Explain how the council should protect critical assets

Assignment Help Computer Network Security
Reference no: EM131431462 , Length: word count:2000

Faculty of Science & Technology Written Assessment - Digital Security

Answer all THREE questions below. You should compile a well-constructed, formal written report of no more than 2,000 words that encompasses industry standard fundamental digital security best practices. The report should be written in the third person.

Formatting

Your work should be spiral or comb bound with the following minimum components:

  • Cover Page to include
  • Module title
  • Course code
  • Your Student ID number
  • Date of submission
  • Table of Contents
  • Body of your report (2,000 word guide)
  • Any supporting diagrams and tables
  • A minimum of 8 references (Harvard reference style)
  • An appendix if necessary

Deliverables

  • Standard assessment packaging with cover sheet from e-vision
  • Ensure your Student ID Number is listed on ALL pages
  • Final submissions must be made through the iCentre

Aim to hand in your assignment at least 48 hours before the due date, as the iCentre becomes extremely busy on the last few days.

Question 1: Computer Security Principles

Your role is Security Manager at Ruskin City Council. Your job involves the detection, prevention and reaction to potential and actual security violations.

The Head of Security has asked you produce a report, using the AAA and CIA models, to explain how the council should protect critical assets from unauthorised access. The city council building has open access areas for the general public to use computers for Internet and word processing. 

Your report should make use of examples and recommend best practice.

Question 2: Introduction to Cryptography

Your new role is as Information Security Manager at Fanglia University, where you are responsible for safeguarding and protecting sensitive and personal information.

The IT Director has requested a briefing report that explain the benefits of hashing techniques. Using examples, explain the difference between the MD5 and AES protocols in protecting student academic records.

Include an MD5 hash of a text file as an appendix.

Question 3: Secure Programming Techniques

You have just started a new job as Software Security Specialist at Lord Ruskin Hospital. Your job involves the prevention and mitigation of software security violations.

The Head of Software Development wants to brief your fellow software developers on programming techniques they should use to defend against software vulnerabilities, as well as your rationale for these suggestions.

Using the OWASP top 10 vulnerabilities, produce a report identifying three different attacks that hospital software applications might be vulnerable to. Outline why these three vulnerabilities occurs and suggest mitigation techniques to prevent an attack occurring in the first place.

Reference no: EM131431462

Describe the key issues or challenges from this case study

Describe the key issues/challenges/crisjs from this case study. Based on the information provided in the case study, describe and document the recommended security strategy t

Develop the issp for the organisation

Assessment Task - You are required to analyse the scenario on page 3 and develop the following ISSP for the organisation described in the scenario: Access and use of sensiti

Distinguish between cyberwar and cyberterror

Distinguish between the two types of reconnaissance probes used by computer hackers. Distinguish between cyberwar and cyberterror. Differentiate among the various types of cyb

Draw network diagram of this network including ip addresses

Draw a network diagram of this network including IP addresses - Describe how the attack may have occurred with sufficient information to explain how a hacker could carry out

Discuss some of the problems nats create for ipsec security

Discuss some of the problems NATs create for IPsec security. (See [Phifer 2000]). Can we solve these problems by using IPv6? Why deployment of IPv6 has been slow to date. Wh

Discuss intrusion detection and prevention systems

Analyze firewall technology and tools for configuring firewalls and routers. Discuss intrusion detection and prevention systems and Web-filtering technology. Explain the purpo

Describe the technical characteristics of the dark web

Describe the technical characteristics of the Dark Web ensuring you explain how it works and its underlying technologies - Discuss the impact of the Dark Web on society. In ad

Hacking occurred and the organization had the right plan

Security Computer forensics and hacking go hand in hand. Discuss in (Need 2 Reports with 2 pages each report = 4 Total Pages), two cases where hacking occurred and the organ

Reviews

len1431462

3/18/2017 12:54:50 AM

Please answer all questions and check for plagiarism and attach the plagiarism report together. Please use more then 12 Harvard referencing. As outlined in the course Module Definition Form (MDF), 100% of the final mark for this module will be in the form of a written report which demonstrates knowledge and understanding of each of the digital security core concepts as outlined below. Your write-up should clearly demonstrate progressive learning by addressing the three critical aspects of digital security – computer security principles, introduction to cryptography and secure programming techniques.

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd