- Information
- AI Chat
Was this document helpful?
Activity 2 Week 4 RMIT’s Policy Research
Course: cyber security (INTE2557)
27 Documents
Students shared 27 documents in this course
University: Royal Melbourne Institute of Technology
Was this document helpful?
Activity 2 Week 4 RMIT’s Policy
Research:
Aleeya Ahmad
Q1 State 4 entities that are covered by the ‘Scope’ of RMIT’s Security Policy?
RMIT students, researchers, staff, controlled entities of RMIT, contractors, visitors
Source - Section No 3
Q2. Information generated by RMIT users relating to the University business or operations is
owned by whom RMIT? This is found under section number 4, point (7).
Q3. Who’s(m) responsibility is it to keep data secure and apply data classification labels
where available on RMIT systems? All RMIT information technology users are
responsible for keeping data safe and using data classification labels if available on
RMIT systems. Section 4, point (9e).
Q4. Whose responsibility is it to undertake risk-assessments of the technology control
environment and advise on information security risks and controls
The Chief Information Security Officer (CISO) has this responsibility Section 4, point
(12c).
Q5. CLOUD services should have the same level of security controls as RMIT’s?
Section 4
Q6. All RMIT information technology designers, implementors, and operators have
responsibility for the implementing logical, physical, and environmental controls to secure
information processing facilities and data. Source - section 4, point (10b).
Q7. RMIT’s policy will be reviewed at least once every three years in accordance with the
Policy Governance Framework. Source - section 4, point (18).
Q8. Which one of the following policies relates to standard AU-040
a. Acceptable Use Standard - Information Technology Procedures and Resources
b. Information Security, Identity and Access Management Standard
c. User Device Security Standard - section 5, point (19a).