Authorities (US, Europe, Asia, Australia-Pacific) approaches
– Cloak which laws had been created as a result of this advise. – Did they work?
Freedom of Speech versus the China Huge Firewall
– Cloak what the Authorities is making an are attempting to mitigate – Cloak the technical implementation – the style to conquer it. – Does this breach Freedom of Speech in Western Worldwide locations
Sexting
– Cloak what it is?
– Technical possibilities to limit
– Is it a breach of Privateness?
On-line User Profiling versus Privateness Laws
– Cloak what it is?
– Technical implementation
– Why are of us advise?
On-line Self Regulatory Privateness
– Cloak what it is?
– Technical implementation (e.g. Privateness seals, Membership, etc) – Does it work? What’s the alternative?
Attain Now now not Track List versus the Privateness Laws
– Cloak what it is?
– Technical implementation (e.g. Google Chrome Incognito mode vs Firefox vs Windows 10 Intention)
– Would it now now not work? What’s the alternative?
Australian tax on-line products and companies proposal
– Cloak what it is?
– What are diversified international locations doing?
– Technical implementation (e.g. Google Chrome Incognito mode vs Firefox vs Windows 10 Intention)
– Would it now now not work? What’s the alternative?
– Cloud Providers implication?
Plagiarism and Copyright
– What’s it?
– Does Plagiarism infringe copyright?
– Have there been law circumstances? Verdict?
– Can a student be be aware?
29
Pupil Name: Pupil Quantity:
Pupil Name: Pupil Quantity:
Pupil Name: Pupil Quantity:
Pupil Name: Pupil Quantity:
Reverse engineering
– What’s it?
– Attain the quiet Australian laws provide ample safety? – Landmark circumstances?
– What are diversified international locations doing?
Minute Alternate Fraud
– Cloak the essential forms (Untrue invoicing, EFT to private accounts, Cheque/Payroll Fraud, Skimming)
– Attain the quiet Australian laws provide ample safety? – Why does it happen?
– What are diversified international locations doing?
– Very prolonged time frame impression?
– Who’s the victim?
Factual Narrate with Starting up-Provide Code
– Cloak appropriate components with Starting up-Provide Code
– Conformity, detection, prevention
– Factual toddle
– Types
– What are governments doing?
– Which laws applies
Cyberbullying and Cyberstalking
– What’s it?
– Conditions
– Prevention?
– Prosecution?
Pupil Quantity: – Conditions
– Prevention?
– Prosecution?
– What are Governments doing?
– Which laws follow?
Pupil Name: Pupil Quantity:
Pupil Name: Pupil Quantity:
Laptop Easter Eggs
– What’s it?
– Factual Implication?
– What can companies fabricate?
– What are Governments doing?
Laptop Matching (for incorrect activities) – What’s it?
– Factual Implication?
– Does it hamper the Privateness laws?
– What are diversified Governments/Worldwide locations doing?
Marking Info: 20 Marks
Job Description
Govt Summary and conclusion Summarize the total paperwork with key findings. Research and focus on about the cyber
components advise. Introduce the memoir – how come this memoir modified into created?
Name and compare your chosen nation and applicable laws in each and every teach (Australian-Pacific, Europe, The US, and Asia).
Recommend what form of
policy/procedures an organisation can even aloof grasp in teach on this advise.
Recommend any diversified initiatives (to illustrate, Counter
Ransomware Initiative) which may well even be applicable.
Marking requirements/Rubric
Represent with appropriate laws and critically compare each and every teach’s appropriate requirement
Name what measures an organisation can even aloof grasp including the pattern of po
Attain your memoir with key laws and ideas. Embody screenshots of activities such as laws, comparisons of regions, etc.
You shall be assessed on the following marking requirements/Rubric:
Evaluate requirements Outstanding >=80% Admirable 70% – 79%
Creditable 60% – 69%
Acceptable 50
The common sense is obvious and a
C1. Govt
summary includes key components
Summary and
of the total memoir. Largely
The summary is mostly fixed with some key
Adequately
summary with restricted key components
A transient relevant sum a restricted conclusion reference to the evi
conclusion
correct and properly
2 components
deduced conclusions from
the proof. (2)
C2. Research and
Comprehensively research
focus on about the cyber and justify the difficulty. (4)
components advise.
4 components C3. Name and
components. Largely
correct and
correctly
deduced conclusions from the
proof. (1.5)
Effectively-outlined
research and justified the difficulty. (3)
Valid
conclusion with some reference to the proof (1.25)
Ample
research and justify the
advise. (2.5)
Restricted research an the difficulty. (2)
Comprehensively identify
compare your chosen
Very appropriate
Adequately
Restricted explanation given on
and compare all applicable
explanation of the
nation to applicable
attach
comparability few laws are identify
laws in each and every world teach.
(4)
laws in each and every teach (Australian-Pacific, Europe, The US, and Asia).
4 components
applicable laws and comparisons in each and every world teach. (3)
applicable laws and
comparisons in each and every world
teach. (2.5)
mentioned (2)
Restricted counsel and policy/direction of now now not be attach (2)
Recommend any diversified
initiatives (to illustrate,
Comprehensively attach initiatives and make your
Effectively-outlined relevant initiatives. (3)
Adequately attach initiative (2.5)
Restricted explanation obvious initiatives. (2)
Counter Ransomware
grasp initiatives. (4)
Initiative) that can even very successfully be
applicable.
4 components
Restricted use of appe Evidence can even now now not b relevant. (1)
Crucial: To substantiate your chosen topic and nation, please ship an electronic mail to your lecturer with the topic line “Project 1 Subject Affirmation – [Your Name] – [Your Student ID]”. In the electronic mail, clearly teach your chosen topic and the nation you shall be specializing in for the legislated cyber safety law.
Instructions for Writing the Research File (1000 Phrases)
Your final memoir must encompass the following sections:
Project Veil Page: Exercise the provided duvet sheet. Embody the Title, Project number, Pupil Names and IDs, and Subject.
Govt Summary and Conclusion: Summarize the total file with key findings. Be particular it is correct and properly deduces conclusions from the proof.
Physique (A large series of headings and textual inform material at the write alternative): This share can even aloof duvet the core of your research.
o Research and Discuss Cyber Complications Narrate: Introduce your memoir and repair the relevance of the chosen cyber advise. It is required to comprehensively research and justify the difficulty. o Name and Overview Your Chosen Nation and Applicable Laws in Every Affirm (Australian-Pacific, Europe, The US, and Asia): Represent with appropriate laws and critically compare each and every teach’s appropriate requirements connected to your topic. This requires a comprehensive identification and comparability of all applicable laws at some point soon of these world regions.
o Recommend What Form of Protection/Procedures an Organisation Ought to Have in Set up on This Narrate: Name what measures an organisation can even aloof implement, including the pattern of relevant insurance policies. Comprehensively identify policy/procedures indispensable to fight the cyber advise.
o Recommend Any Diversified Initiatives (As an illustration, Counter Ransomware Initiative) That Could well well Be Applicable: Attain your memoir with key laws and ideas, including diversified relevant initiatives. Comprehensively attach initiatives and, the put appropriate, make your grasp initiatives.
References/Bibliography: Present a comprehensive checklist of all sources extinct.
Appendix (including references): Embody screenshots of activities such as laws, comparisons of regions, etc.. Demonstrate atmosphere friendly use of the Appendix, guaranteeing it supports the easy proof, and use appropriate reference quotation.
Submission Instructions
All submissions are to be submitted through Turnitin. Fall-containers linked to Turnitin shall be teach up in Studying Management System (LMS). Assessments now now not submitted through these tumble- containers would perchance now now not be conception about. The Turnitin similarity web shall be extinct to determine any plagiarism of your submitted evaluate. Turnitin will take a look at convention websites, Journal articles, on-line sources, and your peek’s submissions for plagiarism. It is in all probability you’ll perhaps presumably look your Turnitin similarity web if you submit your assessments to the valid tumble-box. If your similarity web is of advise, you shall be in a residing to exchange your evaluate and resubmit. On the opposite hand, re-submission is handiest allowed sooner than the submission due date and time. No excuse shall be licensed resulting from file corruption, absence from lecture.
The memoir can even aloof grasp a fixed, knowledgeable, and successfully-organized appearance. Additionally:
Manufacture certain the filename for your submission follows this layout: YourName-YourStudentID.docx The task must adhere to the following formatting guidelines: 12-point font dimension, single line spacing, and obvious share headings.
Reviews ought to be submitted electronically as a single Microsoft Word file, throughout the Turnitin enabled submission hyperlink on the Studying Management System (LMS).
Submissions in zip file layout wailing now now not be licensed.
Assignments submitted on the LMS will handiest be licensed. Submission of assignments through electronic mail is now now not acceptable.
Point out: All work is due by the due date and time. Leisurely submissions shall be penalized at 20% of the evaluate final grade per day, including weekends. It is in all probability you’ll perhaps presumably now now not assemble re-submissions after the deadline.
Evaluate 2: Case Thought File
Overview
Weight Size Due date ULO
Introduction
In this individual evaluate, you will make the cybersecurity policy, procedures, or guidelines for an organisation. Your findings can even aloof be delivered in a written memoir. For the given case watch (beneath) write the Info Security and Privateness Protection for the case watch offered beneath. Exercise an acceptable template to entire the memoir as confirmed within the memoir structure share.
File Structure
Exercise an acceptable policy template. For Example:
CONTENTS
1 PURPOSE
2 SCOPE
3 POLICY STATEMENT
4 PROCEDURE
5 RESPONSIBILITIES
Compliance,
monitoring
and evaluate
Reporting
Info management
6 DEFINITIONS
Terms and definitions
7 RELATED LEGISLATION AND DOCUMENTS
8 FEEDBACK
9 APPROVAL AND REVIEW DETAILS
10 APPENDIX
Case Thought
ULO2, U Younger Minds Secondary College (YMSC) is a non-public Australian secondary college that has been operating for several years, growing modern programs for its students. Its staff has grown from 15 to 120 and the college enrols 700 students at some point soon of level 7 to 12. YMSC has been growing steadily at some point soon of the final 10 years. They’ve built noteworthy relationships with the neighborhood and americans tend to ship all their young of us to the college as successfully as recommending it to diversified of us. The owners depend on persisted boost and are planning to aquire yet every other college to teach up yet every other campus.
YMSC is owned and operated by a neighborhood of fogeys who within the beginning wished to construct an alternative education for their young of us. Their young of us grasp since executed college however the college modified into so a success in boost and is now managed by Joline Schack. The college’s IT facilities grasp grown alongside with the college, and it now employs 2 full time staff (Tim and Abishek to defend the arrangement operating, as alongside with a program coordinator, Carol, who assists teachers to incorporate computing within their programs).
Joline can foresee a time within the arrive future the put they use over 300 of us at some point soon of two campuses. Their staff are mostly teachers, though the college does grasp a Human Resources supervisor, and Accounts Manager, several administrative assistants (receptionist, teach of enterprise supervisor, secretary), and grounds staff.
It is in all probability you’ll perhaps presumably also grasp very just now now not too prolonged ago been shriveled to resolve an situation of advise to the owners – recordsdata safety. The college’s safety measures had been developed in a largely uncoordinated style and it has been suggested by Joline that recordsdata safety can even threaten the survival of the
college. It is in all probability you’ll perhaps presumably also had been given acquire entry to to all staff for assistance in figuring out the safety desires for YMSC.
Unquestionably, it is Joline that has initiated your hiring. She encountered a slight bit resistance from quiet ICT staff, arguing that persevering with with the quiet formulation is adequate. That formulation has been one and not utilizing a proper policy the put safety has been in-built an ad-hoc, piecewise formulation.
They would perchance both pronounce that the quiet policy has labored successfully adequate up to now, thanks to the guidelines and journey internal the crew.
Joline would desire to grasp Tim extra onside with the structured and formal formulation that you’re going to bring. In an are attempting to acquire that enhance, Joline has asked you to originate up your feature with YMSC by growing a memoir that discusses how recordsdata safety can even be better managed by YMSC.
While this memoir will largely be about frequent guidelines, she would also like you to head into element on one particular advise as a formulation of additional demonstrating the usefulness of your formal formulation. She would love you to head into element a couple of pattern that both she and Tim are very eager about, problems that shall be launched by opening a second campus. It is in all probability you’ll perhaps presumably also grasp made up our minds that you’re going to desire one ingredient of that pattern and draw up a Likelihood Management Notion for it and encompass a advice consistent with a Cost-Support Diagnosis.
The Younger Minds Secondary College Mission Commentary
YMSC believes in providing students with an modern academic program in a stable and fresh academic atmosphere. Hardware and Tool
The college at the moment uses commercial functions merchandise for its processes. This solutions a learning management arrangement (Moodle), MSOffice, accounts and finance (Alternate One), a VOIP phone arrangement internally and several cellphones for staff use. The college has a LAN infrastructure and it uses Wi-Fi at some point soon of the campus. All staff that require frequent acquire entry to to college programs are provided with a desktop computer computer – depending on their desires. Students must grasp their grasp computer computer or notebook and can acquire entry to the college’s community throughout the Wi-Fi arrangement. Some of the college’s programs can even aloof be accessed from off campus. The college does grasp a print and file servers. All recordsdata for college management is backed up to cloud products and companies provided by a local ICT supplier. E-mail has been shriveled to Microsoft.
It is in all probability you’ll perhaps presumably envision diversified hardware, tool, and recordsdata/recordsdata management procedures as you judge appropriate.
Marking Info: 30 Marks
Job: Info Security Protection Description
Motive and Scope Applicable clarify the aim and the scope of the policy.
Represent who’s accountable particular person at each and every stage of the direction of.
Relative legislation and diversified insurance policies
Represent how legislation and diversified policy impacts this policy.
Resolve appropriate feedback, approval and opinions for this policy.
Job: Privateness Protection Description
Motive and Scope Applicable clarify the aim and the scope of the policy. Procedures and Responsibilities Represent who’s the accountable particular person at each and every stage of the direction of. Relative legislation and diversified insurance policies Represent how legislation and diversified policy impacts this policy.
Resolve appropriate feedback, approval and opinions for this policy.
Marking requirements/Rubric
You shall be assessed on the following marking requirements/Rubric: Info Security Protection
Evaluate
Outstanding >=80% Admirable 70% –
Creditable 60% – Acceptable 50% –
Unsatisfactory
requirements
79%
69%
Motive and Scope are
C1. Motive obvious, concise, and
Motive and Scope are mostly obvious, concise,
Motive and Scope are adequately obvious,
59%
Motive and Scope are restricted and would perchance now now not be
<=49
Motive and Scope are both lacking or now now not obvious
and Scope
(1)
relevant to the case watch (3)
and relevant to the case watch (2.5)
concise, and relevant to the case watch (2)
obvious, concise, and relevant to the case
ed or
Academ
3 components
watch (1.5)
ic
Miscon duct. (0)
Comprehensively and
C2.
obvious procedures are
Procedures clearly outlined and the
and
duties are
Responsibiliti clearly identified (5)
es
Largely obvious and procedures are clearly outlined and the
duties are clearly identified (3.5)
Applicable obvious and procedures are clearly outlined and the
duties are clearly identified (3)
Adequately obvious procedures are clearly outlined and the duties are adequately identified (2.5)
Procedures and
Responsibilities are lacking or now now not obvious. (1)
Now now not Submitted or
Tutorial Misconduct. (0)
5 components
Comprehensively checklist of
C3. Relative
obvious appropriate
legislation
legislations and insurance policies.
and diversified (4)
Largely relative legislation and insurance policies. (3)
Applicable relative legislation and insurance policies are lacking or now now not addressed. (2.5)
Ample relative legislation and
insurance policies are lacking or now now not addressed. (2)
Relative legislation and diversified insurance policies are lacking or now now not obvious (1)
Now now not Submitted or
insurance policies 4 components
Tutorial Misconduct. (0)
Privateness Protection
Evaluate requirements
C1. Motive and Scope
3 components
Outstanding >=80%
Motive and Scope are obvious, concise, and relevant to the case watch (3)
Admirable 70% – 79% Motive and Scope are
mostly obvious, concise, and relevant to the case watch
(2.5)
Creditable 60% – 69% Motive and Scope are
adequately obvious, concise, and relevant to the case watch (2)
Acceptable 50% – 59% Motive and
Scope are restricted and would perchance now now not be obvious, concise, and relevant to the case watch (1.5)
Unsatisfactory <=49
Motive and Scope are both lacking or now now not obvious (1) Now now not Submitted or Tutorial
Misconduct. (0)
C3. Relative legislation and diversified insurance policies
4 components
Comprehensive checklist of obvious
appropriate legislations and insurance policies. (4)
Largely relative legislation and insurance policies. (3)
Applicable relative
legislation and insurance policies are lacking or now now not addressed. (2.5)
Ample
relative
legislation and insurance policies are lacking or now now not addressed. (2)
Relative
legislation and diversified insurance policies are lacking or now now not obvious (1)
Now now not Submitted or Tutorial
Misconduct. (0)
Evaluate 3: Likelihood Evaluate and Contingency Notion Overview
Evaluate
ID Evaluate Item When
due Weighting ULO# CLO# for MITS
3* Likelihood Evaluate and Contingency Notion
Fragment A: File
(2000 Phrases) (Neighborhood)
Session 12 30% 1, 2, 3, 4 1, 2, 3, 4
Point out: * denotes ‘Hurdle Evaluate Item’ that students must accomplish now now not lower than 40% on this merchandise to cross the unit
Introduction
A memoir detailing a safety management conception for an organisation, including risk evaluation, incident reporting, and catastrophe recovery to defend watch over safety, and tackle appropriate and statutory duties for a given case watch. Your neighborhood will attach a written memoir and an oral defence of the justification of the hazards eager. In this neighborhood evaluate, students shall be given a case watch and tasked with growing a sturdy safety management conception. It is in all probability you’ll perhaps presumably also be required to construct a comprehensive memoir of roughly 2000 phrases (plus or minus 200 phrases) addressing the following key parts:
Discuss the fit of your formal formulation to safety with the company’s values.
Discuss the feature your formulation would play in phrases of governance in frequent.
Discuss the implications of appropriate and statutory requirements applicable to the case watch. In the introduction, attach the advantages a Likelihood Management Notion can bring to a company and the steps you would coast through to manufacture one.
Embody a discussion on the importance of Contingency Planning to the company (as detailed within the case watch), as successfully because the risk evaluation and be aware-profit-evaluation mentioned.
Fashion of a Security Notion
List the threats, vulnerabilities, and attacks that your formal conception would teach up.
Defend the point of interest on the company’s context.
Write a continuity conception and a enterprise continuity conception for the case watch.
In the conclusion, focus on about the advantages derived from seeing Security Management as an ongoing direction of.
Case Thought: “InnovateTech Solutions”
Firm Overview: InnovateTech Solutions is an Australian SME specializing in reducing-edge AI and machine learning pattern, and recordsdata analytics consulting products and companies. The corporate has been in operation for seven years and has quickly obtained a popularity for handing over modern, recordsdata-driven alternate solutions to clients in finance, healthcare, and retail sectors. InnovateTech Solutions started with a core crew of 8 recordsdata scientists and engineers and has abruptly grown to a group of 75, serving over 150 excessive-profile clients globally. The corporate at the moment operates from a vivid single teach of enterprise in a essential city however is actively planning to assemble higher its operations by opening two fresh satellite areas of work in diversified global cities internal the subsequent 18 months to better abet its growing world client spoiled and faucet into fresh skills swimming pools.
Growth and Fresh Operations: InnovateTech Solutions has experienced exponential boost at some point soon of the final few years, largely driven by its proprietary AI algorithms and a success client venture outcomes. The corporate is managed by its visionary co-founder, Dr. Emily Clarke, who has quick the company’s swiftly enlargement from a startup to a identified leader in AI alternate solutions. Dr. Clarke anticipates persisted aggressive boost and is planning to manufacture two smaller AI research companies in diversified international locations to additional toughen InnovateTech Solutions’ intellectual property and market attain.
IT Infrastructure: The corporate’s IT infrastructure is extremely specialised and indispensable to its operations. At the origin, it modified into managed by a minute, agile IT crew taken with supporting pattern environments. Because the company grew, the complexity and sensitivity of its IT desires very a lot elevated. Currently, the IT division contains three full-time staff participants: Liam (Cloud Operations Lead), Sarah (Network Administrator), and David (Info Security Analyst). They’re accountable for inserting forward the company’s excessive-efficiency computing clusters, stable recordsdata lakes, and guaranteeing operational continuity for all client initiatives. Additionally, Maria, the Head of Research, time and yet again collaborates with the IT crew to combine fresh research platforms securely.
Challenges and Concerns: With the deliberate global enlargement and the acquisition of latest companies, Dr. Clarke foresees an pressing desire to formalize and very a lot toughen the company’s recordsdata safety practices. The quiet formulation to IT safety, while effective for a smaller, centralized operation, has been a little bit of casual and developed in an ad-hoc formulation, heavily relying on the journey of individual IT staff. Dr. Clarke is deeply eager that this casual formulation would perchance now now not be adequate to guard the company’s extremely aesthetic intellectual property, titanic amounts of client recordsdata (which infrequently includes private and monetary recordsdata), and its growing world operations from sophisticated cyber threats. The prospect of managing recordsdata at some point soon of extra than one global jurisdictions with diversified recordsdata safety laws (e.g., GDPR, CCPA, native Asian privacy acts) is a essential problem.
Your Role: It is in all probability you’ll perhaps presumably also grasp just now now not too prolonged ago been shriveled as a specialist cybersecurity consulting firm to evaluate InnovateTech Solutions’ quiet recordsdata safety posture and provide comprehensive ideas for improvement. Dr. Clarke initiated your hiring, recognizing the indispensable want for a extra structured, scalable, and globally compliant formulation to recordsdata safety. On the opposite hand, there modified into some apprehension from parts of the present IT staff, who really feel their existing agile systems are ample and peril that formal insurance policies can even hinder swiftly innovation.
Aims: Dr. Clarke has asked your neighborhood to make an wide memoir that outlines how recordsdata safety can even be better managed at InnovateTech Solutions, with a particular point of interest on the challenges of global enlargement and unfriendly-jurisdictional recordsdata management. While the memoir can even aloof duvet frequent recordsdata safety guidelines, Dr. Clarke also wants you to point of interest on a particular, indispensable advise: the stable integration of newly obtained global companies, particularly addressing stable recordsdata migration, community interoperability, and guaranteeing compliance with relevant recordsdata privacy laws at some point soon of all entities. It is in all probability you’ll perhaps presumably also be expected to construct a comprehensive Likelihood Management Notion for this advise, including a thorough risk evaluation, and provide a advice consistent with an wide Cost-Support Diagnosis of your proposed alternate solutions.
Mission Commentary: InnovateTech Solutions is committed to main innovation in AI and recordsdata analytics, handing over transformative insights to clients while upholding the excellent requirements of intellectual property safety, recordsdata safety, and client privacy globally.
Fresh IT Setup: InnovateTech Solutions utilizes an advanced combination of business, birth-source, and proprietary tool merchandise for its operations. This includes progressed AI/ML pattern platforms (e.g., TensorFlow, PyTorch), stable code repositories (e.g., GitHub Endeavor), venture management tool (e.g., Jira), collaborative productivity instruments (e.g., Microsoft 365 E5 suite), specialised broad recordsdata analytics instruments (e.g., Apache Spark, Hadoop clusters), and an internal stable VoIP communication sys tem. The corporate’s infrastructure depends heavily on a hybrid cloud model, leveraging both non-public cloud infrastructure for aesthetic recordsdata processing and essential public cloud companies (e.g., AWS, Azure, Google Cloud) for scalable computing and recordsdata storage. Staff are provided with excessive-efficiency workstations and laptops, and stable faraway acquire entry to by device of Zero Trust Network Bag entry to (ZTNA) is enabled for all off-residing work. All indispensable client recordsdata and intellectual property are kept in geo-redundant, encrypted cloud recordsdata lakes with automated backups. E-mail and collaboration products and companies are hosted by device of Microsoft 365, with progressed menace safety enabled.
Next Steps: Your neighborhood’s process is to confirm additional hardware, tool, safety frameworks, and recordsdata/recordsdata management procedures that can robustly enhance the company’s valorous global enlargement and acquisition plans, while guaranteeing unwavering recordsdata safety practices and world regulatory compliance.
Instructions for Writing and Presentation (Neighborhood)
Fragment A: File (2000 Phrases)
File Structure
The memoir must encompass the following:
Project Veil Page. Exercise the quilt sheet provided. Embody the Title, Project number, Pupil Names and IDs, Subject. Crucially, on this page, each and every neighborhood member must write a one-sentence assertion outlining their particular contribution to the memoir.
Microsoft Word “Veil Page”. Embody the identify of the memoir, who it has been willing for, and the creator(s).
Govt summary (1 paragraph: Who the memoir is for, scope/aim of memoir; toddle required). Desk of contents.
Physique (A large series of headings and textual inform material at the creator’s discretion). This can even encompass an introduction that describes the scope of the file and its structure.
A signal-off page – a page for the relevant parties to just web and approve the memoir.
References (List of works extinct within the file)/Bibliography (Materials relevant to the memoir, however now now not immediately extinct).
Appendices for any diversified file you watched can even usefully be included.
Your memoir can even aloof be a comprehensive safety management conception for InnovateTech Solutions, adhering to the specified memoir structure. Pay shut attention to the following sections as they align with the marking requirements: Govt Summary: Summarize the total file with key findings, who the memoir is for, its scope/aim, and the toddle required.
Introduction: Introduce the memoir, explaining its introduction and aligning your formal safety formulation with InnovateTech Solutions’ values and its feature in total governance. Discuss the implications of appropriate and statutory requirements applicable to the case watch (e.g., GDPR, APPs), and repair the advantages and steps of a Likelihood Management Notion, including the importance of Contingency Planning, Likelihood Diagnosis, and Cost-Support Diagnosis for InnovateTech Solutions.
Description of the Model Worn to Build a Security Management Notion: Represent the safety management conception you’ve developed, specializing in how it addresses the outlandish context of InnovateTech Solutions. This can even aloof encompass figuring out and listing key threats, vulnerabilities, and attacks that your conception would teach up, alongside with instructed risk mitigation systems. This share can even aloof clearly attach the price-profit evaluation and impression of your proposed safety measures. Additionally, it’ll be essential to write a comprehensive continuity conception and a enterprise continuity conception particularly tailored for InnovateTech Solutions.
The Factual and Statutory Requirements That Will Be Addressed: Detail the explicit appropriate and statutory requirements relevant to InnovateTech Solutions’ operations, notably eager about its global enlargement and recordsdata facing at some point soon of diversified jurisdictions, and how your conception addresses these.
Represent the Cost-Support Diagnosis of Your Proposal: Present a obvious and detailed be aware-profit evaluation of your entire safety conception, justifying the proposed investments in safety measures in opposition to the prospective risks and their impacts.
Conclusion: Attain your memoir by discussing the advantages derived from seeing Security Management as an ongoing direction of at InnovateTech Solutions and provide key systems and ideas for ongoing safety.
References/Bibliography: Present a comprehensive checklist of all works extinct and any relevant materials. Appendices: Embody any additional supporting paperwork or detailed recordsdata you judge functional.
The memoir can even aloof grasp a fixed, knowledgeable, and successfully-organized appearance. Additionally:
Manufacture certain the filename for your submission follows this layout: YourGroupNumber.docx The task must adhere to the following formatting guidelines: 12-point font dimension, single line spacing, and obvious share headings.
Reviews ought to be submitted electronically as a single Microsoft Word file, throughout the Turnitin enabled submission hyperlink on the Studying Management System (LMS).
Submissions in zip file layout wailing now now not be licensed.
Assignments submitted on the LMS will handiest be licensed. Submission of assignments through electronic mail is now now not acceptable.
Point out: All work is due by the due date and time. Leisurely submissions shall be penalized at 20% of the evaluate final grade per day, including weekends. It is in all probability you’ll perhaps presumably now now not assemble re-submissions after the deadline.
Fragment B: Presentation (Neighborhood)
This is a neighborhood presentation, with handiest one presentation per neighborhood allowed.
Presentation Duration: Every neighborhood member must attach for 2-3 minutes.
All participants must attach in particular person at the designated campus at some point soon of Week 13. Failure to support and repair in particular person will stop in a 0 grade for that evaluate.
Recording: You would possibly want to file the video the use of a PowerPoint presentation (with narration/video of presenters) or Zoom. All neighborhood participants must seem within the video.
Submission File Size: Your submission file dimension can even aloof be beneath 100MB.
Submission Responsibility: The neighborhood leader is accountable for submitting the recorded video. Failure to conform with these instructions will stop in 0 marks for the presentation.
Marking Requirements/Rubric
You shall be assessed on the following marking requirements/Rubric:
Marking Info: 30 Marks Fragment A: File (Neighborhood)
Job Description Marks Govt Summary Summarize the total file with key findings. 2
Introductions Introduce the memoir – “how come this memoir modified into
3
created?”
The suitable and statutory requirements that shall be addressed
Represent the price-profit evaluation of your proposal
Represent the appropriate and statutory requirements with
5
regard to the case watch
Represent the price-profit evaluation of your safety
5
conception
Conclusion Attain your memoir with key systems and
2
ideas
Marking Info: 20 Marks Fragment B:
Presentation (Neighborhood)
Job Description Marks
Present your Security Notion Represent the safety conception you developed from the
15
case watch
- WE OFFER THE BEST CUSTOM PAPER WRITING SERVICES. WE HAVE DONE THIS QUESTION BEFORE, WE CAN ALSO DO IT FOR YOU.
- Assignment status: Already Solved By Our Experts
- (USA, AUS, UK & CA PhD. Writers)
- CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS
QUALITY: 100% ORIGINAL PAPER – NO ChatGPT.NO PLAGIARISM – CUSTOM PAPER

Looking for unparalleled custom paper writing services? Our team of experienced professionals at AcademicWritersBay.com is here to provide you with top-notch assistance that caters to your unique needs.
We understand the importance of producing original, high-quality papers that reflect your personal voice and meet the rigorous standards of academia. That’s why we assure you that our work is completely plagiarism-free—we craft bespoke solutions tailored exclusively for you.
Why Choose AcademicWritersBay.com?
- Our papers are 100% original, custom-written from scratch.
- We’re here to support you around the clock, any day of the year.
- You’ll find our prices competitive and reasonable.
- We handle papers across all subjects, regardless of urgency or difficulty.
- Need a paper urgently? We can deliver within 6 hours!
- Relax with our on-time delivery commitment.
- We offer money-back and privacy guarantees to ensure your satisfaction and confidentiality.
- Benefit from unlimited amendments upon request to get the paper you envisioned.
- We pledge our dedication to meeting your expectations and achieving the grade you deserve.
Our Process: Getting started with us is as simple as can be. Here’s how to do it:
- Click on the “Place Your Order” tab at the top or the “Order Now” button at the bottom. You’ll be directed to our order form.
- Provide the specifics of your paper in the “PAPER DETAILS” section.
- Select your academic level, the deadline, and the required number of pages.
- Click on “CREATE ACCOUNT & SIGN IN” to provide your registration details, then “PROCEED TO CHECKOUT.”
- Follow the simple payment instructions and soon, our writers will be hard at work on your paper.
AcademicWritersBay.com is dedicated to expediting the writing process without compromising on quality. Our roster of writers boasts individuals with advanced degrees—Masters and PhDs—in a myriad of disciplines, ensuring that no matter the complexity or field of your assignment, we have the expertise to tackle it with finesse. Our quick turnover doesn’t mean rushed work; it means efficiency and priority handling, ensuring your deadlines are met with the excellence your academics demand.
