Computer Systems Security Assignment Task

Computer Systems Security Assignment Task

To make this assignment more relevant and interesting for you, you will select your own real- world organization (and thus case study) and then apply the concepts and techniques you have learned from this module to that case study. The case study you select must not have been used by you, or any other student, in any other module current or historic. Please ensure you check your selected organization and the scope of the case study with your tutor before starting.

Your selected organization for this case study intends to upgrade their current IT infrastructure to meet the organizational IT needs in the 21st century. You have an option of using a technology of your choice or technologies such as Internet of Things, Cloud Computing, Content Centric Networking, or Software Defined Networks for this upgrade. You as an IT Lead have been asked to write a report for the management justifying viability of the proposed future IT infrastructure in the context of its security.

Task 1

1a) Discuss briefly the profile of your selected organization, its existing IT infrastructure, and pertinent issues with the current infrastructure to justify the need for an infrastructure upgrade.

1b) Identify and justify the choice of technology (or technologies) you are proposing to use to upgrade the IT Infrastructure of your selected organization. You are expected to briefly compare technologies to justify your choice.

1c) In the context of proposed future IT infrastructure for your organization, discuss critical assets (including information assets) that will need protection, and list vulnerabilities related to each of the identified assets.

Note: The answer to the above task must demonstrate a conceptual understanding of common security risks and recognise the importance of risk analysis within different IT environments and critically evaluate relevant literature regarding notable security issues.

(800 words) (20 marks)

Task 2

2a) Risk analysis lies at the heart of any successful IT project. Through arguments backed by literature, justify the importance of risk analysis phase in any IT project. Also discuss what risk analysis process in relation to IT infrastructure projects entails.

2b) Critically evaluate a range of pertinent security risks posed to the selected organization in context of their proposed IT infrastructure upgraded through the technology of your choice. Also, briefly discuss the proposed protection against those risks.

2c) Conduct a detailed risk analysis of your organization based on the risks evaluated in Task 2b.

Note: The answer to the above task must demonstrate a conceptual understanding of common security risks and recognise the importance of risk analysis within different IT environments, critically evaluate relevant literature regarding notable security issues and create a risk analysis for a given scenario with reference to compliance with security policies

(1400 words) (35 marks)

Task 3

3a) Critically evaluate key aspects of the security policy of your selected organization (or an organization of a similar profile and size) also discussing how effective the policy is in protecting against security risks evaluated in Task 2b.

3b) Cryptography acts as a key measure in tackling a range of security threats. Discuss a cryptographic approach (or a combination of approaches) you are proposing for your organization to adopt and justify your choice by briefly comparing your approach against other available approaches. Explain in what areas of your organization’s future IT infrastructure you will use the proposed cryptographic approach.

Note: The answer to the above task must demonstrate a systematic understanding of the key approaches to cryptography & their application and create a risk analysis for a given scenario with reference to compliance with security

(1000 words) (25 marks)

Task 4

4a) Provide a brief assessment of the security of your proposed IT infrastructure using layered security approach.

4b) Critically evaluate legal, social and ethical issues in relation to the security of proposed IT infrastructure.

Note: The answer to the above task must critically evaluate legal, social and ethical issues of secure systems.

(800 words) (20 marks)

Total word count = 4000

Some referencing must come from the below text book:

Whitman, M. and Mattord, H. 2016. Management of Information Security. 5th ed. Delmar Thomson Learning 

Referencing Guidance

You MUST underpin your analysis and evaluation of the key issues with appropriate and wide ranging academic research and ensure this is referenced using the Harvard system(s).

The Harvard System (Author-Date Method)

All statements, opinions, conclusions etc. taken from another author’s work (print, online or multimedia) should be cited, whether the work is directly quoted, paraphrased, or summarised. Paraphrasing is integrating another person’s ideas into your work by rewriting an argument using your own words, phrasing, and interpretation. Guidance on appropriate use of paraphrasing, summarising and quotation in academic writing is available in your Student Handbook. Referencing is a two-part process:

  • In-Text Citations
  • Reference List

In the Harvard System, all cited publications are referred to in the main body of text by giving the author’s surname and the year of publication separated by a comma e.g. (Waring, 2014). Each cited publication must have a corresponding full reference in the Reference List at the end of your work. The references are listed in alphabetical order by surname.

Authors/Originators

When citing the author, use the name(s) of the person or organisation shown most prominently in the source as being responsible for the published content.

If no author is given and there is clearly no identifiable person or organisation, use ‘Anon.’, except for webpages, newspapers, film, dictionaries, or encyclopaedias. See section 2.1.1. point vii for guidance on how to cite these examples. For all examples use the same author notation in the reference list at the end.

Dates

If an exact year or date is not known, an approximate date preceded by ‘ca.’ may be supplied e.g. (ca. 1750). If no such approximation is possible, use N.D. (no date). For webpages, it may be preferable to cite the year in which the page was accessed, e.g., (ca. 2009), rather than use N.D..

Where a book, chapter or article has been re-published as part of a different work e.g., an anthology, cite and reference the original date of publication, if given.

Person-to-person communication (letters, emails, interviews, lectures, etc.)

We recommend that references to person-to-person communications such as letters and emails are given only within the main body of the text and are not detailed in the reference list.

In-Text Citations

This applies to print and online materials.

Where to place the citation

Place your citation where you feel it should naturally occur within a sentence. Depending on your writing style, it may follow a phrase/idea or appear at the end of a sentence or paragraph. It should always appear before the full stop.

• e.g., As Waring (2014, p. 33) said, “theory and practice should not be seen as separate entities” and so… This is an example of a ‘narrative citation’ where the author(s) name naturally occurs within the sentence. In this case, you only need to put the date in brackets, and the page number if necessary.

• e.g., In his highly acclaimed study, Waring (2014) argued that theory and practice should not be seen as separate entities…

• e.g., Theory arises out of practice and the two are therefore inextricably linked (Waring, 2014). This is an example of a ‘parenthetical citation’ where the author(s) name does not naturally occur in the sentence and is therefore placed within the parenthesis along with the date, and page number if necessary.

Quotations

If the quote is less than a line it may be included in the body of the text in double quotation marks. Longer quotations should be indented, single-spaced, and appear in double quotation marks.

Pagination

In citations to particular parts of a document, the location of that part (e.g., Waring, 2014, p. 6) should always be given after the year within the brackets.

If your ebook does not have the printed page numbers, when referencing books in your work you will need to refer to a chapter/section/paragraph number to correctly identify the passage of text you are using.

• e.g., Leatherbarrow and Fletcher (2018) state that “HRM as a concept was attractive to many organisations because of its unitary perspective” (chapter 3, para. 2).

For webpages and online newspapers, this detail is not required.

Figures (e.g., diagrams, graphs, tables, illustrations, photographs, etc.)

These should be referenced as though they were quotations taken from a published work. Page numbers come after the year, within the brackets. Diagrams etc. are usually accompanied by a brief description and are listed throughout a piece of work by figure number.

• e.g., Figure 1. Johannes Vermeer’s The Girl with the Pearl Earring (Chevalier & Hale, 2011, p. 55).

If the item has been copied and amended by you, e.g., you add another axis to a graph, then use ‘amended from’ in parentheses after the source.

• e.g., Figure 1. Johannes Vermeer’s The Girl with the Pearl Earring (amended from Chevalier and Hale, 2011, p. 55).

When referring to diagrams, graphs, tables, illustrations, photographs, etc. in the text, you should use Figure number (and source if relevant).

• e.g., In Figure 2. Mitchell (2015) demonstrates…

You should include a full reference to sources in the list at the end of your work. Your own original work should not appear in the reference list at the end, as it has not been published.

Text or script from videos, films, or broadcasts

These should be referenced as though it were a quotation taken from a published work, but without page numbering.

• e.g., As typified by James Dean portraying the moral decay of American youth (Rebel without a Cause, 1955).

Online sources

When citing a webpage on an organisation or company website, use the organisation or company as the author. Do not insert the URL (web address) in the body of your text.

• e.g., Price Waterhouse suggest “A quotation from the relevant webpage would be inserted here.” (Price Waterhouse, 2011).

2.1.1. Examples of In-Text Citation

  1. If the author’s name occurs naturally in the sentence, the year is given in brackets:

• e.g., In his highly acclaimed study Waring (2014) argued that theory and practice should not be seen as separate entities…

• e.g., As Waring (2014, p. 33) said, “theory and practice should not be seen as separate entities” and so…

  1. If the name does not occur naturally in the sentence:

Both name and year are given in brackets:

• e.g., A more recent study (Waring, 2014) has shown the way theory and practical work interact.

• Theory arises out of practice and the two are inextricably linked. (Waring, 2014).

  1. When an author has published more than one cited document in the same year:

These are distinguished by adding lower case letters (a, b, c, etc.) after the year and within the brackets:

• e.g., Fordham (2011a) discussed the subject…

Note: If you are adding citations from the same author and year, the letters after the date will determine the order in your reference list e.g., ‘Fordham (2011a)’ would be listed before ‘Fordham (2011b)’.

  1. When more than one source is cited:

The sequence of citations may be either chronological or in order of academic relevance.

• e.g. (Harris 2011; Hale 2012; Malcolm 2014)

  • If there are two authors:

The surnames of both should be given.

• e.g., Doole and Lowe (2012) proposed that…

  • If there are three to five authors:

The surnames of all authors should be given, and then you can use the main author’s surname followed by et al for the second and all subsequent citations.

  • If there are more than six authors:

The surname of the first author only should be given, followed by et al.:

• e.g., As global economies grow and the cost of doing business increases (D’Arienzo et al., 2016).

A full list of all author’s names should appear in the reference list at the end of your work.

  • If no author is given and there is clearly no identifiable person/body responsible:

For all examples use the same author notation in the reference list at the end. For webpages use the organisation or company author:

• e.g., In the IPCC (2016) report on Climate Change and Oceans and the Cryosphere…

For newspaper articles use the newspaper title:

• e.g., Social media is driving the rise of hate crime (The Telegraph, 2016).

For a film, use the title of the film:

• e.g., As typified by James Dean portraying the moral decay of American youth (Rebel without a Cause, 1955).

For a dictionary or encyclopaedia, if it is the co-operative work of many individuals, none of whom are the main editor, the title of the work may be used instead.

• e.g., According to the Oxford Encyclopaedia “A quotation from the text would be inserted here.” (Oxford, 2007, p. 375).

For other sources, use ‘Anon.’:

• e.g., In an earlier text (Anon., 1908) it was stated that…

  1. If you refer to a source directly quoted in another source you cite both in the text:

• e.g., In a popular study Whear (2014 cited by Stamper, 2016) argued that education must be participative and collaborative…

• e.g., As Whear (2014, cited by Stamper 2016, p. 90) said, “education must be participative, collaborative and non-judgmental” and so we…

You should only list the work you have read, i.e., Springer, in the reference list at the end.

  • If you refer to a contributor in a source just cite the contributor, not the editor:

• e.g., Crinklaw showed this to be key to her own social networking success (Crinklaw, 2011).

  • If you refer to a person who has not produced or contributed to a work, but who is quoted in someone else’s work, it is recommended that you mention the person’s name and you must cite the source author:

• e.g., Michael Heseltine emphasized the part the media plays in influencing political opinion in an interview with Eaton (2016).

• e.g., “It rings well with some of our xenophobic newspapers”, Michael Heseltine said in a recent article (Eaton, 2016, p4).

You should list the work that has been published, i.e., Eaton (in the New Statesman) in your reference list.

  • Scriptural Citations (e.g., Bible, Koran/Qur’an):

These should only be included in the text and not the reference list. Include book, chapter, and verse. If quoting you may add the translation or edition.

• e.g., “He gives strength to the weary and increases the power of the weak.” (Isiah 40:29, New International Version).

  • Legislation – UK Statutes (Acts of Parliament) should be cited in full:

• e.g., The Equality Act 2010 legislates that it is unlawful to discriminate on the grounds of…

Person-to-person communications (letters, emails, interviews, lectures, etc.):

These do not provide recoverable data and so are not included in the reference list. Cite personal communications in the text only. Give initials as well as the surname and status and/or occupation of the person. Provide as exact a date as possible. When citing research data which you have collected, it is advisable to also include copies or summaries of source data in Appendices.

• e.g., According to Professor L. Brockliss, Beatty’s accounts of naval medicine led to significant advances (personal communication, 15 September 2008, see Appendix 1).

Lectures, whether downloaded from Arden University or not, are not regarded as ‘published’ materials and are intended as pointers toward such sources rather than as source materials in themselves.

Order Now

Get expert help for Computer Systems Security Assignment Task and many more. 24X7 help, plag free solution. Order online now!

Universal Assignment (February 9, 2023) Computer Systems Security Assignment Task. Retrieved from https://universalassignment.com/computer-systems-security-assignment-task/.
"Computer Systems Security Assignment Task." Universal Assignment - February 9, 2023, https://universalassignment.com/computer-systems-security-assignment-task/
Universal Assignment July 22, 2022 Computer Systems Security Assignment Task., viewed February 9, 2023,<https://universalassignment.com/computer-systems-security-assignment-task/>
Universal Assignment - Computer Systems Security Assignment Task. [Internet]. [Accessed February 9, 2023]. Available from: https://universalassignment.com/computer-systems-security-assignment-task/
"Computer Systems Security Assignment Task." Universal Assignment - Accessed February 9, 2023. https://universalassignment.com/computer-systems-security-assignment-task/
"Computer Systems Security Assignment Task." Universal Assignment [Online]. Available: https://universalassignment.com/computer-systems-security-assignment-task/. [Accessed: February 9, 2023]

Please note along with our service, we will provide you with the following deliverables:

Please do not hesitate to put forward any queries regarding the service provision.

We look forward to having you on board with us.

Get 90%* Discount on Assignment Help

Most Frequent Questions & Answers

Universal Assignment Services is the best place to get help in your all kind of assignment help. We have 172+ experts available, who can help you to get HD+ grades. We also provide Free Plag report, Free Revisions,Best Price in the industry guaranteed.

We provide all kinds of assignmednt help, Report writing, Essay Writing, Dissertations, Thesis writing, Research Proposal, Research Report, Home work help, Question Answers help, Case studies, mathematical and Statistical tasks, Website development, Android application, Resume/CV writing, SOP(Statement of Purpose) Writing, Blog/Article, Poster making and so on.

We are available round the clock, 24X7, 365 days. You can appach us to our Whatsapp number +1 (613)778 8542 or email to info@universalassignment.com . We provide Free revision policy, if you need and revisions to be done on the task, we will do the same for you as soon as possible.

We provide services mainly to all major institutes and Universities in Australia, Canada, China, Malaysia, India, South Africa, New Zealand, Singapore, the United Arab Emirates, the United Kingdom, and the United States.

We provide lucrative discounts from 28% to 70% as per the wordcount, Technicality, Deadline and the number of your previous assignments done with us.

After your assignment request our team will check and update you the best suitable service for you alongwith the charges for the task. After confirmation and payment team will start the work and provide the task as per the deadline.

Yes, we will provide Plagirism free task and a free turnitin report along with the task without any extra cost.

No, if the main requirement is same, you don’t have to pay any additional amount. But it there is a additional requirement, then you have to pay the balance amount in order to get the revised solution.

The Fees are as minimum as $10 per page(1 page=250 words) and in case of a big task, we provide huge discounts.

We accept all the major Credit and Debit Cards for the payment. We do accept Paypal also.

Popular Assignments

BSBWOR502 – Lead and manage team effectiveness

BSBWOR502 – Lead and manage team effectiveness The BSBWOR502 – Lead and manage team effectiveness is a unit of the resource training. Also, it is competency training that helps aspiring team leaders build the necessary skills. Since team leadership in the workplace requires many abilities, this unit provides an approach

Read More »

BUSN 732 Writing Assignment 2

Description This assignment gives you an opportunity to read, summarize, and analyze material to be presented in a short report. Specifically, you are asked to read the five assigned articles on the Canadian Pension Plan (CPP) and make notes on the pros and cons of pension adoption discussed in each

Read More »

Assignment 2: Recorded Presentation

Weighting Percentage: 45% The purpose of this assessment task is to link an Aboriginal and / or Torres Strait Islander artwork with an issue that relates to health and wellbeing of Aboriginal and Torres Strait Islander people and explore the associated cultural and historical factors.  Each student is required to plan, create and submit

Read More »

Assignment 2 Research Proposal

ASSIGNMENT TWO GUIDE The Research Proposal This document contains everything you need to know for your second assignment. Please make sure to read this in full prior to asking any questions on Moodle. Below are the key things covered and the corresponding page numbers for easy access. Assignment 2 Research

Read More »

NUR133 ASSESSMENT 2 – Digital Presentation

NUR133 ASSESSMENT 2 – Digital Presentation (500 words + 10-minute presentation) TASK Select a service or program designed to improve the health outcomes of Aboriginal and/or Torres Strait Islander people and prepare a poster presentation that could be used to develop a brief, engaging education session for your peers. In

Read More »

MGMT2007 Organisational Behaviour

2021, MGMT2007 Organisational Behaviour 3,000-word Major Essay Pick ONE of these major essay questions to write an essay: Topic 1: Dealing with problems in an organisation under organisational change Example Scenario: Organisation X has implemented some drastic organisational changes recently. As a result, some of its employees have been laid

Read More »

NSB204 MENTAL HEALTH: Self and Others

Assessment Task 2 Assessment name: Case Study Task description: This assignment aims to help you to begin to use your professional and clinical judgement to think like nurses working in a mental health setting and/or in relation to the mental health needs of people regardless of the setting.   Choose

Read More »

MBA600 Business Report Individual written analysis

Assessment 2 Information Subject Code: MBA600 Subject Name: Capstone: Strategy Assessment Title: Assessment Type: Length: Business Report Individual written analysis 2000 words (+/- 10% allowable range) Weighting: 35% Total Marks: Submission: 100 Online Due Date: Week 10 Your task Using the same organisation from the first assessment, individually, you are

Read More »

HNN300 Child and Adolescent Health Assessment

Task 1: Written Assignment 1500 words (40%) Purpose of assessment task Childhood immunisation is a critical public health intervention that helps protect health and support normal development in infants, children, and young people. This assignment is designed to help you to analyse data, assess risk, and to develop skills to

Read More »

Importance of Aboriginal language

Due Date: 12 hrs   Format/Length: 800 words written Purpose: To explore, deconstruct and analyses the importance of Aboriginal language(s) in a contemporary context.  Task: You are to select an Aboriginal language initiative to research and develop your knowledge and understanding on the importance of keeping languages alive. This can

Read More »

Diverse Populations and Nursing Practice Reports

WORD LIMIT – 2500 – no introduction and conclusion required 7 headings required – headings, text-citations,                1200 words 1) Social determinants of health – 300 words 2) Health inequalities – 300 words 3) Health inequities – 300 words 4) Health outcomes – 300 words 1200 words 5) Application of

Read More »

Chronic Diseases

Introduction: The term “chronic disease” is increasingly often used by patients, healthcare professionals, researchers, etc. This term is defined differently by each person, and each definition encompasses a different set of medical disorders. Last but not least, the World Health Organization asserts that chronic illnesses are not contagious. They progress

Read More »

3. REPORT – Essay

STUDENT INSTRUCTIONS You are required to write a report as outlined in the assessment instruction and criteria listed below. It is important to ensure you read all aspects of the assessment topics and discuss any areas that require clarification with your assessor. Where there is a word limit it is

Read More »

Quality Areas 2 and 5 of the National Quality Standard

Access and review each of the Quality Areas in the ACECQA website, and for each of the given elements, provide one requirement that the element requires from an early years learning centre. You can access the page on the Quality Areas of the NQS using the link below: Quality Area

Read More »

National Health and Medical Research Council

Element Underpinning regulation from National Regulations Requirement of the regulation Underpinning section from the ECSNL Requirements of the section Element 2.1.1: Wellbeing and comfort         Element 2.2.1: Supervision         Element 5.1.1: Positive educator to child interactions         Element 5.2.2: Self-regulation  

Read More »

International Health and Development

Assessment Brief Module title: International Health and Development Assessment Point: First assessment point Assessment task: PART A: PowerPoint Presentation: 15 slides PART B: Word document: 1000-word count limit script for the slides Submission deadline: Please consult the VLE. Submission procedure: Please submit via the submission link on the VLE. Submission

Read More »

Outline the historical development of the policy

Outline the historical development of the policy including other linked policies highlighting key changes The Disability Support Pension is Australia’s universal health insurance scheme that guarantees all people who are unable to work due to a physical, mental, or intellectual disability financial help, which is a payment administered by Centrelink (Legal Services

Read More »

 SITHCCC027 – Prepare dishes using basic methods of cookery

Student Name  Student ID  Unit Name   SITHCCC027 – Prepare dishes using basic methods of cookery Practical Date  Submission Date  Student Declaration ☐ Student Plagiarism Declaration: By submitting this assessment to the college, I declare that this assessment task is original and has not been copied or taken from another source

Read More »

SITHCCC027 – Prepare dishes using basic methods of cookery

Student Name    Student ID   Blc01102 Unit Name   SITHCCC027 – Prepare dishes using basic methods of cookery Practical Date   07/02/2023 Submission Date    Student Declaration ☒ Student Plagiarism Declaration: By submitting this assessment to the college, I declare that this assessment task is original and has not been copied or

Read More »

Resource – Health promotion resource

ASSESSMENT:-             Resource – Health promotion resource Due date: – 10th August 2021   Length: – N/A Type of Collaboration:-                Individual Assessment Details It is the nurse’s role to provide information and education to enhance people’s control over their health (NMBA, 2016). The purpose of this assessment is to produce a

Read More »

The Aged Care Royal Commission Final Report

Discussion PAPER Assignment References 8 Australian Harvard 800 words  due 10th august The Aged Care Royal Commission Final Report titled Care, Dignity and Respect has now been released. The report calls for significant reforms to Australia’s aged care system. The final report also makes 148 recommendations for reform. In this

Read More »

HC3131 Business Research Project

Assessment Details and Submission Guidelines Trimester T2 2021 Unit Code HC3131 Unit Title Business Research Project Assessment Type 1, Topic Approval, Presentation Assessment Title Topic Approval Purpose of the assessment (with ULO Mapping) 1.Clearly identify your chosen topic, having carried out some basic review of available secondary data to secure

Read More »

Cases: Assessment Task 2

Case 1 Tina Tina is 18 years old and lives with her grandmother, older brother and two younger sisters. At present no one has a full-time job with both the grandmother and older brother currently on welfare. The two younger sisters currently enrolled in high school. Tina’s mother lives in

Read More »

NURBN3030 Supplementary Assessment

Written Case Study Report Application of health assessment, planning, implementation and evaluation of professional nursing care to a clinical deterioration patient scenario Due date:         As specified by the Course Coordinator Weighting:       Students must achieve a Pass grade (50%) for the Supplementary Assessment to achieve a Pass grade overall for the

Read More »

Competitive Advantage Video Project

Assessment 1 Information Subject Code: MBA600 Subject Name: Capstone: Strategy Assessment Title: Assessment Type: Length: Competitive Advantage Video Project Individual video recording 10 minutes (no more) Weighting: 25% Total Marks: Submission: 100 Online Due Date: Week 6 Your task Individually, you are required to record a 10-minute video, in which

Read More »

Analysis of Foundational Theory of Management

Class: Day and Time   Lecturer name   Student name / ID   ASSESSMENT 1 (30%) Written – Individual   Due:  Week 4 – Sunday, 15 August 2021 @ 23:59 Analysis of Foundational Study of Management – in the context of contemporary multidisciplinary business This assessment task is designed to address

Read More »

Relating the Class to World Events

Submit your assignment soon Even though your assignment is due on Aug 23, 4:59 PM AEST, try to submit it 1 or 2 days early if you can. Submitting early gives you a better chance of getting the peer reviews you need in time. Topic: Relating the Class to World

Read More »

Can't Find Your Assignment?

Open chat
1
Free Assistance
Universal Assignment
Hello 👋
How can we help you?