Security of information in government organisations

Assignment Help Computer Network Security
Reference no: EM13312536

Complete a research essay about information security. The research provides you with the opportunity to complete research and demonstrate knowledge of information security from a theoretical perspective. You will be required to complete and submit an essay on one of the topics listed below:

Security of information in government organisations.

2. The length of the essay should be 2,500 words

3. The research essay must contain the following:
• Table of contents that covers all aspects of the assignment topics (see below).

• Definitions and descriptions of the terms, ‘integrity', ‘availability' ‘confidentiality', ‘authenticity' and ‘non-repudiation' in relation to the security protection of information assets in the chosen topic environment, i.e. what is it about these assets that must be protected?

• Definitions of human (people), technical (for example intangible magnetic data held on a computer) and physical (tangible objects such as the computer hardware and a printed document) information assets at potential risk in the chosen topic environment.

• Threats inherent in the chosen topic area: for example, malware and Trojan horses, hackers, insider risks (social engineering) and threats, physical weaknesses - refer to the weekly lecture topic notes and recommended readings).

• Implications of the threats that put organisations at risk.

• Suggested counter-measures (including technical, physical AND personnel counter- measures).

• References that are cited thoroughly in the essay - use EndNote, if you wish. This is available from the Library, free of charge. APA 5th should be used.

4. The marking guide shown above and often disregarded by a percentage of students is yet it is not a bad template on which to base your essay. It shows the marking structure of the essay and defines what you should comply with to maximise your grade. Please include the marking sheet at the beginning of your essay along with the coversheet. This speeds up the marking process and ensures you get your paper graded promptly.

5. You will also be assessed on the presentation of your essay, as well as the contents. Marks will not be awarded where correct referencing is not used and will also not be awarded where the above instructions are not followed. All assertions by other authors must be correctly referenced. Please restrict your own comments to observations about the work of authors you are quoting. Your own world view and statements of unsubstantiated facts (that are not referenced) do not earn marks. 

Verified Expert

Reference no: EM13312536

Questions Cloud

What to do course virtual groups to meet challenges : The lecture addresses challenges faced by virtual teams.What can you do in your course virtual groups to meet and overcome these challenges?
Prepare and explain a sfas matrix : Prepare and explain a SFAS matrix and a TOWS matrix for Samsung.
What will be the resulting height of the band above earth : assume that the earth is a smooth sphere and a steel band wrapped around the equator. if 10ft of steel is spliced into the band, what will be the resulting height of the band above the earth surface
Compute the reaction of ammonia with fluorine : Calculate ?G° for the reaction of ammonia with fluorine. 2NH3(g) + 5F2(g) ? N2F4(g) + 6HF(g) Substance: NH3(g) F2(g) N2F4(g) HF(g) ?G° f (kJ/mol): -16.4 0 79.9 -275.4 179.1 kJ -179.1 kJ 1539.7 kJ -1539.7 kJ None of these choices is correct.
Security of information in government organisations : Complete a research essay about information security. The research provides you with the opportunity to complete research and demonstrate knowledge of information security from a theoretical perspective
Calculate the moment of f about the y axis : A 100 lb force vector F is aligned from A to B. Point A is located at the coordinates (2, 2, 2) and point B at (4,5,6). Calculate the moment of F about the y axis.
Explain which bronsted-lowry acid is not considered : Which bronsted-lowry acid is not considered to be a strong acid in water. A)H I B)H Br C)H2S O3 D)H NO3
How does the it environment in your organization contribute : How does the IT environment in your organization contribute to the complexity of managing IT professionals? Explain.
Explain a strong acid in water : Which bronsted-lowry acid is not considered to be a strong acid in water. A)H I B)H Br C)H2S O3 D)H NO3

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain security strategy for a corporate wan

Prescribe a security strategy for a corporate WAN. Be sure to include methods to combat both technical and nontechnical attacks. C

  It project management tasks

Project life cycle consists of different phases. Recognize the main IT project management tasks associated with the concept, development and closeout phases of the project life cycle.

  Describing use of kerberos for mutual authentication

Answer the following in relation to a scenario where Bob and Alice use Kerberos for mutual authentication. When Bob receives a ticket from Alice, how does he know it is genuine?

  How many other messages expected to generate same hash value

A 1,048,576-bit message is used to generate 10-bit hash. One average, how many other messages could be expected to generate same hash value?

  Concept of subletting in v6

small package routing is more efficient in IPV6 than in IPV4, increase the hacking factor, network security model (NSM), ACL, VLAN, war dialing

  Explain how it is forwarded to its destination

Explain how it is forwarded to its destination and a packet arrived at router R2-m0 with destination address 170.14.24.12. Explain how it is forwarded to its destination.

  How many bits is the encrypted message

How many bits is the encrypted message - find the corresponding code for the first letter of your first name, add 1 to the left position of the most significant bit

  What is the ciphertext generated by encryption of character

What is the ciphertext (in binary form) generated by the encryption of character D? How is plaintext for this encrypted D recovered?

  Anti-virus applications

Should an organization's anti-virus policy specify that anti-virus applications will be configured to quarantine infected files instead of deleting them automatically? Why or why not?

  Subnet masking and designing small networks

Users on wireless or the open nodes adjacent to the concierges desk should not be able to access the hotels corporate networks and corporate network should only be able to talk to the machine room using protocols DNS, DHCP, HTTP, HTTPS and SSH.

  Type of security problems computer services encounter

Students would enter the room, pick up their jobs, and leave. What kinds of security problems might computer services encounter with a system such as this?

  Future of internet anonymity services

Discuss what you believe to be the most important lesson you have learnt as a result of these discussions. Explain the impact of this and its application/impact in real life.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd