Security evaluation Assignment

Security evaluation

Introduction

This is an individual assignment and requires students to conduct a security evaluation of their personal information management situation and report on the results of this evaluation.  The main body of the report is expected to be around 2500 words, but quality is more important than length.  The intention of this review is to give you exposure to some of the issues that organisations might face when conducting similar information security reviews, but clearly with much less formality (both in terms of how the review is conducted and the expectations around the control environment).

As it is not feasible to give you access to a ‘normal’ organisational setting, we will use your personal situation as a simulation for the organisation.  Despite this being similar to an organisational security review, it is important that you treat the situation ‘as is’ – that is you should focus on the risks that are relevant to your situation, not some real or pretend organisation. These risks may not be quite the same to those that organisations experience, but risks do vary significantly between differing organisations, so this will not undermine the integrity of this exercise.

The security evaluation review for this year will focus on some key issues, including access controls, operations security (backup and recovery, protection from malware, updates) and cybersecurity (concerning resilience and protection from cyber-attacks, malware and hacking).

There may be some overlap between these issues.

There will be opportunities for students to informally discuss issues with this assignment and their review during the classes in the weeks leading up to the submission deadline.  Make sure that you are familiar with what is required of this assignment and take advantage of this opportunity.

Requirements

This assignment is intended to cover the full range of your personal situation with respect to information and its management – this will include any technology, insomuch as it relates to information processing and storage.  This includes:

home computers, laptops and home networks; mobile devices that you may have including smart phones, tablets, smart watches, and fitness devices; other storage media that you use to store relevant information; personal information you store online (in the cloud – data storage and email).

For this exercise, you should exclude:

 other home-related devices such as smart TVs, Google/Apple/Amazon smart home devices, and electronic locks;  information about you that is stored by others (for example, the information the University keeps on students is outside of the scope of this review);

 any work-related activity or home businesses (information security issues with these work related contexts would normally be covered by the workplace and their security evaluation processes).

The first step in the review is to identify all of the relevant information assets, any associated technology resources, and what these resources are used for.  It is important for your report to include a description of these assets and their uses so that the reader has a context within which to situate the investigation and its findings.  The nature of these assets and their use will influence the risk environment, so your overview is important for the reader to the make a judgement about the reliability of the review and its findings.

In conducting such a review is common practice to have a normative model against which the situation is assessed.  You should use ISO 27002:2013 as the primary source for constructing a customised normative model for this review, but this should be supplemented by other sources as appropriate (and these other sources should be identified and properly referenced).  Note that it is important that the review extends beyond the simple technical aspects of the situation, so the customised model should account for non-technical aspects as well.  [Details on accessing ISO 27002 can be found in the week 4 tutorial work.]

As noted above, the review for this year should focus on the issues of access controls, operations security (backup and recovery, protection from malware, updates) and cybersecurity (concerning resilience and protection from cyber-attacks, malware and hacking).  These issues should become primary headings in your normative model (it is your responsibility to manage the overlap between these issues), and each of them should contain a number of controls that would then form the basis of the normative model and subsequent evaluation.

The adaption of ISO 27002 (and other sources) for the normative model needed for the evaluation should be guided by risk management principles – that means selecting a set of controls that are likely to be more important in a personal environment and leaving out controls that are not all that relevant.  As a guide for this assignment, it is expected that you would have around 15 to 20 controls in your customised normative model.  These customised controls should have a link back to the sources (such as ISO 27002 – using the control number from the standard), so the reader knows where this element was derived from.  In some cases, the customised control in your normative model may be a direct copy of the control from the standard, and in other cases it may be an adaption from a range of sources (such as those covered in the week 4 lecture and tutorial work).

To illustrate this process of adaption, Section 5 of ISO 27002 covers issues associated with security policy.  For a personal situation, it would be quite unusual to have formalised written security policies in place in relation to the issues of concern to this assignment – so the lack of such written policies would not be a reasonable finding to make in most circumstances.  However, it is quite likely you might have some informal policies in place, such as who you might allow various facilities to be used by, what security software you use, and how and when you backup your data.  This suggests that it could be helpful to have a general control in your adapted evaluation model relating to security policy, but it would be reasonable for this to be kept at a high level (and the used during the evaluation to consider whether your informal policies are adequate for the situation at hand).

After constructing the customised normative model, you should use this to conduct a review of your own personal information security situation and report on the findings and recommendations.  This is usually done by looking at the real situation and comparing this to the issues in the customised normative model.  Where there is alignment between your situation and various controls in the normative model, this suggests the security measures are appropriate and these issues become commendations.  Where there is misalignment, the differences require further investigation and can then become the basis for recommendations for change or improvement.

In conducting the review, you may find it helpful to undertake some tests to verify some of the findings.  As an example, you could physically check backup stores and verify that they keep the most recent copies of the data, as per the backup arrangements that you think might be in place, and that this backup data really is retrievable and easily able to be restored.  You could also use various software tools to verify security elements of the technical environment.

In making the findings and recommendations, you should be guided by the risk environment you are operating in.  For example, you would not make recommendations about implementing a rigorous backup routine if you had little sensitive information to lose – you should suggest a contingency approach that matches this risk profile.  It is important to recognise that an overly stringent security environment is likely to be just as problematic as one with insufficient security measures, as in the longer term, many of these stringent security measures will be ignored or neglected if they are seen as been unnecessary for the risk profile they are meant to be controlling.

And finally, you should reflect on how well this whole process has worked after completing the review.  These reflections would not normally be part of an organisational security evaluation report, but can be seen as bringing some academic rigour to this exercise and may also be part of a high quality professional practice where professionals will reflect on activities they have undertaken.  The use of references will improve the quality of your reflections.

Examples of the questions you may consider in your reflections include:  Has this review produced the intended results?  Is it likely to uncover the main information security issues and make reasonable recommendations for change?  Is a review of this nature worth the effort?  Are there easier ways that could be used to provide reasonable assurance about information security risks?  Has your adaption of the security model provided an adequate coverage of the issues for a personal situation such as the one you are in?  How easy would it be for others (particularly people without a strong IT or security background) to use these materials to assure themselves that they are not exposing themselves to unwarranted information security risks?

Required sections for your report

In summary, your report should include the following (these six dot points could be used as the basis for major headings/sections in your report):

 an overview of your personal situation and the key risks areas that may be present (information, technology, and what these artefacts are used for; what are the key risks that might be evident in these uses of information and technology);

 a brief discussion of the customised normative model that you have used for you review. This section is mainly concerned with how you have constructed this normative model and why you have included the various controls in the model, noting the various sources you have used. This section is more about providing a rationale for why various controls have been included, rather than just providing a simple list of the controls;

 a summary of the tasks undertaken to conduct the review. What steps did you follow in conducting the review?  What evidence did you consider in helping you form your views? What tests did you perform in order to verify the answers to key review questions?  Did you use any automated tools for any of this testing?

 the findings of your review and recommendations for improvement. You should provide a summary of the good and bad issues that arose from the review.  What issues from the situation came up looking good in the review, and where was there room for improvement? What things would you realistically change in order to improve the information security environment?  It is important that this section only presents a summary of the key issues from the review – the details of the evaluation of individual controls should be put in the appendix (the appendix table, with the fourth column detailing the evaluation of each individual control). You should not make recommendations that haven’t appeared anywhere in the appendix table.

 a reflection on the methodology or review approach, following your experience of applying it to your personal computing situation. This is an important part of the assignment and should not be neglected.  There are details above on what should be covered in this section and a

reasonable length for this section is around 500+ words;

 an appendix with the details of your review. The detailed issues considered (customised normative model) and the assessment against these issues should be included in an appendix in a table format (described below).  This material is not part of the main word count for the assignment.  While this appendix is not part of the word count, this will be part of the assessment for the assignment and the marker will need access to this material to ascertain the extent of the nature and quality of the review that you have undertaken.  Without this table, there is little evidence that you have actually conducted an appropriate security evaluation and your assignment will be marked accordingly.

Assessment

The assignment is worth 30% of the marks for Information Security.  The deadline for submissions of this assignment is Sunday night at the end of week 11 (24 April 2022).

The main body of the report is expected to be around 2500 words – please include a word count, but words from any quotations, your bibliography, and the appendix table, should not be included in this word count.  Note that it is not necessary to include an executive summary as this report is sufficiently brief, but a brief introduction setting out what the report covers would be helpful.

In marking the report, attention will be given to your understanding of information security concepts and how well you have met the requirements detailed above.  Style and technique of your writing will also be considered.

The section providing a reflection on the methodology and review approach is an important part of this assignment and will attract around one quarter of the marks allocated.

For the appendix only:  It is quite likely that the material in this appendix will use headings and other material taken directly from the ISO 27002 standard.  So long as you make it clear which parts have been taken from the standard and which parts are your own responses, it is not necessary to put the material from the standard in quotation marks.  For example, a sentence in your appendix (as a lead in, or a footnote) could state that ‘the controls in the left hand column have been derived directly from the ISO 27002 standard unless otherwise noted’, this then avoids the need for quotation marks and in text references for each of these controls.

Submission:  All assignments should be submitted in electronic format (via the Canvas online assignment submission process).  A coversheet is not required (submission to the Canvas drop box is a formal acknowledgement that this is your own work unless otherwise noted), but you should include your student id, assessment item name and the word count.

There is no draft submission box, but you can make multiple submissions to this assignment box and view Ouriginal reports.  Please do NOT submit your assignment to the draft Ouriginal checking processes on another unit’s Canvas site.  This will lead to a very high plagiarism score when you subsequently submit the assignment to this Canvas site and a penalty will be applied to the marking of your assignment in these cases.

A suggested process for this assignment is:

 identify your information assets, associated technology and uses; think briefly about any risks that these uses might entail;  construct your customised normative model, and use this to populate the left-hand column of your appendix table;

 conduct the security evaluation, using the appendix table as a means of documenting the

elements of this review – this should result in a fully populated appendix table;

 write the main body of the assignment, including the description of the information assets, the normative model and its construction, the description of the process you undertook, and key findings and recommendations – these findings and recommendations should connect directly with elements in your appendix table;  write the reflections section of the report.

Sample row for appendix

Note that this is a sample row only – the content of the cells in your review table is likely to be different!  Note that the text in the first column has been taken directly from the ISO 27002 standard, with the control number being a sufficient attribution in this case (there should be a statement on this elsewhere in the appendix as noted above).

It is expected that you will have about 15 to 20 rows of this nature in the appendix of your report.

ControlCurrent situation; evaluations undertakenTestsRecommendations
12.3.1: Backup copies of information, software and system images should be taken and tested regularly in accordance with agreed back-up policy.There is an informal policy in place for backing up important user data. Laissez-faire approach adopted to implementing back-up policy, but most data is synchronised with cloud storage and backed up reasonably regularly. Current work of significance is backed up frequently after major edits using email and USB drives. Minimal testing of back-up arrangements except when outages/losses are experienced.Back-up data stores viewed, with timing and frequency of backups considered. Backup data verified that it could be easily restored.Formally integrate back-up schedule into electronic calendar to ensure more regular compliance with policy. Test back-up repositories from time to time to ensure stored data can be recovered.
 No testing of system image backups due to the logistical difficulties involved.  

In some cases, rows like this could be split into multiple rows if you think this is warranted – in this case, you may have two rows – one that considers the taking of backups and a second one concerned with the testing of these backups.

The example above is about backup – the first column is a statement of the control (12.3.1 in this case); the second column is a description of what backup arrangements actually exist in your current situation, making sure you address issues mentioned in the control.  You don’t need to discuss the risks here.

The third column is about any tests that you do as part of this evaluation.  Not all controls (rows in your table) will need tests.  It is also important to distinguish between the testing that you do as a regular part of your normal operational activities, and the tests that you do for this evaluation.  For example, if you normally test your backups on a regular basis (perhaps to see that they will actually work, which is something that organisations should be doing fairly regularly), then this is something that should be noted in the second column.  But if you have specifically tested a backup as part of this evaluation process, then this is something that would be noted in the third column, along with a description of the test results.

The fourth column is used to note findings and recommendations with respect to that control.  If everything is good, you should note that.  I expect this will be the case for some (perhaps many) of the controls.  Where there are differences between what you are doing yourself and what the control indicates you should be doing, then these are findings, and also the basis for recommendations – that is, things you can change to bring your practices more in line with the control.  Some judgement may be needed around these recommendations.

All of this does have a risk element to it.  For example, things like the essential eight recommend daily backups.  From a personal perspective, this might be much more than is needed, except when you are working on something quite critical (like this assignment) where more frequent backups would be very helpful due to the amount of work that might be lost if something went wrong.  This could mean that from a risk perspective, personal backup arrangements that were not daily could still be acceptable, so long as they were ramped up when more critical work was being done.

You don’t need a lot of discussion about this risk context in the appendix table, although the recommendations you make in the table should take some account of it.  Where there are significant discrepancies between the recommendations you actually make (based on this risk context and what would be reasonable) and what the control indicates should be happening, then these could have a brief discussion in the findings section of the report.

References

ISO (2013) ISO/IEC 27002:2013 Information technology – Security techniques – Code of practice for information security controls, International Standards Organisation, Switzerland.

Order Now

Get expert help for Security evaluation and many more. 24X7 help, plag free solution. Order online now!

Universal Assignment (March 21, 2026) Security evaluation Assignment. Retrieved from https://universalassignment.com/security-evaluation-assignment/.
"Security evaluation Assignment." Universal Assignment - March 21, 2026, https://universalassignment.com/security-evaluation-assignment/
Universal Assignment July 23, 2022 Security evaluation Assignment., viewed March 21, 2026,<https://universalassignment.com/security-evaluation-assignment/>
Universal Assignment - Security evaluation Assignment. [Internet]. [Accessed March 21, 2026]. Available from: https://universalassignment.com/security-evaluation-assignment/
"Security evaluation Assignment." Universal Assignment - Accessed March 21, 2026. https://universalassignment.com/security-evaluation-assignment/
"Security evaluation Assignment." Universal Assignment [Online]. Available: https://universalassignment.com/security-evaluation-assignment/. [Accessed: March 21, 2026]

Please note along with our service, we will provide you with the following deliverables:

Please do not hesitate to put forward any queries regarding the service provision.

We look forward to having you on board with us.

Categories

Get 90%* Discount on Assignment Help

Most Frequent Questions & Answers

Universal Assignment Services is the best place to get help in your all kind of assignment help. We have 172+ experts available, who can help you to get HD+ grades. We also provide Free Plag report, Free Revisions,Best Price in the industry guaranteed.

We provide all kinds of assignmednt help, Report writing, Essay Writing, Dissertations, Thesis writing, Research Proposal, Research Report, Home work help, Question Answers help, Case studies, mathematical and Statistical tasks, Website development, Android application, Resume/CV writing, SOP(Statement of Purpose) Writing, Blog/Article, Poster making and so on.

We are available round the clock, 24X7, 365 days. You can appach us to our Whatsapp number +1 (613)778 8542 or email to info@universalassignment.com . We provide Free revision policy, if you need and revisions to be done on the task, we will do the same for you as soon as possible.

We provide services mainly to all major institutes and Universities in Australia, Canada, China, Malaysia, India, South Africa, New Zealand, Singapore, the United Arab Emirates, the United Kingdom, and the United States.

We provide lucrative discounts from 28% to 70% as per the wordcount, Technicality, Deadline and the number of your previous assignments done with us.

After your assignment request our team will check and update you the best suitable service for you alongwith the charges for the task. After confirmation and payment team will start the work and provide the task as per the deadline.

Yes, we will provide Plagirism free task and a free turnitin report along with the task without any extra cost.

No, if the main requirement is same, you don’t have to pay any additional amount. But it there is a additional requirement, then you have to pay the balance amount in order to get the revised solution.

The Fees are as minimum as $10 per page(1 page=250 words) and in case of a big task, we provide huge discounts.

We accept all the major Credit and Debit Cards for the payment. We do accept Paypal also.

Popular Assignments

Assignment 2: CTS ASSIGNMENT 2 GUIDE

CTS ASSIGNMENT 2 GUIDEAssignment 2:Read the article below and compile a Case Study Analysis Report addressing the assignment tasks that follow.Source: UN Women (2021) Sixteen Defining Moments for Gender Equality in 2021. Available at: https://www.unwomen.org/en/news-stories/feature-story/2021/12/sixteen-defining-moments-for-gender-equality-in-2021 (Accessed: 28 August 2024).Sixteen defining moments for gender equality in 2021 As 2021 comes to

Read More »

BMM6492 Corporate Sustainability

Assignment BriefBMM6492 Corporate SustainabilityComponent number Assignment 1Assignment type 01 Group pitch presentationLearning outcomes for this assessment(Please see module Handbook for all learning outcomes) • Discuss the business case for sustainability• Analyse the environmental, social and economic strategies in corporate sustainability• Appraise the problems in measuring corporate environmental, social and economic

Read More »

BMM6492 Corporate Sustainability

Assignment Brief BMM6492 Corporate Sustainability Component number Assignment 1 Assignment type 01 Group pitch presentation Learning outcomes for this assessment (Please see module Handbook for all learning outcomes) Discuss the business case for sustainability Analyse the environmental, social and economic strategies in corporate sustainability Appraise the problems in measuring corporate

Read More »

Faculty of Business, Computing and Digital Industries

Module Handbook Faculty of Business, Computing and Digital Industries School of Business BMM5582: Business Research 2024-25 Contents Module Welcome…………………………………………………………………………… 3 Module Guide……………………………………………………………………………….. 4 Module Code and Title…………………………………………………………………. 4 Module Leader Contact Details and Availability………………………………….. 4 Module Team Tutors Contact Details and Availability………………………….. 4 Module Teaching………………………………………………………………………… 4 Module Intended Learning Outcomes……………………………………………….

Read More »

Study Skills and Personal Development Planning

Assignment Brief Sheet1Module Tutor:Dr Dennis PeppleModule NameStudy Skills and Personal Development PlanningModule CodeCBU401Title of Coursework:Assessment 1: Written Assignment (1500 words)Weight: 50%Title of Coursework:Assessment 2: Reflective (PDP) Report (1500 words)Weight: 50%Feedback detailsThe university policy is that you will receive prompt feedback on your work within 2 weeks of the submission date.

Read More »

BSc (Hons) Business Management 2026/2027

BSc (Hons) Business Management 2026/20271Project Title Fundamentals of Business Management Practice Deadline This Month 2026 – 17:00hs GMT Submission Method Online WORD.doc submission via Turn-It-In (Refer to Connect for submission link) Project Staff Dr Sakar RashidModule Title Fundamentals of Business Management Practice Level / Semester Level 4 / Sem 1

Read More »

BMM5582 Business Research

Module title  BMM5582 Business Research Assignment Weighting  60%  Assignment type  Research proposal Submission Deadline End of Semester 2 Learning outcomes (see Module Handbook for all learning outcomes)  LO1: Outline specific research aims and objectives, as well as the boundaries of research project. LO2: Investigate the existing body of knowledge in

Read More »

BMM5582 Business Research

Module title  BMM5582 Business Research Assignment Weighting  60%  Assignment type  Research proposal Submission Deadline 26th March 2025 Learning outcomes (see Module Handbook for all learning outcomes)  LO1: Outline specific research aims and objectives, as well as the boundaries of research project. LO2: Investigate the existing body of knowledge in line

Read More »

BMM5582 Business Research

Module title  BMM5582 Business Research Assignment Weighting  60%  Assignment type  Research proposal Submission Deadline This Week Learning outcomes (see Module Handbook for all learning outcomes)  LO1: Outline specific research aims and objectives, as well as the boundaries of research project. LO2: Investigate the existing body of knowledge in line with

Read More »

BMM5552: People Management

Module Handbook Faculty of Business, Computing and Digital Industries  School of Business  BMM5552: People Management 2026-27 Contents Module Welcome………………………………………………………………………….. 2 Module Guide………………………………………………………………………………. 5 Module Code and Title……………………………………………………………………. 5 Module Leader Contact Details and Availability…………………………………….. 5 Module Team Tutors Contact Details and Availability……………………………… 5 Module Teaching…………………………………………………………………………… 5 Module Intended Learning Outcomes…………………………………………………

Read More »

BMM5552: People Management

Assignment Brief BMM5552: People Management Assignment type Individual Report Learning outcomes (Please see module Handbook for all learning outcomes) By the end of this module, the student should be able to: Appraise the effectiveness of a range of people management models, theories, and concepts, including those dealing with setting up

Read More »

CTS Assignment 1 

CTS Assignment 1  Read the article on the assignment brief on food and answer the below questions Assignment Task: Undertake and present a relevant Case Study Analysis Report covering the following tasks:  Recommended structure for the answer  Main Topic: Critical Analysis of the Food Article Subtopic 1: Introduction (100 words)

Read More »

BSc (Hons) Business Management

ASSIGNMENT BRIEF PROGRAMME TITLE  BSc (Hons) Business Management  MODULE CREDIT VALUE   20 MODULE TITLE   Critical Thinking Skills   MODULE LEVEL   4 MODULE CODE LSME410 ACADEMIC YEAR  2026-27 MODULE TEAM   Harsha Subhashana, Victoria Miroiu, Forbes Jecheche LEARNING OUTCOMES  On successful completion of this module students will be able to: 

Read More »

Assignment Brief: BSc (Hons) Business Management MODULE

ASSIGNMENT BRIEF 1PROGRAMME TITLEBSc (Hons) Business Management MODULE CREDIT VALU20 MODULE TITLECritical Thinking Skills MODULE LEVEL4 MODULE CODELSME410 ACADEMIC YEAR2026-27 MODULE TEAMHarsha Subhashana, Victoria Miroiu, Forbes Jecheche LEARNING OUTCOMESOn successful completion of this module students will be able to:

Read More »

Assignment Brief: BSc (Hons) Business Management

ASSIGNMENT BRIEF 1PROGRAMME TITLEBSc (Hons) Business Management MODULE CREDIT VALUE20 MODULE TITLEPersonal and Professional Skills for Management MODULE LEVEL4 MODULE CODELSME402 ACADEMIC YEAR2026-27 Module TeamAmanda Babalola , Jean Serge Koffi , Narjes Vahedi LEARNING OUTCOMESOn successful completion of this module students will be able to:

Read More »

BMM6582: eBusiness and eMarketing

Assignment Brief BMM6582: eBusiness and eMarketing Component number Assignment 2 Assignment type 02 Analytical Review Learning outcomes for this assessment (Please see module Handbook for all learning outcomes) Compare, contrast, and analyse approaches used to evaluate a company’s current positioning in the traditional and electronic marketplaces.Appraise various options for developing

Read More »

Assignment Brief BMM5402: Professional Development & Placement (PDP)

Assignment Brief Module title BMM5402: Professional Development & Placement (PDP) Assignment number and title Semester 1 & Semester 2 Assignment type Part 1, Part 2, and Part 3 Learning outcomes (see Module Handbook for all learning outcomes) Investigate possible job opportunities and analyse job specification requirements (knowledge, skills, and experiences).Appraise

Read More »

Assessment 2: Expository Essay

Assignment Brief Sheet 4Module TutorDr Victoria MohammedModule NameIntroduction to Academic EnglishModule CodeCBF001Title of Coursework: Introduction of Academic EnglishAssessment 1: Argumentative EssayWeight: 50%Title of Coursework: Introduction of Academic EnglishAssessment 2: Expository EssayWeight: 50%Feedback detailsThe university policy is that you will receive prompt feedback on your work within 2 weeks of thesubmission

Read More »

LEVEL 4 ASSESSMENT SPECIFICATION

APPENDIX GA36a Programme: CERTHE Computing Skills for the Workplace Module: Software Solutions for Business Module code: ACCA4026 Contribution to Overall Module Assessment (%): 100% Lecturer(s)   Internal Verifier: Dr Teressa Chikohora   Assignment Title: Assessment Component 1 – Coursework: Portfolio Word count (or equivalent)   4000 Words Submission deadline:  21st

Read More »

Assignment Quantitative CASP RCT Checklist

CASP Randomised Controlled Trial Standard Checklist:11 questions to help you make sense of a randomised controlled trial (RCT)Main issues for consideration: Several aspects need to be considered when appraising arandomised controlled trial:Is the basic study design valid for a randomisedcontrolled trial? (Section A)Was the study methodologically sound? (Section B)What are

Read More »

Assignment Qualitative CASP Qualitative Checklist

CASP Checklist: 10 questions to help you make sense of a Qualitative researchHow to use this appraisal tool: Three broad issues need to be considered when appraising a qualitative study:Are the results of the study valid? (Section A)What are the results? (Section B)Will the results help locally? (Section C) The

Read More »

Assignment Topics

PS3002 Assignment TopicsDear studentsPlease choose one of the topics below. Please note that if you are repeating this subject, you cannot choose the same topic that you did previously in this subject.patellar tendinopathyinstability of the lumbar spinehamstring strainperoneal tendinopathyhip – labral tear.hip osteoarthritispatellofemoral instabilityankylosing spondylitisanterior cruciate ligament rupture (conservative management)quadriceps

Read More »

Assessment 2 – Report

Assessment 2 – Report (1200 words, 30%)PurposeTo demonstrate an understanding of the purpose and application of evidence-based dietary advice and guidelinesLearning objectives1.Review and analyse the role and function of macronutrients, micronutrients and functional components of food in maintaining health2.Understand digestion, absorption and metabolism of food in the human body and

Read More »

Assessment 2 – Individual Case Study Analysis Report

Southern Cross Institute,Level 2, 1-3 Fitzwilliam Street, PARRAMATTA NSW 2150 & Level 1, 37 George Street PARRAMATTA NSW 2150Tel: +61 2 9066 6902 Website: www.sci.edu.auTEQSA Provider No: PRV14353 CRICOS Provider No: 04078ªPage 1 of 16HRM201 Human Resources ManagementSemester 1, 2026Assessment 2 – Individual Case Study Analysis ReportSubmission Deadline: This Week,

Read More »

ASSESSMENT 2 BRIEF HPSYSD101 The Evolution of Psychology

HPSYSD101_Assessment 2_20240603 Page 1 of 7ASSESSMENT 2 BRIEFSubject Code and TitleHPSYSD101 The Evolution of PsychologyAssessment TaskAnnotated BibliographyIndividual/GroupIndividualLength2,000 words (+/- 10%)Learning OutcomesThe Subject Learning Outcomes demonstrated by successful completion of the task below include:b) Examine the significant figures, events and ideas present in the history of psychology.c) Identify and relate the

Read More »

Assessment 1 – Individual Case Study Analysis Report

HOS203 Contemporary Accommodation ManagementSemester 1, 2026Assessment 1 – Individual Case Study Analysis Report (10%)Submission Deadline: This Week, at 11:59 pm (Week 4)Overview of this AssignmentFor this assessment, students are required to analyse an assigned case study about hospitality industry relevant regulations and/or operational and accreditation failures of a hospitality organisation.

Read More »

Assessment Brief PBHL1003FOUNDATIONS OF HEALTH AND HEALTH CARE SYSTEMS

Assessment BriefPBHL1003FOUNDATIONS OF HEALTH AND HEALTH CARE SYSTEMSTitleAssessment 2 TypeEssay Due DateWeek 6 Monday 14 April 2025, 11:59pm AEST Length1000 words Weighting60% Academic IntegrityNO AI SubmissionUse Word Document – submit to Blackboard / Assessments Tasks & Submission / Assessment 2 Unit Learning OutcomesThis assessment task maps to the following Unit

Read More »

Assignment 4 – Intersection Upgrades and Interchange Station Design

CIVL5550: Civil Infrastructure DesignAssignment 4 – Intersection Upgrades and Interchange Station DesignDue: This WeekSubmission Instructions:1.Submit a report of approximately 10 pages, covering the following:Part 1: Intersection Upgrade Design•Propose upgrade schemes for two sign-controlled intersections and one signalized intersection•Use SIDRA to evaluate the performance of both the original and upgraded intersections•Use

Read More »

Assessment Brief 1

1 of 14Assessment Brief 1Assessment DetailsUnit Code Title NURS2018 Building Healthy Communities through Impactful PartnershipsAssessment Title A1: Foundations of Community Health Promotions ProjectAssessment Type ProjectDue Date Week 4, Monday, 22nd of September 2025, 11:59pm AESTWeight 40%Length / Duration 1200 wordsIndividual / Group IndividualUnit Learning Outcomes(ULOS)This assessment evaluates your achievement of

Read More »

Can't Find Your Assignment?