Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Need Asap Task Description Advanced Medicos Limited (AML) is a private telehealth healthcare service and product selling company that has branches throughout Australa, As a

image text in transcribedNeed Asap

Task Description Advanced Medicos Limited (AML) is a private telehealth healthcare service and product selling company that has branches throughout Australa, As a healtheare provider, they manage sensitive health-related and personal data of their clients. They also sell their health care products to Australan and overseas customers online. The company also consists of a professional sub-division that manages both the back end and front-end applications. The vision of the company is to be among the top 5 nationwide, The board, from the advice of the Chiet information Officer (ClO) and Chief Information Security Otficer (CISO), has concluded that they should get to the point that the key services such as web portals should be able to recover from major incidents in less than 15 minutes while other services can be up and running in less than 1 hour. In case of a disaster, they should be able to have the Web portal and payroll system fully functional in less than one day. The company is a new company that is growing rapidly. While the company uses its database server to store the information of its customers' private data, credit card info, eto. it has a poor-designed network with a low level of security. As the company is responsible for the privacy and the security of customer personal and health-related into, credit card details, the security of payment transactions, etc., they are required to improve their information security. ISYSH03-Ass2 Therefore, you are hired by the company as a cybersecurity consultant to help manage security and write a security plan for the company to address the contemporary and emerging risks from the cyber threats the company is facing. Your task is to examine and make recommendation on the current plan and security policies. The examination consists of an in-depth analysis of the current security status of information systems in place; specitically you will do the following tasks: Task 1: Do research about different steps of Enterprise Risk Management by ISO (or NIST or national standards) framework and briefly explain each step. The word count is limited to around 200300 words. All reference sources should be listed using any standard referencing format. Direct copy and paste will be graded zero (0). Task 2: Identify and evaluate the mandatory security requirements in the area of Access Control Management and Data and Notwork Security Management and map them to ISO (or national) standards for cyber security laws and regulations in the given business context. The word count is limited to around 300 words. All reference sources should be listed using any standard referencing fomat. Direct copy and paste will be graded zero (0). Task 3: Develop a risk management strategy to mitigate the existing risks to an acceptable level. You should use the template provided to create your strategy. Task 4: To improve the level of cybersecurity, you develop an appropriate security policy for the company. You are expected to provide comprehensive security policies in Access control and Network socurity for this company to protect the assets (assets include information, software, hardware, human, etc.) in accordance with standard frameworkibest practice, The word count is limited to around 500 words. All relerence sources should be listed using any standard referencing fomat. Direct copy and paste will be graded zero (0). The links below give you some examples of information security policies. htins:/loolicios.sch. adu.audocumant viow-current,php?id =307 hitps /lopolicies,newcagtle, edu, au/document/view-current php?id=135 htips.//sydney.edu, awpolicies/showdoc. asp reconum=PDOC201 1/1418RendNum=0 Task 5: Explain how intormation security governance can help the AML to have efficient and effective security management. ISYSHOB-Aw2 The word count is limited to around 200 words. All reference sources should be listed using any standard referencing fomat. Direct copy and paste will be graded zero (0)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Focus On Geodatabases In ArcGIS Pro

Authors: David W. Allen

1st Edition

1589484452, 978-1589484450

More Books

Students also viewed these Databases questions