P19135 - Assignment 1 - 2024-25
P19135 - Assignment 1 - 2024-25
P19135 - Assignment 1 - 2024-25
ASSIGNMENT GUIDELINES
ASSESSMENT TYPE:
Critical Review
WHERE TO SUBMIT: via Turnitin by the 2pm deadline on the Module Blackboard page
WHAT TO SUBMIT: a 2000-word critical review of a high professional standard, proofread, and
containing a range of authentic researched references
TITLE(S) OF ASSIGNMENT:
A Critique of Key Legislation, Frameworks, and Standards within Information Security Management
Systems
ASSIGNMENT INSTRUCTIONS
The relationship between legislation, frameworks, and standards is an important one, given their direct
impact on the policies and procedures set out by an organisation to govern their day-to-day operations,
whilst ensuring compliance. This assessment investigates this relationship and looks to establish the
significance of each of these aspects in relation to Information Security Management systems.
Subsequently, in the second assessment, you will be asked to undertake a risk assessment, write a security
policy for an organisation, propose possible planning options for disaster recover and business continuity,
whilst suggesting how and why resilience testing is an important part of this planning process.
But for now, you have been employed as a policy advisor and assigned to a company that wants to ensure
that they are compliant with the necessary UK and key European legislation, frameworks, and standards.
So, in order to demonstrate a profound understanding the information security management
fundamentals, the company have asked you, at this initial stage, to undertake a critique of these three
aspects of governance and compliance by undertaking the following tasks:
• Identify and describe three pieces of legislation (two UK-based and one European),
• Identify and describe three frameworks within which this legislation relates to,
• Identify and describe three standards, which have been defined by international standards bodies,
to use as a basis for organisational policies and procedures
• Consider how these three elements (legislation | frameworks | standards) combine in order to
define key concepts and best practices within Information Security Management systems
Finally, in order to develop proficiency in identifying, assessing, and applying an information security
management system, thus enabling informed decisions on how to safeguard organisational assets, you
have also been asked to provide a critical analysis as to the relevance of the legislation, frameworks, and
standards that you have discussed, within Information Security Management systems. This would include
a discussion on the interdependence between these aspects at a functional level, such as the need to
undertake threats analysis, risk assessments, the creation of organisational policies and procedures, and
the necessity for planning in the event of a significant data breach or network failure.
FORMATTING OF SUBMISSION:
You are expected to produce a single critical review report of a high professional standard and quality. The
target length of the report should be 2000 words. Any screen shots, tables, figures, charts, illustrations,
etc. will not contribute towards the word count. Your work must be adequately referenced throughout,
using Harvard referencing style. Pears & Shields (2016) give a complete guide to Harvard referencing.
Guidelines on using the Harvard Referencing style are available at: Introduction to referencing.
There are two parts to referencing - how to refer to a material in the text of your assignment (citations)
and secondly, how to reference at the end of your assignment (reference list). The reference list includes
only the sources that you cite in your text, a bibliography includes all material that you read in preparation
for your assignment. Please follow the latest edition of the Harvard referencing system (12th Edition).
The report must be submitted using the dedicated Blackboard grade centre submission bucket on or before
the submission deadline stated.
LO2 - To develop proficiency in identifying, assessing, and applying an information security management
system, enabling informed decisions on how to safeguard organisational assets.
PROGRAMMES OF STUDY:
Pg. 4 of 4
30% - Analysis: Demonstrates Makes excellent use Makes very good Makes consistent, Makes satisfactory The submission This submission
Application and outstanding of a range of use of established albeit conventional, but limited use of includes analysis, does not contain
Critical Evaluation command of relevant analytic techniques of use of established established but the analysis is effective analysis
(Parts A and B) relevant analytic techniques and analysis relevant to techniques of techniques of ineffective and/or and does not yet
techniques, and the applies these to new the discipline. analysis, relevant to analysis, relevant to uninformed by key engage with key
ability to apply these and/or abstract Shows ability to the discipline. the discipline. disciplinary disciplinary
to new and/or information and compare with some techniques. techniques.
abstract information situations. Shows insight alternative
and situations. well developed theories and/or
Shows an ability to compare analytic approaches
exceptional critically alternative (where relevant).
appreciation of the theories and/or
limits and/or analytic approaches
appropriate uses of (where relevant).
analytic
approaches.
10% - Conclusions Outstandingly well- Very well-developed Conclusions show Conclusions are Conclusion is Conclusions are Conclusions are not
(Parts A and B) developed conclusions, which very good drawn which are presented and incomplete and/or included, or
conclusions which show clear development and clearly derived from linked to only partially unsubstantiated
originality. They are original insight and evidence and/or evidence/theory substantiated and and/or invalid
show considerable
thoroughly relate clearly and theory and/or and/or literature but understanding of conclusions drawn.
originality. They grounded in theory logically to evidence literature, with the understanding evidence/theory
form an integrated and/or evidence and/or theory some originality. of these contains and/or literature
part of the overall and/or literature and/or literature. inaccuracies or contains significant
argument and/or and use appropriate omissions. inaccuracies or
discussion, forms of omissions.
reflecting conceptualisation,
forming an
commanding grasp
integrated part of
of theory and/or overall argument
evidence and/or and/or discussion.
literature and They contribute to
the work being of
Pg. 5 of 4
appropriate forms of potential
conceptualisation. publishable
They contribute to standard.
the work being of
publishable
standard.
10% - Referencing Outstanding use of Excellent use of Very effective use of Effective use of Sources of Some sources of Little or no
(Parts A and B) sources to support sources to support sources to support sources to support information information acknowledgement
discussion and discussion and discussion and discussion and acknowledged but acknowledged but of sources of
personal findings. personal findings. personal findings. integration between links between text information in text
personal findings.
Referencing follows Referencing follows Referencing follows text and reference and reference list and/or reference
the highest Referencing follows the standards of the the standards of the list is inconsistent. unclear. Referencing list.
standards of the highly effectively the discipline very discipline clearly and Attempts to follow a does not follow a
discipline. standards of the clearly and accurately. systematic systematic
discipline. accurately. approach, approach.
appropriate to the
discipline do not
always succeed.
10% - Clarity of Exceptional writing Accomplished Language fluent, Language is clear Understandable and In this piece of work In this piece of work,
expression (incl. control, appropriate writing style nuanced, and and consistent and clear, but accuracy the meaning is often the meaning is
accuracy, spelling, to assignment, appropriate to the expressive. conveys nuances. of spelling, unclear with unclear throughout.
grammar, which enhances the assignment. grammar, spelling, grammar, spelling punctuation, frequent errors in Errors in spelling,
punctuation, and argument. grammar, grammar, spelling, and numeracy and/or numeracy is grammar and grammar, spelling, grammar,
numeracy) spelling, and and numeracy are mainly accurate. mainly accurate numeracy need to and or numeracy. punctuation and/or
(Parts A and B) numeracy are almost always with some errors. be improved. Errors numeracy make
flawlessly accurate. accurate. which detract from interpretation
the argument. challenging for an
assessor.
Pg. 6 of 4