Assignment 02 Information Classification Schema

Assignment 02 Information Classification Schema

Click here and consider this done.

This assessment builds on the previous assessment, assignment 01. Kleen Communication & Media Ltd is a social media marketing company, which targets small business. Kleen Communication & Media Ltd has seen their business expand over the last five years in a marketplace that has been very competitive to date. One particular larger competitor is gaining some market share back which may threaten Kleen Communication & Media Ltd sales. Also, the increased use of smartphones for social medial marketing using mobile apps, is gaining more popularity with small business. You are employed as the Information Security Manager.
Task:
Kleen Communication & Media Ltd has just designed a revolutionary method to quickly increase the impact of social media marketing using both a mobile app and a desktop program which assist clients manage their own accounts. The company has not yet released the product nor made any public statements, but social media market, their clients and the larger competitors are all keen to find out the details of Kleen Communication & Media Ltd’ product development.
The Board of Directors of Kleen Communication & Media Ltd are concerned about protecting the details of the product and their Intellectual Property. If a third party were to gain access to Kleen Communication & Media Ltd’ product development it would be financially detrimental to the company and possible impact their market share. The new product will be released in 3 months.
The Board has assigned to you, as the Information Security Manager, the task of researching and reporting on the protection of the product development information now and in the future. In order to be able to able to explain the issues to the Board you must identify all information that is associated with the new product, its marketing, and the company clients. To explain the vulnerabilities and appropriate protection mechanisms, you must use (or develop) a suitable information classification scheme. Using this classification, you can then report on the vulnerabilities and countermeasures that should be in place, and develop an information security plan prior to the release of the new product. This is NOT a straight report of the security issues, it must be structured to explain the issues and solutions using the information classification schema you have chosen.
Report Requirements:
Must Contain
Cover/Title Page
This must contain the unit code and title, assignment title, your name and student number, and due date.
Table of Contents
This must accurately reflect the content of your report and must be generated automatically in Microsoft Word with page numbers.
Executive Summary
The executive summary should represent a snapshot of the entire report that the CEO will browse through and should contain the most vital information requested.
Introduction
Introduce the report, define its scope and state any assumptions. Use in-text references where appropriate.
Main report content
The report must address the task as defined above.
The report must contain your definition of the problem, your research, present a suitable information classification scheme, and how this is applied to the context.
You will require in-text references to support your argument and information presented. References should predominantly come from books, journal articles, and conference papers as these have been peer reviewed prior to publication.
References
A list of end-text references formatted according to the ECU requirements using the APA format. It is recommended that Endnote is used to manage references. Your references should ideally comprise of books, journal articles and conference papers.
Format
This report should be no more than 3,000 words (excluding references and diagrams) and labelled as <CSI2102_your studentid_your studentlastname_studentfirstname>.docx and should be in a single file. Your assignments must be word-processed and the diagrams be developed using graphics software (most word-processors provide this facility). The text must be no smaller than 12pt and font Times New Roman

Click here and consider this done.