Highlights
ICTNWK519
Case Study Scenario IT Assessment Task
You have been working in a training school as a System Administrator who looks after the local area network and IT Infrastructure with support and configuration of the PC and servers. You have been assigned to a new project where you will undertake the role of System Administrator with some of the responsibilities including to:
• Assist in the development and maintenance of System security plans and contingency plans
• Participate in risk assessments to evaluate the risk and its mitigation strategies associated with the IT and systems.
• Provide support for proposing, coordinating, implementing and enforcing security policies, standards and methodologies.
• Document the security framework and develop the security policies and operating procedures
• Align the organizational security requirements with that of internationally accepted and local security standards (ISO Standards)
Recently the training school decided to review its security policies as they had not been reviewed for a number of years. The Director of the training school has assigned you the job of creating a new security framework for the training school.
You are required to complete the following tasks covering design of the security framework and the creation of related policies and procedures.
Task 1: Role Play
You are to participate in a role play meeting to review some aspects of ISMS (Information Security Management System). The agenda for the meeting is provided in your learning resources.
You are participating in this meeting as a System Administrator for the company as provided in the given case scenario. Your trainer/facilitator will act as the Security Compliance Officer and will provide you with information on current information security risk management practices within the training school.
ICTNWK519
Task 2: Develop ICT Security Framework
Using the information from Task 1, describe the ICT security framework for the case study organization based on the framework provided in figure 1 below. Your description should cover the following topics:
• Introduction
• Objectives
• Application
• Scheme of Delegation under the ICT Security Framework,
• Legislation and internationally recognized standards.
This ICTNWK519 IT Assessment has been solved by our IT experts at My Uni Paper. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing style.
Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.
© Copyright 2026 My Uni Papers – Student Hustle Made Hassle Free. All rights reserved.