CIS7028 Information Security Assignment

Assignment Help Computer Engineering
Reference no: EM132495958

CIS7028 Information Security - Cardiff Metropolitan University

Learning Outcome 1: Critically discuss the threats to information storage within a system and appreciate the main types of computer crime
Learning Outcome 2: Appraise approaches to information security and forensic investigation of prominent cyber offences;
Learning Outcome 3: Analyse the technical issues relating to the transmission and storage of data and information relating to Cloud Computing and Big Data
Learning Outcome 4: Discriminate between data management policies associated with Data Protection and the Regulation of Investigatory Powers.

Assessment Requirements

Task 1 (2000 words):Choose one of the activities described below.

Activity 1

Assume you have been hired as a security consultant by a large scale enterprise to provide them below information and recommendations. The enterprise's Chief Information Officer (CIO) has recently come to know about ISO27001 and wants to know your opinion about alternative standards, its wider benefits to the organization, how to implement the critical elements of ISO27001 and auditing and certification process. Prepare a report covering below details.
Task 1.1 (750 words):
• Alternative standards (Cyber essentials) and wider benefits of ISO27001 to the organization
Task 1.2 (1000 words):
• Main clauses need to implement under ISO27001 (750 words)
• Security control objectives applicable for the chosen company (250 words)
Task 1.3 (250 words):
• Auditing and certification process of ISO27001

OR

Activity 2 (2000 words)
Data protection by design/default: Compile a report explaining how you would implement Data protection by design and defaultfor a chosen company. The company can be any size which holds personal data of customers, clients, suppliers and employees.
Task 2.1 (1000 words):
• The implementation of Data Protection by Design and Default for the chosen company
Task 2.2 (1000 words):
• The use of below mechanisms for the chosen company to implement data protection by design and default: Data discovery, Data classification, Data Processing Impact Assessment (DPIA), Data Loss Prevention (DLP) mechanisms and Privacy Enhancing Technologies (PETs)

Task 2 (1500 words):Write a report about a recent information security attack/breach (which took place recently, January 2019 onwards). Thedescription should contain a brief description of the attack, loss to the organization, details of the vulnerability exposed by the attack (e.g.; CVE), how the attack was manifested (e.g. illustration), the tools used by the attackers and prevention mechanisms which could have stopped the threat or the vulnerability. Sample References:

Task 3 (Continuous assessment using 8 Cisco Cyber Essential labs and immersive labs): Security awareness (Cisco Cyber security essentials training). Students has to complete 8 Chapters of above training (both theoretical and practical aspects) during tutorials and average mark of chapter Quizzes will be taken into account. Students has to complete the final quiz as well. In addition, immersive labs has to be completed by the students.

Attachment:- Information Security.rar

Reference no: EM132495958

Questions Cloud

What do you think are the greatest ills in your own society : Discuss what you've learned from the readings in Chapter 6 about the common characteristics of the healthiest (physically, mentally, spiritually, etc).
Explain how the life model can be applied for the population : When looking at the gaps, explain which theory might be helpful in filling the gaps of the life model when working with this population.
MULT1015 Applications in Context Assignment : MULT1015 Applications in Context Assignment Help and Solution - Australian College of Applied Psychology, Australia. Contemporary Issues Journal Article Review
How you fit into the profession of teaching psychology : A statement of teaching philosophy is not just a personal declaration on teaching meant for prospective employers. In addition to defining your personal beliefs
CIS7028 Information Security Assignment : CIS7028 Information Security Assignment help and solution, Cardiff Metropolitan University - assessment writing service - Critically discuss the threats
Is person centered therapy by carl rogers : Is person centered therapy by Carl Rogers considered non-scientific?
How has the direction of effort varied in different sport : How has the direction of your effort varied in different sport, physical education, or exercise settings? Provide some examples.
Define the elements generally found in rhetorical writings : List and define the 3 types of rhetoric in Roman letters according to Klein, Blomberg, and Hubbard. List and define the 6 elements generally found in rhetorical
What motivates us to move from one stage to the next : In Maslow's hierarchy of needs, what motivates us to move from one stage to the next?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Q1 design a digital chebyshev-ii filter that satisfies the

q.1 design a digital chebyshev-ii filter that satisfies the following

  Write a program with a base class thet has a pure virtual

Write a program with a base class thet has a pure virtual function SALARY, and two derived classes.

  Give good justification that it is correct and that it runs

Give good justification (not a proof) that it is correct and that it runs in the prescribed time bounds.

  Produce the collection of sets

COP 4020 Assignment cparse. Read in a start symbol of a set of productions followed by set of productions from stdin and produce collection of sets of LR(0)

  What would you say in the policy

You have been asked to draft a corporate usage policy regarding the use of instant messaging. The policy should encourage the use of IM and chat.

  Program showing duplicate values in an array

Write down a program in C in order to show the duplicate values in an array, Documentation and Naming Style Sheet should include: Description of what program does, Summary of the problem's specifications and assumptions.

  Identify a data set on entities where you have some sense

Identify a data set on entities where you have some sense of natural clusters which should emerge, be it on people, universities, companies, or movies.

  Prepare an html document that describes an ordered list

Prepare and test an HTML document that describes an ordered list with the following contents: The highest level should be the names of your parents.

  Describe at least two cryptocurrencies with the examples

The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain.

  Assume a direct access file consists of sectors

assume a direct access file consists of sectors with 1024 byte capacity. Suppose also that records are 32 bytes long. On which logical sector do the following logical records lie? What is the relative record number in the sector?

  Why do think all of basic it skills are necessary

A digital forensics professional must know basic IT skills, understand computer architecture and networking, and have analytical and investigative skills.

  What commands will you use to delete text

What commands will you use to delete text from the current cursor position to end of file and entire contents of file?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd