Information security management assignment sample

Information security management assignment sample

Information Security Management

SALT (Smart And Living Technologies) is a medium sized Software Development company in South Australia which was established in 2004. It is present in two premises, both of which have their offices. Additionally, they have hosted their information systems in a hosted data center facility with a service provider.

That is the only instance of their IT infrastructure. SALT is providing software solutions and consulting services to clients all over the world, who fall under small to medium sized businesses. The departmental heads are mostly the people who were there since first day of the business, except the CISO that is a new role introduced recently. This explains why heads of department in SALT have a good knowledge about their business processes but did not make much effort towards formal documentation.

Alex Smith is the CEO of SALT. He started the company in partnership with a friend Brett. Brett is an investor in the company but has a dormant role as far as the business operations are concerned. Mr. Smith is an engineer but he has no modern technical understanding of IT security issues. Alex has had no problems with IT Security until very recently when the Company’s network was subject to a series of attacks. In the period of 3 days, the company’s website was defaced, a serious virus infected the company e-mail and large quantities of data were corrupted.

Alex’s IT security risk management concerns are wide ranging. He needs to determine whether the same hackers are likely to hack the company again. He believes the recent attacks suggest the hackers were interested in either proprietary theft of sensitive information for personal and/ or financial gain or, to disrupt the reputation of the company. There is also an evidence of a previous disgruntled employee planning for revenge against the company.
Smith is worried about cyberterrorism and is concerned about becoming a victim of e-crime.

After discussing with the Executive committee, he appoints you as a Chief Information Security Officer (CISO). As a first step, you will review the current threats analyse the impacts, and create necessary management plans. The CEO has shared a recent audit report to start with and the shocking results are listed below:

Internal Audit Report:

1. General:
o Improper operating procedures used by employees.
o Lack of security awareness and general security laziness.
o Nil acceptance of security responsibility.
o In-adequate standard operating procedures.
o Unattended machines.
o Failure to take care of media.
o Printing sensitive material.
o Failure to turn off computers at the end of the working day.
o Failure to backup information.

2. Hardware problems:
o Failure to adequately secure the hardware (eg laptops unsecured).
o Effects from the physical environment causing damage.

3. Software concerns:
o Some application software is of inferior quality and untested in the field and therefore not able to be trusted in the office environment.
o Nil audit logs.
o Lack of adequate access control.
o Lack of secure identification and authentication techniques.
o Limited antivirus software.
o Lack of restrictions to specific files when certain applications are operating.
o Lack of security awareness and general security laziness.


1. Based on the above information, please propose the organisation structure of Information Security team, which is suitable to work for you. Justify your proposal so that you can secure approval from Mr. Alex. (Remember you are the CISO.)

a. Deliverables:

i. Organisation Chart
ii. Justification for each role
iii. Job description of each role

2. Please propose Information Security processes and procedures which you will like your team to define. You only need to name those processes and procedures, explain only one process and one procedure in detail. Examples of such security processes is Information

3. Security Incident Management and Information Security Risk Management. An example of such a procedure is SOP for TVA (Threats and Vulnerability Assessment).

a. Deliverables:
i. List of Information Security processes for SALT
ii. List of Information Security procedures for SALT
iii. Elaborated Information Security process (only one) of your choice from the list above
iv. Elaborated Information Security procedure (only one) of your choice from the list above

3. Based on the findings of the Audit report, discuss the major risks and threats the company is currently facing in the current scenario as of September 2016. Your discussion can be categorised under the broad categories of people, process and technology. Please also prepare your Risk Register for SALT (only cover Information Security Risks). The template will be: {Risk ID, Risk description, Risk Probability, Risk Impact, Proposed Mitigation, Risk Ownership, Risk Triggers}.

a. Notes:
i. Recall that Risk Register is a deliverable of Information Security Risk Management. So it means that you have to plan risk management, and identify, assess*, mitigate, assign owners and triggers to those risks). *Decide your strategy for assessment: qualitative or quantitative.
ii. Based on the internal audit report, please identify vulnerabilities of SALT from Information Security perspective.
iii. Based on the evaluation of the above threats, prepare a Business Impact Analysis (BIA). It will become an input to your risk assessment and risk response planning.
iv. You may base your proposal on any (one or more) standards which were discussed in the class.

b. Deliverables:

i. Lists of risks, threats and vulnerabilities
ii. Assessment (qualified and/or quantified) of the risks identified and the BIA
iii. Risk register

4. Provide a suitable Information Security policy for SALT. Your policy document should include the major sections of the proposed policy document. Also, please highlight in your policy where you have mitigated the threats that you identified as response to the questions below.
a. Note: You may base your proposal on any (one or more) standards which were discussed in the class.
b. Deliverable:
i. Information Security Policy document
ii. Highlight the sections as mentioned

5. Finally, illustrate the legal and ethical issues in case data related to one of the South Australian public sector clients of SALT are lost or damaged. Also identify the risks that may arise due to these issues. Provide details of how the broad categories of Federal and South Australian criminal legislation can be used to prosecute hackers and computer criminals in South Australia.

a. Deliverable:
i. List of legal and ethical issues
ii. Elaboration of those issues
iii. Add your risks arising due to legal and ethical issues to the Risk Register but put a different identifier to those risks in the Risk Register so that those can be clearly identified.
6. Advise how your organization can be forensically ready for possible actions against intruders to company network.
a. Deliverable:
i. Forensic readiness document

Scroll to Top