Weight: 20% of course grade
Word Limit: ~3000 words (excluding references, tables, and appendices)
Group Size: 3 students per group Submission Mode: Upload as a single PDF document via LMS
Submission: Single PDF document uploaded to FORUM
Deadline: October 30, 2025
Overview
This group assignment requires you to design a comprehensive security program for a chosen sector. The assignment builds on your work in Assignment #1 (threat analysis survey) and progresses through three main components:
- Security Policies for Risk Management
- Risk Management Framework & SETA Program
- Information Security Management System (ISMS)
Your project should produce a professional-level security program that could be presented to senior management for approval.
Assignment Parts:
The assignment offers each group an opportunity to select the type of the organization they need to deal with as follows:
*********************
Step 1: Select a Sector
You will choose one sector from the following five options:
- Healthcare (Hospitals and Clinics and Insurance Companies)
- Particularities: Strict privacy/confidentiality requirements (HIPAA/GDPR equivalents); reliance on IoT/medical devices; insider risks from staff accessing patient records; availability is critical for patient safety in addition to local regulations of UAE.
- Banking and Financial Services
- Particularities: High-value assets attract cybercriminals; compliance with regulations (Basel, PCI-DSS, ISO, GRDP, etc.); phishing and social engineering common; availability of online/mobile banking services is critical in addition to local regulations of UAE.
- Higher Education Institutions
- Particularities: Open access culture; diverse users (faculty, students, researchers, contractors); compliance with regulations (GDRP, CIS, COBIT, ITIL, ISO, etc.), research data protection; BYOD environment; limited IT security budgets compared to financial or government institutions in addition to local regulations of UAE..
- Energy and Utilities (Power Plants, Smart Grids, Oil & Gas)
- Particularities: SCADA/ICS systems with legacy vulnerabilities; nation-state level threats; safety and resilience are paramount; downtime has severe societal and economic consequences. compliance with regulations (NIST, ISO, etc.) in addition to local regulations of UAE.
- E-Commerce and Retail
- Particularities: Handling large amounts of PII and payment data; heavy reliance on cloud platforms and third-party services; DDoS and ransomware threats; brand reputation directly tied to customer trust. compliance with regulations (PCI-DSS, ISO, etc.) in addition to local regulations of UAE.
Your Task:
Your group should state clearly in the introduction which sector is chosen, and explain briefly why (based on risk, importance, or group preference).
Part 1 Security Policies for Risk Management (Approx. 800 words)
Develop security policies based on threats identified in Assignment #1. For each two types of threats (Human + Cyber):
- Human Threat Example:
- Employee deliberately grants unauthorized access OR unintentionally shares sensitive data.
- Cyber Threat Example:
- Hacker breaches the access control database, steals data, or alters permissions.
Deliverables:
Draft two security policies per threat (total 4 policies minimum).
Each policy must have:
- Non-technical measures (awareness, procedures, compliance).
- Technical measures (system configurations, monitoring, access controls).
- Implementation steps for each technical policy (detailed and actionable).
**********************
Part 2 Risk Management Framework & SETA Program
Develop a risk management framework and SETA program for your chosen organization/sector.
Deliverables:
- Risk Management Framework
- Align to ISO 27001/2 and ISO 27005.
- Define: risk appetite, tolerance levels, likelihood/impact (use a scale).
- Quantify residual risk after controls are applied.
- Justify risk treatment options with evidence (research, case studies, references).
- SETA Program Components
- Workshops: Topics relevant to the identified threats.
- Quizzes: At least 57 questions linked to Assignment #1 threats.
- ISO Mapping: Link each training/control activity to specific clauses/controls of ISO 27001/2 and ISO 27005.
- Show how controls mitigate threats (reducing likelihood or impact).
- Cross-reference Frameworks:
- Support analysis with concepts from GDRP,CIS, NIST CSF, COBIT, SANS, etc.
Output should resemble a professional training & risk report to be presented to senior management.
*********************
Part 3 Design of ISMS (Approx. 1200 words)
Combine Parts 1 & 2 into a complete Information Security Management System (ISMS) for the selected sector.
Deliverables:
- Current Security Posture Assessment
- Evaluate existing strengths and weaknesses of the chosen sector.
- Identify compliance requirements (ISO, GRC, industry regulations).
- ISMS Roadmap Proposal
- Tools, techniques, frameworks, and control sets to adopt.
- Integration of GRC (Governance, Risk, Compliance) requirements.
- Short-term vs. long-term priorities (e.g., quick fixes vs. structural changes).
- Holistic View
- Show how the ISMS ties policies, risk management, and training into one program.
- Demonstrate measurable improvements to organizational security posture

Leave a Reply
You must be logged in to post a comment.