[Solved] MITS5004 IT Security

Assignment 2 Research Report

Objective(s)
This assessment item relates to the unit learning outcomes as in the unit descriptor. This assessment is designed to improve student presentation skills and to give students experience in researching a topic and writing a report relevant to the Unit of Study subject matter.
INSTRUCTIONS
Assignment 2 – Research Study – 10% (Due Session 9) Individual Assignment
For this component you will write a report or critique on the paper you chose from Assignment 1.
Your report should be limited to approx. 1500 words (not including references). Use 1.5 spacing with a 12 point Times New Roman font. Though your paper will largely be based on the chosen article, you should use other sources to support your discussion or the chosen papers premises. Citation of sources is mandatory and must be in the IEEE style.
Your report or critique must include:
Title Page: The title of the assessment, the name of the paper you are reporting on and its authors, and your name and student ID.
Introduction: Identification of the paper you are critiquing/ reviewing, a statement of the purpose for your report and a brief outline of how you will discuss the selected article (one or two paragraphs).
Body of Report: Describe the intention and content of the article. If it is a research report, discuss the research method (survey, case study, observation, experiment, or other method) and findings. Comment on problems or issues highlighted by the authors. Report on results discussed and discuss the conclusions of the article and how they are relevant to the topics of this Unit of Study.

Conclusion: A summary of the points you have made in the body of the paper. The conclusion should not introduce any ‘new’ material that was not discussed in the body of the paper. (One or two paragraphs)
References: A list of sources used in your text. They should be listed alphabetically by (first) author’s family name. Follow the IEEE style.
The footer must include your name, student ID, and page number.

 

Solution

Information System Security Management

Introduction

Information security management is a seamless, systematic, and structured approach to controlling and protecting an entity’s information from possible compromise. Ideally, an organization’s information could be compromised by malicious and irresponsible parties. In a bid to make sure that information is secure, different entities have implemented management systems by putting in place and reviewing security procedures, policies, and structures [1]. Lack of awareness regarding the information security management system on account of poor understanding of success factors is among the major variables which result in this phenomenon. Conversely, having an advanced understanding and appreciation of information technology security goes a long way in informing the manner in which stakeholders secure their systems [1]…………………………………….To access the rest of the solution for $10, please click on the purchase button.