As global use of the Internet continues to grow, the demand for and reliance on Internet-based information creates an increasing expectation of access. Businesses are reliant on the Internet, which creates an increasing threat of attacks on information assets and need for greater number of professionals capable of protecting those assets. There are billions of Internet users capable of accessing and attacking online information from anywhere at any time. As such the threat of an attack from individuals, criminals and government entities grows daily. Information Technology (IT) professionals are expected to have an optimal mix of skills and experiences to secure diverse information and computing environment.
Overview
You will be required to submit via Turnitin on Moodle your written documentation/report. A Moodle link will be created to upload additional files such as design approach, implementations if or any other additional work done. These are not compulsory but depend on your approach.
Case Scenario
NatureGarden (NG) sells products that are used to maintain healthy living are one of the most sought-after brand in the world. NG has extensive presence around the globe. The company uses cloud services to deliver IT services to its staff and clients. It is estimated that almost 95% of the company’s network is wireless based. The company also has a massive online presence and social media presence to promote its activities.
Task:
Based on the scenario on NatureGarden (NG) above.
1). Conduct research into various security framework or models with the aid of diagrams, figures and charts example, Information Technology Infrastructure Library (ITIL) and Security model example, International Organization for Standardization; ISO 27000.
2). Use knowledge and understanding gain from your research to:
- design your own approach to meet the need of the company information system security, governance, and compliance. Tables and diagrams may be used in your approach.
- critique, analyse, and discuss why it is good practice to constantly have new or updated regulations and standards.
Module Learning Outcomes
1). Demonstrate a systematic understanding of a wide range of current research and technological advances in data security, governance and compliance.
2). Consistently apply the principles and practices of data security with skills and experiences to administer and manage the more secure information and communications technology environment that organisations need