Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. Critically evaluate the key information governance principles, practices and security frameworks to demonstrate your understanding in the design, development, implementation and monitoring of information

1.Critically evaluate the key information governance principles, practices and security frameworks to demonstrate your understanding in the design, development, implementation and monitoring of information security management system of an organisation.

2.Ability to critically evaluate the risk assessment methodology to determine appropriate control objectives for a given organisational scenario

3.Demonstrate ability to work as a member of a team and make contributions to team success and effectiveness

4.Critically appraise, social, ethical and legal responsibilities of an Information security auditor to comply with.

Blackbaud is the world's largest provider of education administration, fundraising and financial management software. In July 2020, it was reported in the media that Blackbaud was held to ransom by hackers, this resulted in more than 20 universities and charities in the UK, US and Canada have confirmed they are victims of this Cyber-attack. The news further mentioned that Blackbaud paid the ransom, although this is not illegal however it was against the advice of law enforcement agencies. The correct scale of breach is not confirmed yet, however affected UK Universities have reported this incident to UK's Information Commissioner's Office (ICO).

After this news, University of Higher Education (UHE), which is a private University located in the suburb of London borough of Sutton decided to review its Information Security Management System. The University management acknowledge the significance of reliable information security to its assets and responsibility to ensure students and staff personal data and research data, maintain Confidentiality, Integrity and Availability against cyber security attacks. The UHE wants to adopt robust Information Security policy to adhere with legal and regulatory compliance and understand that Information Governance can play a vital role in its day to day operations as it establishes policies, procedures and accountability, which is imperative for an effective management lifecycle of student/staff personal data and can maximise data privacy and confidentiality. The aim of Information governance is to provide data confidentiality and protection assurance to UHE management, individual students and help staff to understand the importance of data handling procedures to adhere with information assurance, corporate information assurance, information security assurance and perform their duties ethically to demonstrate duty of care as well as respecting data subjects rights while processing their personal data.

Task 1: Information Governance Need & Cyber Security Threats

Critically appraise understanding of latest cyber security threats to information assets and demonstrate requirements of Information Governance need in the context of given scenario. The role of Information Security auditors to comply with social, ethical and legal requirements to assess the effectiveness of Information Security Management System. Report should include appropriate language, referencing, clarity of expression style, format and length.

Task 2: Framework

Justification of the approach taken and rationale for the scope and content of the Information Security Management Systems (ISMS) based on a critical evaluation and understanding of the organisation, and reference to principles and best practice. This could include critical evaluation of Information governance frameworks and rationale of the choice considered for a given context. Presentation should include appropriate language, referencing, clarity of expression style, format and length.

Task 3: Risk Assessment

Justification of the importance of information governance to the organisation based on a critical evaluation of the organisational context. This should include risk assessment methodologies either qualitative or quantitative. Identify information assets, identify threats, vulnerabilities and risks associated with assets. Presentation should include appropriate language, referencing, clarity of expression style, format and length.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

College Accounting Chapters 1-15

Authors: James A Heintz, Robert W Parry

19th Edition

0324376162, 978-0324376166

More Books

Students also viewed these Accounting questions

Question

1. Letters and diaries in history.

Answered: 1 week ago

Question

1. To understand how to set goals in a communication process

Answered: 1 week ago