Reference no: EM132743780
SEC4102 Security Fundamentals - University of Bolton
Learning Outcome 1: Test the effectiveness of security policies and procedures.
Learning Outcome 2: Discuss knowledge of security concepts, data security, techniques and tools.
1. Portfolio, Mix of Presentations and or Written Documents.
2. Basic security audit of a familiar situation (e.g. home, workplace) paying particular attention to assets, threats, vulnerabilities, risks and responses. Configuration and use of security tools such as OpenVPN and another tool. There is an approximately 1000 word limit for each element.
Assessment Deliverables:
The limits regarding the presentations, consider approximately 6 minute / 20 slides (with notes if applicable) Microsoft PowerPoint style presentation to be presented to your colleagues. The presentation can include links and data with additional speaker notes and a bibliography using the Harvard referencing system.
The portfolio should cover the following: A Case study / Scenario:
You work as a IT Security Specialist for a consultancy. As part of your role, you have been asked you to create a presentation to help train staff members on the tools and techniques associated with identifying and assessing IT security risks together with the organisational policies to protect business critical data and equipment.
Guidance on Questions One and Two:
Create a basic security audit of a familiar situation (e.g. home, workplace) paying particular attention to assets, threats, vulnerabilities, risks and responses. Configuration and use of security tools such as VPN and others.
Identify and explain the different types of security risks to individuals organisations. Address unauthorised use of a system; unauthorised removal or copying of data or code from a system; damage to or destruction of physical system assets and environment; damage to or destruction of data or code inside or outside the system and naturally occurring risks. You may include a survey or quiz given to users.
Describe Organisational Security Procedures. This may include security legislation, technology solutions and the management associated with operating effective IT security procedures. Propose a method to assess and treat IT security risks. A review of different security technologies supported with the tools and software used to develop effective IT security practice in an organisation. You may discuss the importance of Business continuance, backup and restoration of data, audits and testing procedures put into place for security of the system. You may discuss the network security, the impact of security breaches through WAN, intranets and wireless access systems.
Attachment:- Security Fundamentals.rar
|
Compute what amount should a capital account change
: In 2015 the partnership sustained a Php 99,000 loss before interest and salaries to partners. By what amount should A's capital account change?
|
|
Examining the work of gregor mendel
: Explain why you may show many of the same traits that you see in your parents. Include a Punnett square as part of your response.
|
|
How many years can pay for education
: Sally received and invested $57,642, If her investment fund earns 2.95% compounded quarterly, for how many years can she pay for her education?
|
|
Determine the total compensation cost
: Allied Paper Products, Inc., offers a restricted stock award plan to its vice presidents. On January 1, 2021, the company granted 20 million of its $1 par.
|
|
SEC4102 Security Fundamentals Assignment
: SEC4102 Security Fundamentals Assignment Help and Solution, University of Bolton - Assessment Writing Service - Discuss knowledge of security concepts
|
|
Calculate the budgeted indirect cost rate
: Compute the? budgeted? indirect-cost rate and? actual? indirect-cost rate. Calculate the budgeted indirect cost rate and then calculate the rate.
|
|
Differences between the innate and adaptive immunity
: 1. Describe the main characteristics and differences between the innate and adaptive immunity. How does the immune system protect us against pathogens?
|
|
Determine the book value per share of common stock
: At fiscal year end, December 31, 2018, Somerset Corporation had total stockholders' equity of $3,900,000. On FY 2018 year end, Somerset Corporation had Common.
|
|
Calculate the possible fair value for product in Market
: Pharmacia Sdn Bhd sells product A in Market 1. Calculate the possible fair value for product A in Market 1, 2 and 3. Determine the principle market
|