Applied Project - make logo of college

Assignment Help Other Subject
Reference no: EM132368156

IS Security and Risk Management Assignment -

Assessment 1: Case study

Assessment Details: The risk to organizations from a network attack has increased exponentially. Threats can occur at any point on the internet where there is a potential weakness that hackers can exploit using different types malware. As the number of devices grows, the potential for attack and disruption increases.

Assume you are working as an IT security consultant at the IT department of ITech company. The company uses data centres to store very important customer data. As an IT consultant, you have to advice the staff about the ransomware attack, their types and threats. In this context write a report including the following sections:

1. Introduction about ransomware attack and their impacts on the society.

2. Discussion of any three recent variants of ransomware attacks.

3. The working mechanism of ransomware.

4. Potential threats posed by ransomware.

5. Summary

6. References in Harvard style.

Assessment 2: Applied Project

Assessment Details: This assessment is designed to assess your technical skills in investigation IS security, risk threats and management to an organization. The assessment is also assessing your skills to evaluate risk management techniques and IS auditing. You are required to select an organization that uses information systems to perform daily business operations. You have to identify the most valuable assets for the organisations and investigate the security threats and mitigation techniques. You have also to propose/evaluate the risk management techniques adopted by the selected organization to ensure the reliability, confidentiality, availability, and integrity. You have also to discuss audit plan and processes used by the organization and investigate the impact of human factors on security and risk management.

Task Specifications - This assessment includes two tasks as follows:

Task-1: Each group should select an organisation. The organization must provide information systems services to the staff and customers. You have to write a report to answer the followings related to the selected organization:

1. Network devices are highly vulnerable and can be exposed. Discuss two types of threats against network routers/switches of the selected organization. Illustrate how these devices are vulnerable to destruction and abuse.

2. Propose with justification two types of network security devices can be used to control security and mitigate threats related to the web and email servers.

3. Assume the organization used Windows server 2016 to host the organization web site. Discuss how the organization can ensure the availability of the web service using windows server 2016.

4. Discuss the impact of employee on information security of the selected organization. Provide risk management recommendation to reduce the risk of employee.

5. Windows server 2016 supported with different tools for auditing. Illustrate windows server 2016 auditing tools and discuss how they can be used by the selected organization to monitor and analyzing the web server and email server problems.

You may need to make some assumptions with the required justifications. Please note you have to use Harvard reference style.

Task 2: Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. Use Steghide tool available in Kali Linux to hide a text file that includes the group students names and IDs on APIC logo image (Use: SBM4304 as passphrase). In your report, you have to provide screenshot demonstrate the steps you followed during the process of installation of Steghide, and the way you use to hiding group information text file into APIC logo image and finally the steps to extract the text file from APIC logo image for verification of your work.

Submission - You have to submit two files:

1. Report in word format for Task-1 and Task-2 processes.

2. APIC logo image that includes your group information for Task-2.  The two files must be submitted separately not in single compress file.

Note - In that assessment 2 applied project need to make logo of college you can get from website of college. In this section task 2 just need the screen shot being posted and procedures of steganography and need the files of task 2 those Linux files and process where you will be using logo or image of APCI college inside the logo there need our group members name and id and need the file of vmware kali linux.

Attachment:- IS Security and Risk Management Assignment File.rar

Reference no: EM132368156

Questions Cloud

Determine the value of cash provided by operating activities : Determine the dollar value of cash provided or used by operating activities. If the total is a use of cash, enter as a negative number.
Determine the contribution margin ratio : Lauder Company had fixed costs of $282,500, variable costs of $645,000, and actual sales amounted to $1,100,000. If the company has a break-even point.
What is the stockholders equity of each company : What is the stockholders equity of each company? The total assets and total liabilities of Keurig Green Mountain Coffee, Inc., and Starbucks Corporation are.
Show budgeted balance sheet for the end of december : Show budgeted income statements for November and December. Show budgeted balance sheet for the end of December.
Applied Project - make logo of college : SBM4304 IS Security and Risk Management Assignment, Asia Pacific International College, Australia. Applied Project - make logo of college
Remind the audience of the importance or value : Sentence-Level Speaking Outline Structure - Explain why the topic is important for graduate recruits in engineering/management
Discuss the advantages and disadvantages of making system : Provide a recommendation to Tilly's Pet Supplies as to whether making or buying a new system is most appropriate for their business, with a justification.
How much cash is being held by gge enterprises inc : On November 1 of the current year, Rob Elliot invested $31,000 of his cash to form a corporation, GGE Enterprises Inc., in exchange.
How is transmitted from one neuron : How is transmitted from one neuron to another the message that the action potential carries from the receptor?

Reviews

len2368156

9/9/2019 3:59:55 AM

Applied project - Reporting a relating security audits and controls, and risk management techniques. The report will include risk analysis of the identified risks and threats and the impact of human factors on security and risk management. Week 11 applied project - in that applied project you need to make logo of my college you can get from website of my college i hope i will get all done. In this section task 2 just need the screen shot being posted and procedures of steganography and i will need the files of task 2 those linux files and process where you will be using logo or image of apic college inside the logo there need our group members name and id no ... the password as given at task 2 as SBM4304 i will need the file of vmware kali linux.

len2368156

9/9/2019 3:59:47 AM

Submission - you have to submit two files: 1. report in word format for Task-1 and Task-2 processes. 2. APIC logo image that includes your group information for Task-2 .(make sure to use: SBM4304 as passphrase). The two files must be submitted separately not in single compress file. In completing this assessment successfully, you will be able to investigate IS security, risk threats and propose the suitable security controls, which will help in achieving ULO-1, ULO-2, ULO-3, ULO-4 , ULO-5, ULO-6 and ULO-7, this in turn will help you in achieving CLO-1, CLO-2, CLO-3, CLO0-4 and CLO-9, which collectively with other unit learning outcomes will help in achieving GA-52, GA-10, GA-11 and GA-12.

len2368156

9/9/2019 3:59:41 AM

Marking Information: The applied project will be marked out of 100 and will be weighted 20% of the total unit mark. Introduction is very well written, and the report outline is also discussed. Excellent discussion about threats with clear specifications related to routers/switches. A very clear and in- depth discussion about network security devices. Has excellent understanding and identification of techniques to improve the availability of the web service. Excellent understanding of impact of employee on information security. Excellent understanding and demonstration of audit process related to the selected sector. APIC logo image correctly include group details. Screenshot is provided using Steghide with correct result. A section very clearly summarizing the overall contribution. Clear styles with excellent source of references.

Write a Review

Other Subject Questions & Answers

  Discuss the specific role protestant reformation

Discuss the specific role the Protestant Reformation played in laying the groundwork for the advancement of communication techniques and technologies within Western culture.

  Describe at least two personal connections you made

Assignment: Developmentally Appropriate Practice- Describe at least two personal connections you made with the DAP information you discovered on the NAEYC site.

  Discuss the competitive nature of the sydney food

Analyse how food and beverage outlets can use tools such as "Five forces analysis" and the VRIO concept to ensure the y meet their strategic objectives. In your answer discuss the competitive nature of the Sydney food and beverage industry

  What is the maximum unit cost that will make it worthwhile

use the sensitivity report for this lp model provided. answer the following questions. each question being independent

  Explain component of the transactional communication model

You are attending a town council meeting where you meet community leader Fran Richardson who is influential in the transportation business.

  What do you think is the organization value proposition

What do you think is the organization's value proposition? Use the generic value propositions outlined in the Week 4 Overview.

  What is the value for df between treatments?

A repeated-measures study uses a sample of n = 20 participants to evaluate the mean differences among three treatment conditions. In the analysis of variance for this study, what is the value for df between treatments?

  Characteristic of the humid eastern

A soil that is characteristic of the humid eastern United States is ______________

  Nominal and effective rates of interest

Find the nominal and effective rates of interest in each of the followind cases

  Was the mumbai event considered an unexpected event

Describe and discuss how terrorist organizations use technology to further their organizational goals and in light of the available capabilities in modern technologies, such as cell phones, handheld devices, and the Internet, was the Mumbai event c..

  What dietary recommendations should be made

The focus for this live classroom is a discussion about diet therapy for a 58 year old woman who experienced her first MI ( myocardial infarction).

  Is happiness enough

Is actually joy an adequate qualifying criterion with regard to ethical really worth? In the event that it's not, are you able to title a much better or even more suitable qualifying criterion.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd