Skip to document

Activity 2 Week 4 RMIT’s Policy Research

work done in class
Course

cyber security (INTE2557)

27 Documents
Students shared 27 documents in this course
Academic year: 2024/2025
Uploaded by:

Comments

Please sign in or register to post comments.

Preview text

Activity 2 Week 4 RMIT’s Policy

Research:

Aleeya Ahmad Q1 State 4 entities that are covered by the ‘Scope’ of RMIT’s Security Policy? RMIT students, researchers, staff, controlled entities of RMIT, contractors, visitors Source - Section No 3 Q2. Information generated by RMIT users relating to the University business or operations is owned by whom RMIT? This is found under section number 4, point (7). Q3. Who’s(m) responsibility is it to keep data secure and apply data classification labels where available on RMIT systems? All RMIT information technology users are responsible for keeping data safe and using data classification labels if available on RMIT systems. Section 4, point (9e). Q4. Whose responsibility is it to undertake risk-assessments of the technology control environment and advise on information security risks and controls The Chief Information Security Officer (CISO) has this responsibility Section 4, point (12c). Q5. CLOUD services should have the same level of security controls as RMIT’s? Section 4 Q6. All RMIT information technology designers, implementors, and operators have responsibility for the implementing logical, physical, and environmental controls to secure information processing facilities and data. Source - section 4, point (10b). Q7. RMIT’s policy will be reviewed at least once every three years in accordance with the Policy Governance Framework. Source - section 4, point (18). Q8. Which one of the following policies relates to standard AU- a. Acceptable Use Standard - Information Technology Procedures and Resources b. Information Security, Identity and Access Management Standard c. User Device Security Standard - section 5, point (19a).

Q9. Which RMIT Policy document relates to using a Non-RMIT Managed Device Ans: the User Device Security Standard. Source - section 5, point (19c). Q10. How does RMIT define an ICT asset: Ans: Any hardware or data used for or related to information technology or communication. Source - section 6 *********** Please submit to Week 4 Research Quiz in CANVAS **************

Was this document helpful?

Activity 2 Week 4 RMIT’s Policy Research

Course: cyber security (INTE2557)

27 Documents
Students shared 27 documents in this course
Was this document helpful?
Activity 2 Week 4 RMIT’s Policy
Research:
Aleeya Ahmad
Q1 State 4 entities that are covered by the ‘Scope’ of RMIT’s Security Policy?
RMIT students, researchers, staff, controlled entities of RMIT, contractors, visitors
Source - Section No 3
Q2. Information generated by RMIT users relating to the University business or operations is
owned by whom RMIT? This is found under section number 4, point (7).
Q3. Who’s(m) responsibility is it to keep data secure and apply data classification labels
where available on RMIT systems? All RMIT information technology users are
responsible for keeping data safe and using data classification labels if available on
RMIT systems. Section 4, point (9e).
Q4. Whose responsibility is it to undertake risk-assessments of the technology control
environment and advise on information security risks and controls
The Chief Information Security Officer (CISO) has this responsibility Section 4, point
(12c).
Q5. CLOUD services should have the same level of security controls as RMIT’s?
Section 4
Q6. All RMIT information technology designers, implementors, and operators have
responsibility for the implementing logical, physical, and environmental controls to secure
information processing facilities and data. Source - section 4, point (10b).
Q7. RMIT’s policy will be reviewed at least once every three years in accordance with the
Policy Governance Framework. Source - section 4, point (18).
Q8. Which one of the following policies relates to standard AU-040
a. Acceptable Use Standard - Information Technology Procedures and Resources
b. Information Security, Identity and Access Management Standard
c. User Device Security Standard - section 5, point (19a).