Computer Systems Security Assignment Task

Computer Systems Security Assignment Task

To make this assignment more relevant and interesting for you, you will select your own real- world organization (and thus case study) and then apply the concepts and techniques you have learned from this module to that case study. The case study you select must not have been used by you, or any other student, in any other module current or historic. Please ensure you check your selected organization and the scope of the case study with your tutor before starting.

Your selected organization for this case study intends to upgrade their current IT infrastructure to meet the organizational IT needs in the 21st century. You have an option of using a technology of your choice or technologies such as Internet of Things, Cloud Computing, Content Centric Networking, or Software Defined Networks for this upgrade. You as an IT Lead have been asked to write a report for the management justifying viability of the proposed future IT infrastructure in the context of its security.

Task 1

1a) Discuss briefly the profile of your selected organization, its existing IT infrastructure, and pertinent issues with the current infrastructure to justify the need for an infrastructure upgrade.

1b) Identify and justify the choice of technology (or technologies) you are proposing to use to upgrade the IT Infrastructure of your selected organization. You are expected to briefly compare technologies to justify your choice.

1c) In the context of proposed future IT infrastructure for your organization, discuss critical assets (including information assets) that will need protection, and list vulnerabilities related to each of the identified assets.

Note: The answer to the above task must demonstrate a conceptual understanding of common security risks and recognise the importance of risk analysis within different IT environments and critically evaluate relevant literature regarding notable security issues.

(800 words) (20 marks)

Task 2

2a) Risk analysis lies at the heart of any successful IT project. Through arguments backed by literature, justify the importance of risk analysis phase in any IT project. Also discuss what risk analysis process in relation to IT infrastructure projects entails.

2b) Critically evaluate a range of pertinent security risks posed to the selected organization in context of their proposed IT infrastructure upgraded through the technology of your choice. Also, briefly discuss the proposed protection against those risks.

2c) Conduct a detailed risk analysis of your organization based on the risks evaluated in Task 2b.

Note: The answer to the above task must demonstrate a conceptual understanding of common security risks and recognise the importance of risk analysis within different IT environments, critically evaluate relevant literature regarding notable security issues and create a risk analysis for a given scenario with reference to compliance with security policies

(1400 words) (35 marks)

Task 3

3a) Critically evaluate key aspects of the security policy of your selected organization (or an organization of a similar profile and size) also discussing how effective the policy is in protecting against security risks evaluated in Task 2b.

3b) Cryptography acts as a key measure in tackling a range of security threats. Discuss a cryptographic approach (or a combination of approaches) you are proposing for your organization to adopt and justify your choice by briefly comparing your approach against other available approaches. Explain in what areas of your organization’s future IT infrastructure you will use the proposed cryptographic approach.

Note: The answer to the above task must demonstrate a systematic understanding of the key approaches to cryptography & their application and create a risk analysis for a given scenario with reference to compliance with security

(1000 words) (25 marks)

Task 4

4a) Provide a brief assessment of the security of your proposed IT infrastructure using layered security approach.

4b) Critically evaluate legal, social and ethical issues in relation to the security of proposed IT infrastructure.

Note: The answer to the above task must critically evaluate legal, social and ethical issues of secure systems.

(800 words) (20 marks)

Total word count = 4000

Some referencing must come from the below text book:

Whitman, M. and Mattord, H. 2016. Management of Information Security. 5th ed. Delmar Thomson Learning 

Referencing Guidance

You MUST underpin your analysis and evaluation of the key issues with appropriate and wide ranging academic research and ensure this is referenced using the Harvard system(s).

The Harvard System (Author-Date Method)

All statements, opinions, conclusions etc. taken from another author’s work (print, online or multimedia) should be cited, whether the work is directly quoted, paraphrased, or summarised. Paraphrasing is integrating another person’s ideas into your work by rewriting an argument using your own words, phrasing, and interpretation. Guidance on appropriate use of paraphrasing, summarising and quotation in academic writing is available in your Student Handbook. Referencing is a two-part process:

  • In-Text Citations
  • Reference List

In the Harvard System, all cited publications are referred to in the main body of text by giving the author’s surname and the year of publication separated by a comma e.g. (Waring, 2014). Each cited publication must have a corresponding full reference in the Reference List at the end of your work. The references are listed in alphabetical order by surname.

Authors/Originators

When citing the author, use the name(s) of the person or organisation shown most prominently in the source as being responsible for the published content.

If no author is given and there is clearly no identifiable person or organisation, use ‘Anon.’, except for webpages, newspapers, film, dictionaries, or encyclopaedias. See section 2.1.1. point vii for guidance on how to cite these examples. For all examples use the same author notation in the reference list at the end.

Dates

If an exact year or date is not known, an approximate date preceded by ‘ca.’ may be supplied e.g. (ca. 1750). If no such approximation is possible, use N.D. (no date). For webpages, it may be preferable to cite the year in which the page was accessed, e.g., (ca. 2009), rather than use N.D..

Where a book, chapter or article has been re-published as part of a different work e.g., an anthology, cite and reference the original date of publication, if given.

Person-to-person communication (letters, emails, interviews, lectures, etc.)

We recommend that references to person-to-person communications such as letters and emails are given only within the main body of the text and are not detailed in the reference list.

In-Text Citations

This applies to print and online materials.

Where to place the citation

Place your citation where you feel it should naturally occur within a sentence. Depending on your writing style, it may follow a phrase/idea or appear at the end of a sentence or paragraph. It should always appear before the full stop.

• e.g., As Waring (2014, p. 33) said, “theory and practice should not be seen as separate entities” and so… This is an example of a ‘narrative citation’ where the author(s) name naturally occurs within the sentence. In this case, you only need to put the date in brackets, and the page number if necessary.

• e.g., In his highly acclaimed study, Waring (2014) argued that theory and practice should not be seen as separate entities…

• e.g., Theory arises out of practice and the two are therefore inextricably linked (Waring, 2014). This is an example of a ‘parenthetical citation’ where the author(s) name does not naturally occur in the sentence and is therefore placed within the parenthesis along with the date, and page number if necessary.

Quotations

If the quote is less than a line it may be included in the body of the text in double quotation marks. Longer quotations should be indented, single-spaced, and appear in double quotation marks.

Pagination

In citations to particular parts of a document, the location of that part (e.g., Waring, 2014, p. 6) should always be given after the year within the brackets.

If your ebook does not have the printed page numbers, when referencing books in your work you will need to refer to a chapter/section/paragraph number to correctly identify the passage of text you are using.

• e.g., Leatherbarrow and Fletcher (2018) state that “HRM as a concept was attractive to many organisations because of its unitary perspective” (chapter 3, para. 2).

For webpages and online newspapers, this detail is not required.

Figures (e.g., diagrams, graphs, tables, illustrations, photographs, etc.)

These should be referenced as though they were quotations taken from a published work. Page numbers come after the year, within the brackets. Diagrams etc. are usually accompanied by a brief description and are listed throughout a piece of work by figure number.

• e.g., Figure 1. Johannes Vermeer’s The Girl with the Pearl Earring (Chevalier & Hale, 2011, p. 55).

If the item has been copied and amended by you, e.g., you add another axis to a graph, then use ‘amended from’ in parentheses after the source.

• e.g., Figure 1. Johannes Vermeer’s The Girl with the Pearl Earring (amended from Chevalier and Hale, 2011, p. 55).

When referring to diagrams, graphs, tables, illustrations, photographs, etc. in the text, you should use Figure number (and source if relevant).

• e.g., In Figure 2. Mitchell (2015) demonstrates…

You should include a full reference to sources in the list at the end of your work. Your own original work should not appear in the reference list at the end, as it has not been published.

Text or script from videos, films, or broadcasts

These should be referenced as though it were a quotation taken from a published work, but without page numbering.

• e.g., As typified by James Dean portraying the moral decay of American youth (Rebel without a Cause, 1955).

Online sources

When citing a webpage on an organisation or company website, use the organisation or company as the author. Do not insert the URL (web address) in the body of your text.

• e.g., Price Waterhouse suggest “A quotation from the relevant webpage would be inserted here.” (Price Waterhouse, 2011).

2.1.1. Examples of In-Text Citation

  1. If the author’s name occurs naturally in the sentence, the year is given in brackets:

• e.g., In his highly acclaimed study Waring (2014) argued that theory and practice should not be seen as separate entities…

• e.g., As Waring (2014, p. 33) said, “theory and practice should not be seen as separate entities” and so…

  1. If the name does not occur naturally in the sentence:

Both name and year are given in brackets:

• e.g., A more recent study (Waring, 2014) has shown the way theory and practical work interact.

• Theory arises out of practice and the two are inextricably linked. (Waring, 2014).

  1. When an author has published more than one cited document in the same year:

These are distinguished by adding lower case letters (a, b, c, etc.) after the year and within the brackets:

• e.g., Fordham (2011a) discussed the subject…

Note: If you are adding citations from the same author and year, the letters after the date will determine the order in your reference list e.g., ‘Fordham (2011a)’ would be listed before ‘Fordham (2011b)’.

  1. When more than one source is cited:

The sequence of citations may be either chronological or in order of academic relevance.

• e.g. (Harris 2011; Hale 2012; Malcolm 2014)

  • If there are two authors:

The surnames of both should be given.

• e.g., Doole and Lowe (2012) proposed that…

  • If there are three to five authors:

The surnames of all authors should be given, and then you can use the main author’s surname followed by et al for the second and all subsequent citations.

  • If there are more than six authors:

The surname of the first author only should be given, followed by et al.:

• e.g., As global economies grow and the cost of doing business increases (D’Arienzo et al., 2016).

A full list of all author’s names should appear in the reference list at the end of your work.

  • If no author is given and there is clearly no identifiable person/body responsible:

For all examples use the same author notation in the reference list at the end. For webpages use the organisation or company author:

• e.g., In the IPCC (2016) report on Climate Change and Oceans and the Cryosphere…

For newspaper articles use the newspaper title:

• e.g., Social media is driving the rise of hate crime (The Telegraph, 2016).

For a film, use the title of the film:

• e.g., As typified by James Dean portraying the moral decay of American youth (Rebel without a Cause, 1955).

For a dictionary or encyclopaedia, if it is the co-operative work of many individuals, none of whom are the main editor, the title of the work may be used instead.

• e.g., According to the Oxford Encyclopaedia “A quotation from the text would be inserted here.” (Oxford, 2007, p. 375).

For other sources, use ‘Anon.’:

• e.g., In an earlier text (Anon., 1908) it was stated that…

  1. If you refer to a source directly quoted in another source you cite both in the text:

• e.g., In a popular study Whear (2014 cited by Stamper, 2016) argued that education must be participative and collaborative…

• e.g., As Whear (2014, cited by Stamper 2016, p. 90) said, “education must be participative, collaborative and non-judgmental” and so we…

You should only list the work you have read, i.e., Springer, in the reference list at the end.

  • If you refer to a contributor in a source just cite the contributor, not the editor:

• e.g., Crinklaw showed this to be key to her own social networking success (Crinklaw, 2011).

  • If you refer to a person who has not produced or contributed to a work, but who is quoted in someone else’s work, it is recommended that you mention the person’s name and you must cite the source author:

• e.g., Michael Heseltine emphasized the part the media plays in influencing political opinion in an interview with Eaton (2016).

• e.g., “It rings well with some of our xenophobic newspapers”, Michael Heseltine said in a recent article (Eaton, 2016, p4).

You should list the work that has been published, i.e., Eaton (in the New Statesman) in your reference list.

  • Scriptural Citations (e.g., Bible, Koran/Qur’an):

These should only be included in the text and not the reference list. Include book, chapter, and verse. If quoting you may add the translation or edition.

• e.g., “He gives strength to the weary and increases the power of the weak.” (Isiah 40:29, New International Version).

  • Legislation – UK Statutes (Acts of Parliament) should be cited in full:

• e.g., The Equality Act 2010 legislates that it is unlawful to discriminate on the grounds of…

Person-to-person communications (letters, emails, interviews, lectures, etc.):

These do not provide recoverable data and so are not included in the reference list. Cite personal communications in the text only. Give initials as well as the surname and status and/or occupation of the person. Provide as exact a date as possible. When citing research data which you have collected, it is advisable to also include copies or summaries of source data in Appendices.

• e.g., According to Professor L. Brockliss, Beatty’s accounts of naval medicine led to significant advances (personal communication, 15 September 2008, see Appendix 1).

Lectures, whether downloaded from Arden University or not, are not regarded as ‘published’ materials and are intended as pointers toward such sources rather than as source materials in themselves.

Order Now

Get expert help for Computer Systems Security Assignment Task and many more. 24X7 help, plag free solution. Order online now!

Universal Assignment (December 22, 2024) Computer Systems Security Assignment Task. Retrieved from https://universalassignment.com/computer-systems-security-assignment-task/.
"Computer Systems Security Assignment Task." Universal Assignment - December 22, 2024, https://universalassignment.com/computer-systems-security-assignment-task/
Universal Assignment July 22, 2022 Computer Systems Security Assignment Task., viewed December 22, 2024,<https://universalassignment.com/computer-systems-security-assignment-task/>
Universal Assignment - Computer Systems Security Assignment Task. [Internet]. [Accessed December 22, 2024]. Available from: https://universalassignment.com/computer-systems-security-assignment-task/
"Computer Systems Security Assignment Task." Universal Assignment - Accessed December 22, 2024. https://universalassignment.com/computer-systems-security-assignment-task/
"Computer Systems Security Assignment Task." Universal Assignment [Online]. Available: https://universalassignment.com/computer-systems-security-assignment-task/. [Accessed: December 22, 2024]

Please note along with our service, we will provide you with the following deliverables:

Please do not hesitate to put forward any queries regarding the service provision.

We look forward to having you on board with us.

Most Frequent Questions & Answers

Universal Assignment Services is the best place to get help in your all kind of assignment help. We have 172+ experts available, who can help you to get HD+ grades. We also provide Free Plag report, Free Revisions,Best Price in the industry guaranteed.

We provide all kinds of assignmednt help, Report writing, Essay Writing, Dissertations, Thesis writing, Research Proposal, Research Report, Home work help, Question Answers help, Case studies, mathematical and Statistical tasks, Website development, Android application, Resume/CV writing, SOP(Statement of Purpose) Writing, Blog/Article, Poster making and so on.

We are available round the clock, 24X7, 365 days. You can appach us to our Whatsapp number +1 (613)778 8542 or email to info@universalassignment.com . We provide Free revision policy, if you need and revisions to be done on the task, we will do the same for you as soon as possible.

We provide services mainly to all major institutes and Universities in Australia, Canada, China, Malaysia, India, South Africa, New Zealand, Singapore, the United Arab Emirates, the United Kingdom, and the United States.

We provide lucrative discounts from 28% to 70% as per the wordcount, Technicality, Deadline and the number of your previous assignments done with us.

After your assignment request our team will check and update you the best suitable service for you alongwith the charges for the task. After confirmation and payment team will start the work and provide the task as per the deadline.

Yes, we will provide Plagirism free task and a free turnitin report along with the task without any extra cost.

No, if the main requirement is same, you don’t have to pay any additional amount. But it there is a additional requirement, then you have to pay the balance amount in order to get the revised solution.

The Fees are as minimum as $10 per page(1 page=250 words) and in case of a big task, we provide huge discounts.

We accept all the major Credit and Debit Cards for the payment. We do accept Paypal also.

Popular Assignments

RES800 Assessment 1 – Research Question and Literature Review

Subject Title Business Research Subject Code RES800 Assessment Title Assessment 1 – Research Question and Literature Review Learning Outcome/s     Utilise critical thinking to analyse managerial problems and formulate relevant research questions and a research design   Apply research theories and methodologies to assist in developing a business research

Read More »

Assessment Task 2 Health advocacy and communication plan

Assessment Task 2 Health advocacy and communication plan Rationale and multimedia plan presentation Submission requirements Due date and time:         Rationale: 8pm AEST Monday 23 September 2024 (Week 11) Multimedia plan presentation: 8pm AEST Monday 30 September 2024 (Study Period) % of final grade:         50% of overall grade Word limit: Time

Read More »

MLI500 Leadership and innovation Assessment 1

Subject Title Leadership and innovation Subject Code MLI500 Assessment Assessment 1: Leadership development plan Individual/Group Individual Length 1500 words Learning Outcomes LO1 Examine the role of leaders in fostering creativity and innovation LO5 Reflect on and take responsibility for their own learning and leadership development processes Submission   Weighting 30%

Read More »

FPC006 Taxation for Financial Planning

Assignment 2 Instructions Assignment marks: 95 | Referencing and presentation: 5 Total marks: 100 Total word limit: 3,000 words Weighting: 40% Download and use the Assignment 2 Answer Template provided in KapLearn to complete your assignment. Your assignment should be loaded into KapLearn by 11.30 pm AEST/AEDT on the wdue

Read More »

TCHR5001 Assessment Brief 1

TCHR5001 Assessment Brief 1 Assessment Details Item Assessment 1: Pitch your pedagogy Type Digital Presentation (Recorded) Due Monday, 16th September 2024, 11:59 pm AEST (start of Week 4) Group type Individual Length 10 minutes (equivalent to 1500 words) Weight 50% Gen AI use Permitted, restrictions apply Aligned ULOS ULO1, ULO2,

Read More »

HSH725 Assessment Task 2

turquoise By changing the Heading 3 above with the following teal, turquoise, orange or pink you can change the colour theme of your CloudFirst CloudDeakin template page. When this page is published the Heading 3 above will be removed, but it will still be here in edit mode if you wish to change the colour theme.

Read More »

Evidence in Health Assessment 2: Evidence Selection

Evidence in Health Assessment 2: Evidence Selection Student name:                                                                    Student ID: Section 1: PICO and search strategy Evidence Question: Insert evidence question from chosen scenario here including all key PICO terms.       PICO Search Terms                                                                                                                                                                                                          Complete the following table.   Subject headings Keywords Synonyms Population  

Read More »

Assessment 1 – Lesson Plan and annotation

ASSESSMENT TASK INFORMATION: XNB390 Assessment 1 – Lesson Plan and annotation This document provides you with information about the requirements for your assessment. Detailed instructions and resources are included for completing the task. The Criterion Reference Assessment (CRA) Marking Matrix that XNB390 markers will use to grade the assessment task

Read More »

XNB390 Task 1 – Professional Lesson Plan

XNB390 Template for Task 1 – Professional Lesson Plan CONTEXT FOR LESSON: SOCIAL JUSTICE CONSIDERATIONS: Equity Diversity Supportive Environment UNIT TITLE:    TERM WEEK DAY TIME 1   5           YEAR/CLASS STUDENT NUMBERS/CONTEXT LOCATION LESSON DURATION         28 Children (chl): 16 boys; 12

Read More »

A2 Critical Review Assignment

YouthSolutions Summary The summary should summarise the key points of the critical review. It should state the aims/purpose of the program and give an overview of the program or strategy you have chosen. This should be 200 words – included in the word count. Critical analysis and evaluation Your critical

Read More »

PUN364 – Workplace activity Assignment

Assessment 1 – DetailsOverviewFor those of you attending the on-campus workshop, you will prepare a report on the simulated simulated inspection below. For those of you who are not attending, you will be required to carry out your own food business inspection under the supervision of a suitably qualified Environmental

Read More »

FPC006 Taxation for Financial Planning

Assignment 1 Instructions Assignment marks: 95 | Referencing and presentation: 5 Total marks: 100 Total word limit: 3,600 words Weighting: 40% Download and use the Assignment 1 Answer Template provided in KapLearn to complete your assignment. Your assignment should be loaded into KapLearn by 11.30 pm AEST/AEDT on the due

Read More »

Mental health Nursing assignment

Due Aug 31 This is based on a Mental health Nursing assignment Used Microsoft word The family genogram is a useful tool for the assessment of individuals, couples, and families.  It can yield significant data and lead to important, new patient understandings and insights as multigenerational patterns take shape and

Read More »

Assessment 2: Research and Policy Review

Length: 2000 words +/- 10% (excluding references)For this assessment, you must choose eight sources (academic readings and policy documents) as the basis of your Research and Policy Review. You must choose your set of sources from the ‘REFERENCES MENU’ on the moodle site, noting the minimum number of sources required

Read More »

HSN702 – Lifespan Nutrition

Assessment Task: 2 Assignment title: Population Nutrition Report and Reflection Assignment task type: Written report, reflection, and short oral presentation Task details The primary focus of this assignment is on population nutrition. Nutritionists play an important role in promoting population health through optimal nutritional intake. You will be asked to

Read More »

Written Assessment 1: Case Study

Billy a 32-year-old male was admitted to the intensive care unit (ICU) with a suspected overdose of tricyclic antidepressants. He is obese (weight 160kg, height 172cm) and has a history of depression and chronic back pain for which he takes oxycodone. On admission to the emergency department, Paramedics were maintaining

Read More »

Assessment Task 8 – Plan and prepare to assess competence

Assessment Task 8 – Plan and prepare to assess competence Assessment Task 8 consists of the following sections: Section 1:      Short answer questions Section 2:      Analyse an assessment tool Section 3:      Determine reasonable adjustment and customisation of assessment process Section 4:      Develop an assessment plan Student Instructions To complete this

Read More »

Nutrition Reviews Assignment 2 – Part A and Part B

This assignment provides you with the opportunity to determine an important research question that is crucial to address based on your reading of one of the two systematic reviews below (Part A). You will then develop a research proposal outlining the study design and methodology needed to answer that question

Read More »

NUR332 – TASK 3 – WRITTEN ASSIGNMENT

NUR332 – TASK 3 – WRITTEN ASSIGNMENT for S2 2024. DESCRIPTION (For this Task 3, the word ‘Indigenous Australians’, refers to the Aboriginal and Torres Strait Islander Peoples of Australia) NUR332 Task 3 – Written Assignment – Due – WEEK 12 – via CANVAS on Wednesday, Midday (1200hrs) 16/10/2024. The

Read More »

NUR100 Task 3 – Case study

NUR100 Task 3 – Case study To identify a key child health issue and discuss this issue in the Australian context. You will demonstrate understanding of contemporary families in Australia. You will discuss the role of the family and reflect on how the family can influence the overall health outcomes

Read More »

NUR 100 Task 2 Health Promotion Poster

NUR 100 Task 2 Health Promotion Poster The weighting for this assessment is 40%. Task instructions You are not permitted to use generative AI tools in this task. Use of AI in this task constitutes student misconduct and is considered contract cheating. This assessment requires you to develop scholarship and

Read More »

BMS 291 Pathophysiology and Pharmacology CASE STUDY

BMS 291 Pathophysiology and Pharmacology CASE STUDY Assessment No: 1 Weighting: 40% Due date Part A: midnight Friday 2nd August 2024 Due date Part B: midnight Sunday 29th September 2024 General information In this assessment, you will develop your skills for analysing, integrating and presenting information for effective evidence-based communication.

Read More »

Assessment Task: Health service delivery

Assessment Task Health service delivery is inherently unpredictable. This unpredictability can arise from, for example, the assortment of patient presentations, environmental factors, changing technologies, shifts in health policy and changes in division leadership. It can also arise from changes in policy within an organisation and/or associated health services that impact

Read More »

LNDN08002 Business Cultures Resit Assessment

LNDN08002 Business Cultures Resit Assessment Briefing 2023–2024 (Resit for Term 1) Contents Before starting this resit, please: 1 Assessment Element 1: Individual Report 1 Case Report Marking Criteria. 3 Assessment Element 2: Continuing Personal Development (CPD) 4 Guidance for Assessment 2: Reflection and Reflective Practice. 5 Student Marking Criteria –

Read More »

Assessment Task 2 – NAPLAN Exercise

Assessment Task 2 (35%) – Evaluation and discussion of test items Assessment Task 2 (35%) – Evaluation and discussion of test items AITSL Standards: This assessmeAITSL Standards: This assessment provides the opportunity to develop evidence that demonstrates these Standards: 1.2        Understand how students learn 1.5        Differentiate teaching to meet with

Read More »

EBY014 Degree Tutor Group 2 Assignment

  Assignment Brief Module Degree Tutor Group 2 Module Code EBY014 Programme BA (Hons) Business and Management with   Foundation Year Academic Year 2024/2025 Issue Date 6th May 2024 Semester Component Magnitude Weighting Deadline Learning outcomes assessed 2 1 2000 words Capstone Assessment 100% 26th July, 2024 1/2/3/4 Module Curriculum

Read More »

NTW 600 Computer Network and Security

Assessment 2 Information and Rubric Subject Code  NTW 600 Subject Name Computer Network and Security Assessment Number and Title Assessment 2: Cyber Security Threats to IT Infrastructure of a real-world Organisation Assessment Type Group Assessment Length / Duration  1500 words Weighting %  30% Project Report: 20% Presentation :10% (Recorded) Total

Read More »

Can't Find Your Assignment?

Open chat
1
Free Assistance
Universal Assignment
Hello 👋
How can we help you?