Intake : UCMP1810
Lecturer : Dr. Maryam Shahpasand
Email ID : maryam.shahpasand@staffemail.apu.edu.my
Learning Outcomes
1. Appraise the components of information security architectures (ISA) based on organization’s
needs and requirements.
2. Compare and contrast available models and frameworks of information security and
architectures.
3. Evaluate issues in information security architectures in terms of design and implementation by
describing appropriate evaluation methods and justifying your choices.
4. Propose practical solutions in designing and implementing information security architectures
based on given scenarios.
Assignment Overview
This individual assignment will contribute 50% to the module assessment. The report must be typed with
Times New Roman font and size 12 with maximum length of 6000 words (excluding diagrams, appendixes
and references)
Scenario:
You are an IT manager in a private limited status company. Your company provides Service Integration
and Managed Security Services to multiple local and small SME organizations. Running a team of 10
engineers (4 specializing in systems, 3 in networking, and 3 in applications) who develop solutions and
administer clients’ environment, business had been good and very profitable. In recent times, the CEO of
your organization decides to venture into larger markets. In order for this, he realized the company needed
to undergo a substantial, structural transformation. The company needs to conform to international
standards in the management of information systems security. Your CEO sends you for Information
Security Management Architecture training to learn and facilitate this. You are also promoted to a CISO
role. Everything else formerly in your scope as IT manager remained the same.
As your first task, identify and investigate the potential issues in the existing design and implementation of
Information Security Architecture for the organization. Based on the research findings and the attached
sample, Analyse the independent variable, modeling techniques, evaluation criteria. Using appropriate
1
CT058-3-M-ISA (Information Security Architectures)
evaluation methods, you are required to research and evaluate these issues and risks to be presented to the
CEO, with proper justifications.
Document the results of your work in a professional and systematic manner and submit one soft copy and
one hard copy. Your completed documentation should meet the following requirements:
Submission requirements
2. Your report must be typed using Microsoft Word with Times New Roman font with 1.5 spaces.
4. Ensure that the report is printed on standard A4 (210 X 297 mm) sized paper. Paper weight of 80 grams
and above is highly recommended.
5. The report should have a one (1”) margin all around the page as illustrated below:
1 inch 1 inch
1 inch
1 inch
1 inch
1 inch 1 inch
6. Every report must have a front cover. A transparent plastic sheet can be placed in front of the report to
protect the front cover. The front cover should have the following details:-
a) Name
b) Intake code.
c) Subject.
2
CT058-3-M-ISA (Information Security Architectures)
d) Project Title.
e) Date Assigned (the date the report was handed out).
f) Date Completed (the date the report is due to be handed in).
7. All information, figures and diagrams obtained from external sources must be referenced using the
Harvard referencing system accordingly.
Marking Scheme
The marking table must be placed on a single page, located as either the second or third page of the final
assignment documentation.
TP Number: ______________________________
Assumptions 10
3
CT058-3-M-ISA (Information Security Architectures)
Technical Accuracy 10
Self-development 10
Referencing 10
Presentation / Demonstration 10
MARKING RUBRIC
4
CT058-3-M-ISA (Information Security Architectures)
5
CT058-3-M-ISA (Information Security Architectures)
6
CT058-3-M-ISA (Information Security Architectures)