| Category | Assignment | Subject | Management |
|---|---|---|---|
| University | Auckland University of Technology (AUT) | Module Title | BSYS702 Cyber-Security and Risk Management |
| Assessment Title | Assessment 1 |
|---|---|
| Academic Year | 2026 |
This assessment mirrors the real-world responsibilities of an IT risk analyst or auditor—investigating, analysing, and providing recommendations. While the lecture slides and reading materials (mainly from Weeks 3 and 4) will support your understanding, you may also explore relevant publicly available sources and strengthen your analysis.
North Shore Playgrounds (NSP) manufactures playground equipment for customers worldwide. The company has two sales offices and a factory in Auckland’s North Shore. NSP’s revenues have steadily increased over the last few years, with new customers from India, Indochina, and Indonesia.
NSP uses various materials to make its playground equipment, such as rubber chips for playground floors (converted from old tyres), nylon (for the ropes and swings), and steel bolts. NSP’s business growth has led to difficulties obtaining these materials, so NSP has bought two of its suppliers to improve its control over its supply chain.
NSP’s main competitor, Kumeu Play People (KPP), is also growing and focusing on New Zealand and the Pacific Islands. The key differentiator in the playground industry is playground equipment designs, and
KPP is very aggressive in protecting the copyright of its designs. Many of KPP’s employees have moved to NSP recently because they want to travel overseas to install and service playgrounds for NSP’s international customers.
The company has an accounting system on an IBM AS/400 server. The system was developed in-house and implemented ten years ago. The company uses a Windows Active Directory-based network that connects all employee desktop computers to the AS/400 system. However, the networks of the suppliers it has bought are not integrated with NSP’s leading network. These suppliers also use their own accounting and inventory management systems. NSP’s ERP system is linked to these systems using middleware from an IT vendor based in Auckland’s CBD.
NSP’s IT budget has also grown with the increase in business, and to manage costs, the manager of NSP’s IT department, Ms Rekha Moorthy, has proposed a move to Microsoft’s Office 365, a suite of cloud-based applications that includes storage (OneDrive). However, when Ms. Moorthy announced the plan, she discovered that many employees were already using Dropbox to share files and were unwilling to move to OneDrive. Ms Moorthy is also facing difficulties with NSP’s accounting system, as it does not handle overseas operations (e.g. different currencies and rules for GST) well.
Looking Plagiarism Free Answers For BSYS702 Cyber-Security and Risk Management Assignment 1 Before Deadline?
Order NowYou are part of the IS audit team that Ms Moorthy has hired to review NSP’s information systems. You have been assigned to review and evaluate NSP’s IT general controls. As part of the audit process, you have interviewed various members of NSP’s computer department, beginning with Ms. Moorthy. You have also observed the employees doing their work and reviewed systems documentation and logs. You have compiled a set of ‘audit notes’ based on your interviews, observations and documentation review.
Audit Notes
1.Identify three major risks specific to NSP based on the background and audit notes. For each risk, explain its potential impact on NSP’s business operations, considering factors such as its industry, growth strategy, and IT infrastructure. (20 marks)
2. Using COBIT 2019 processes – APO13, BAI04, BAI06 and DSS05, develop risk mitigation strategies for NSP. (20 marks)
Present your answers in a table format, with one column for risks and another for the relevant control practice. Your answers should be 1,000 words in total (+/- 10%). Use the following table structure.
| Risk and Potential Impact | Practices and Explanation |
| Risk 1:
Potential Impact: |
Practice: APO13.01 Information security management system (ISMS) scope statement
(Provided as an example) Explanation: |
| Risk 2:
Potential Impact: |
Practice:
Explanation: |
Buy Custom Answer Of This BSYS702 Cyber-Security and Risk Management Assignment 1
Get A Free QuoteIf you are finding your BSYS702 Cyber-Security and Risk Management Assignment 1 at The Career Academy NZ difficult, we are here to help. Our trusted Assignment Help in New Zealand is specially designed for NZ students who want high-quality academic support. We provide complete AUT assignment answers and step-by-step solutions written by experienced subject experts. All work is 100% AI-free and plagiarism-free, carefully prepared according to your academy guidelines. Get accurate, well-structured, and timely submissions that help you score better and submit your assessment with full confidence.
Hire Assignment Helper Today!
Let's Book Your Work with Our Expert and Get High-Quality Content