Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1.1 Evaluate the three key activities for information security as per the Standard of Good Practice for Information Security indicating which, you believe, is

image text in transcribedimage text in transcribed

1.1 Evaluate the three key activities for information security as per the Standard of Good Practice for Information Security indicating which, you believe, is the weakest area of information security in any organization. Your view must incorporate the elements and scope off the risk assessment. Substantiate your view with references from the case. QUESTION TWO (20 MARKS) 2.1 "The classifications of security indents are done according to ISO 27035 standard." With reference to this statement and the case study, assess the countermeasures that may be employed for protection against cyberattacks. Your assessment should provide a detailed explanation of the typical phases in the digital forensics process. QUESTION THREE (25 MARKS) 3.1 You have been appointed as the Head: IT Security of NEW-IT Company. Provide a report detailing the recommended measures that NEW-IT Company must take to ensure security while giving remote working rights to an employee. Your recommendations must differentiate between malicious behaviour, negligent behaviour, and accidental behaviour. Page 5 of 6 QUESTION FOUR (25 MARKS) 4.1 Summarise the key objectives of an external security audit and the generic steps to be followed for security compliance monitoring paying special attention to the guidelines defined by COBIT 5 for the performance and conformance processes. TOTAL MARKS: 100

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Computer Networking A Top-Down Approach

Authors: James Kurose, Keith Ross

7th edition

978-0133594140

More Books

Students also viewed these Computer Network questions

Question

What is a manufacturing system?

Answered: 1 week ago