Applied Project - make logo of college

Assignment Help Other Subject
Reference no: EM132368156

IS Security and Risk Management Assignment -

Assessment 1: Case study

Assessment Details: The risk to organizations from a network attack has increased exponentially. Threats can occur at any point on the internet where there is a potential weakness that hackers can exploit using different types malware. As the number of devices grows, the potential for attack and disruption increases.

Assume you are working as an IT security consultant at the IT department of ITech company. The company uses data centres to store very important customer data. As an IT consultant, you have to advice the staff about the ransomware attack, their types and threats. In this context write a report including the following sections:

1. Introduction about ransomware attack and their impacts on the society.

2. Discussion of any three recent variants of ransomware attacks.

3. The working mechanism of ransomware.

4. Potential threats posed by ransomware.

5. Summary

6. References in Harvard style.

Assessment 2: Applied Project

Assessment Details: This assessment is designed to assess your technical skills in investigation IS security, risk threats and management to an organization. The assessment is also assessing your skills to evaluate risk management techniques and IS auditing. You are required to select an organization that uses information systems to perform daily business operations. You have to identify the most valuable assets for the organisations and investigate the security threats and mitigation techniques. You have also to propose/evaluate the risk management techniques adopted by the selected organization to ensure the reliability, confidentiality, availability, and integrity. You have also to discuss audit plan and processes used by the organization and investigate the impact of human factors on security and risk management.

Task Specifications - This assessment includes two tasks as follows:

Task-1: Each group should select an organisation. The organization must provide information systems services to the staff and customers. You have to write a report to answer the followings related to the selected organization:

1. Network devices are highly vulnerable and can be exposed. Discuss two types of threats against network routers/switches of the selected organization. Illustrate how these devices are vulnerable to destruction and abuse.

2. Propose with justification two types of network security devices can be used to control security and mitigate threats related to the web and email servers.

3. Assume the organization used Windows server 2016 to host the organization web site. Discuss how the organization can ensure the availability of the web service using windows server 2016.

4. Discuss the impact of employee on information security of the selected organization. Provide risk management recommendation to reduce the risk of employee.

5. Windows server 2016 supported with different tools for auditing. Illustrate windows server 2016 auditing tools and discuss how they can be used by the selected organization to monitor and analyzing the web server and email server problems.

You may need to make some assumptions with the required justifications. Please note you have to use Harvard reference style.

Task 2: Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. Use Steghide tool available in Kali Linux to hide a text file that includes the group students names and IDs on APIC logo image (Use: SBM4304 as passphrase). In your report, you have to provide screenshot demonstrate the steps you followed during the process of installation of Steghide, and the way you use to hiding group information text file into APIC logo image and finally the steps to extract the text file from APIC logo image for verification of your work.

Submission - You have to submit two files:

1. Report in word format for Task-1 and Task-2 processes.

2. APIC logo image that includes your group information for Task-2.  The two files must be submitted separately not in single compress file.

Note - In that assessment 2 applied project need to make logo of college you can get from website of college. In this section task 2 just need the screen shot being posted and procedures of steganography and need the files of task 2 those Linux files and process where you will be using logo or image of APCI college inside the logo there need our group members name and id and need the file of vmware kali linux.

Attachment:- IS Security and Risk Management Assignment File.rar

Reference no: EM132368156

Questions Cloud

Determine the value of cash provided by operating activities : Determine the dollar value of cash provided or used by operating activities. If the total is a use of cash, enter as a negative number.
Determine the contribution margin ratio : Lauder Company had fixed costs of $282,500, variable costs of $645,000, and actual sales amounted to $1,100,000. If the company has a break-even point.
What is the stockholders equity of each company : What is the stockholders equity of each company? The total assets and total liabilities of Keurig Green Mountain Coffee, Inc., and Starbucks Corporation are.
Show budgeted balance sheet for the end of december : Show budgeted income statements for November and December. Show budgeted balance sheet for the end of December.
Applied Project - make logo of college : SBM4304 IS Security and Risk Management Assignment, Asia Pacific International College, Australia. Applied Project - make logo of college
Remind the audience of the importance or value : Sentence-Level Speaking Outline Structure - Explain why the topic is important for graduate recruits in engineering/management
Discuss the advantages and disadvantages of making system : Provide a recommendation to Tilly's Pet Supplies as to whether making or buying a new system is most appropriate for their business, with a justification.
How much cash is being held by gge enterprises inc : On November 1 of the current year, Rob Elliot invested $31,000 of his cash to form a corporation, GGE Enterprises Inc., in exchange.
How is transmitted from one neuron : How is transmitted from one neuron to another the message that the action potential carries from the receptor?

Reviews

len2368156

9/9/2019 3:59:55 AM

Applied project - Reporting a relating security audits and controls, and risk management techniques. The report will include risk analysis of the identified risks and threats and the impact of human factors on security and risk management. Week 11 applied project - in that applied project you need to make logo of my college you can get from website of my college i hope i will get all done. In this section task 2 just need the screen shot being posted and procedures of steganography and i will need the files of task 2 those linux files and process where you will be using logo or image of apic college inside the logo there need our group members name and id no ... the password as given at task 2 as SBM4304 i will need the file of vmware kali linux.

len2368156

9/9/2019 3:59:47 AM

Submission - you have to submit two files: 1. report in word format for Task-1 and Task-2 processes. 2. APIC logo image that includes your group information for Task-2 .(make sure to use: SBM4304 as passphrase). The two files must be submitted separately not in single compress file. In completing this assessment successfully, you will be able to investigate IS security, risk threats and propose the suitable security controls, which will help in achieving ULO-1, ULO-2, ULO-3, ULO-4 , ULO-5, ULO-6 and ULO-7, this in turn will help you in achieving CLO-1, CLO-2, CLO-3, CLO0-4 and CLO-9, which collectively with other unit learning outcomes will help in achieving GA-52, GA-10, GA-11 and GA-12.

len2368156

9/9/2019 3:59:41 AM

Marking Information: The applied project will be marked out of 100 and will be weighted 20% of the total unit mark. Introduction is very well written, and the report outline is also discussed. Excellent discussion about threats with clear specifications related to routers/switches. A very clear and in- depth discussion about network security devices. Has excellent understanding and identification of techniques to improve the availability of the web service. Excellent understanding of impact of employee on information security. Excellent understanding and demonstration of audit process related to the selected sector. APIC logo image correctly include group details. Screenshot is provided using Steghide with correct result. A section very clearly summarizing the overall contribution. Clear styles with excellent source of references.

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd