Security of information in business organisations

Assignment Help Computer Network Security
Reference no: EM13312132

Assignment 1 - Research Essay

1. Assignment 1 requires you to complete a research essay about information security.  The research provides you with the opportunity to complete research and demonstrate knowledge of information security from a theoretical perspective. You will be required to complete and submit an essay on below of the topics listed below:

Topic: Security of information in commercial or business organisations.

2. The length of the essay should be 2,500 words

3. The research essay must contain the following:

  • Table of contents that covers all aspects of the assignment topics (see below).
  • Definitions and descriptions of the terms, 'integrity', 'availability' 'confidentiality', 'authenticity' and 'non-repudiation' in relation to the security protection of information assets in the chosen topic environment, i.e. what is it about these assets that must be protected?
  • Definitions of human (people), technical (for example intangible magnetic data held on a computer) and physical (tangible objects such as the computer hardware and a printed document) information assets at potential risk in the chosen topic environment.
  • Threats inherent in the chosen topic area: for example, malware and Trojan horses, hackers, insider risks (social engineering) and threats, physical weaknesses - refer to the weekly lecture topic notes and recommended readings).
  • Implications of the threats that put organisations at risk.
  • Suggested counter-measures (including technical, physical AND personnel counter- measures).
  • References that are cited thoroughly in the essay - use EndNote, if you wish. This is available from the Library, free of charge. APA 5th should be used.

4. The marking guide shown above and often disregarded by a percentage of students is yet it is not a bad template on which to base your essay.  It shows the marking structure of the essay and defines what you should comply with to maximise your grade. Please include the marking sheet at the beginning of your essay along with the coversheet. This speeds up the marking process and ensures you get your paper graded promptly.

5. You will also be assessed on the presentation of your essay, as well as the contents.  Marks will not be awarded where correct referencing is not used and will also not be awarded where the above instructions are not followed.  All assertions by other authors must be correctly referenced.  Please restrict your own comments to observations about the work of authors you are quoting.  Your own world view and statements of unsubstantiated facts (that are not referenced) do not earn marks.

6. For Assignment 1, the Research Essay must be fully referenced where the assertions of other authors are being used and must first be submitted to Turnitin before it is submitted to LMS as a completed assignment. The Turnitin account that will have been prepared for you by the Unit Coordinator and available through the Unit LMS site.

Verified Expert

Reference no: EM13312132

Questions Cloud

Find the velocity of the wood : A block of wood of mass 4.85 kg rests on a horizontal frictionless surface. find the velocity of the wood after the bullet has passed through
What is the fluid velocity in the pipe in feet per second : Water enters a pipe at 100 psig and 70 degrees F. The density of water under these conditions is 62.3 lbm/ft^3. The pipe has an inside diameter of 4.5 inches. The mass flow rate of the water is measured to be 7500 lbm/hr.
What is level of service before and after the development : A divided multilane highway in a recreational area (fp = 0.90) has four lanes (two lanes in each direction) and is on rolling terrain. The highway has 10-ft lanes with a 6-ft right-side shoulder and a 3-fl left-side shoulder.
What is the acceleration of the two teams : Two teams of nine members each engage in a tug of war. The first team's members have average masses of 65 kg and exert average forces of 1350 N horizontally. What is the acceleration of the two teams
Security of information in business organisations : Definitions and descriptions of the terms, 'integrity', 'availability' 'confidentiality', 'authenticity' and 'non-repudiation' in relation to the security protection of information assets in the chosen topic environment, i.e. what is it about thes..
Estimate the inside diameter and wall thickness of the pipe : Estimate the inside diameter, wall thicknes and outside diameter of the pipe. The carbon steel pipe has tensile yield strength of 250 MPa. Assume safety factore of 2 and a corrosion allowance of 2mm. The maximumoperating pressure (MOP) is 55 bar.
Determine what is the maximum elevation of the reservoir : If a 100 horsepower pump is used to pump water (rho = 1.94 slugs/ft3) from a lake to a raised reservoir what is the maximum elevation of the reservoir above the lake if the pump operates at 30 cubic feet per second
Evaluation of capital budgeting project : Provide a critical evaluation of the relevant techniques and recommend an appropriate techniques to be applied -
Describe a minimum of three heuristics to optimize queries : Your supervisors and customers are very impressed with the database you have put together. Describe a minimum of three heuristics to optimize Queries.

Reviews

Write a Review

Computer Network Security Questions & Answers

  How to protect communications by eavesdropper

Assume that evil Charlie eavesdropped on Bob's message to server. How can he with the help of his equally evil buddy Don, extract key K that Alice and Bob are using to protect their communications?

  Understanding project priorities and scheduling issues

hat general suggestions would you give for helping to promote common understanding of project priorities and critical scheduling issues,

  How many bits is the encrypted message

How many bits is the encrypted message - find the corresponding code for the first letter of your first name, add 1 to the left position of the most significant bit

  How the database and web services can be protected

Study how the database and web services can be protected against unauthorized use while maintaining access for authorized users by using firewall and VPN techniques

  Decisions on any changes that materially affect project

It has been recommended in some quarters that for large projects, decisions on any changes that materially affect assignment milestones

  Explain security model of class using cnss model

suppose that the security model is required for protection of your class. Using CNSS model, examine each of the cells and write a short statement.

  Explaining organization-s security architecture

Consider your organization's security architecture. How much do you know about it? How much do other workers know? How easy is it to learn more?

  Efficient means of electronic payments

Think about security concerns and limited resources, do you think public sector entities should consider utilizing PayPal to facilitate inexpensive and efficient means of electronic payments?

  Find time when station c hears the collision

The size of the frame is long enough to guarantee the detection of collision by both stations. Find: The time when station C hears the collision (t3).

  Apply division method to calculate hash value of character

How can we apply division method to calculate hash value of character string without using more than constant number of words of storage outside string itself?

  Analyze security requirements and prepare a security policy

Analyze security requirements and prepare a security policy.

  Symmetric encryption algorithms

block cipher and a stream cipher, Caesar cipher, cryptanalytic attacks, mono alphabetic cipher and a poly alphabetic cipher, Mix Columns, Add Round key, PGP services, traffic padding, contrast link and end-to-end encryption

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd