Assignment
Part A
1. Describe the Australian Government's ISM and PSPF with emphasis on information classification. Develop an organisational structure to implement the requirements of the standards.
2. Charlie and Iris are working in the same company but a different department who meets during lunch time to discuss about their work. Today Iris discussed about a new position being created and Human Resources department starting advertising the position. Charlie then tell Iris " I have a friend who runs a placement service and an find the right person. Once the position is filled, I will split the finder's fee with you" .
Iris knows that her company may pay as much as half a years' salary for the placement services. Charlies friend is likely o pay him a substantial amount if Iris awards the placement contract to them. If she can get a good employee and a little extra money on the side, everyone wins.
However, Iris is not comfortable with such an arrangement, and she's pretty sure it's against company policy.
If this comes to pass, is Charlie or Iris doing anything illegal?
What's ethically wrong with Charlie's proposal?
Part B
3. Recently Australian government had released regulation about General Data Protection Regulation and Mandatory data breach notification act. Describe your understanding of GDPR and its implications in Australian businesses.
4. Describe the importance of Identity and Access Management systems in enforcing security in an organisation. Briefly describe some industry-based products and compare their performances.
5. Describe what are the issues faced by an organisation allowing staff to use their private smart mobile phones to carry out its business. What management methods can be used to reduce the risks to an organisation using mobiles?
6. Email is a vector through which an organisation's security can be attacked. There are different threats that come through email. What steps would you take to reduce the risks to an organisation's information security?
7. Data breaches have become very common now, explain any three critical data breaches that happened in 2017 to 2019. What would be your recommendations to avoid those data breaches?
8. In 2016, Census Australia website was shutdown for 40 hours due to DDoS (distributed Denial of Service) attack. Explain what DDoS is, how the attack happened and what are the general countermeasures any web site which expects massive volume of requests should take.
Format your assignment according to the following formatting requirements:
1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
2. The response also includes a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.
3. Also include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.