COM713 Cyber Security Application Assignment

Assignment Help Computer Engineering
Reference no: EM132845942 , Length: word count:3000

COM713 Cyber Security Application - Solent University

Cyber Security Application Portfolio

Assessment Task

A Portfolio is a way of demonstrating your learning by giving examples from each of the weekly learning sub-modules. These can include written descriptions of a practce, screenshots , terminal outputor ther evidence of knowledge or skills. In other words, your portfolio should contain about 7 to 10 headings corresponding to the concepts in the weekly schedule.

As a motive to writing your portfolio imagine a context, like a company or organisation you work for. For example consider the following scenario (you can pick another if you like as a frameork for your system security portfolio):

Pandemic Watch is a crowsourced medical early-warning organisation supplying analysis of reported disease outbreaks, and giving press reports of fact checked health emergencies for government or NGO use. Data sources may come from GPs, epidemiologists and sensitive (leaked) information from other sources whose anonymity may need protecting. The organisation has many potential threat vectors, enemies, foreign and domestic, online and offline, thus the organisation is a high exposure target for disinformation and manipulation

As a member of the software security and privacy task force you are to audit and make recommendations for the transformation of their systems, policies and processes.

Alternatively you may choose your own fictional organisation with complex digital security needs - but you will need to explain why these risks are real in your analysis

Scope

You are to consider the areas of:

• Data storage, integrity, privacy, compliance.
• Secure communication for both organisational staff and clients
• System hardening, including servers, offices, and mobile devices
• Personnel and operational security

Your portfolio should include an understanding and appreciation of a range techniques related to the principles and technologies of cyber security in practical application. In particular you should demonstrate awareness of:

• Threat and vulnerability modelling, risk prioritisation
• Anticipation of emerging threats
• Access control, authorisation
• Defensive system design principles, in depth and breadth
• Scope, lifecycle, maintenance and sustainability
• Technologies, options for technical implementation
• Encryption for communications and storage
• Policies , monitoring, response plans
• Cost, roles, skills and human resources
• Trade-offs, compromises and push-backs

Presentation

A 3000 word concise technical report will for the basis of your portfolio, and it may include screenshots, terminal logs, tables, lists, flow diagrams, or any other appropriate graphics or formulae summarising key techniques and considerations. Emphasise the practical execution of auditing and hardening tasks and comment on difficulties or lessons learned.

Attachment:- Cyber Security Application.rar

Reference no: EM132845942

Questions Cloud

ECE 784 Biomedical Instrumentation Assignment : ECE 784/ ECE 884 Biomedical Instrumentation Assignment Help and Solution - University of New Hampshire, USA - Homework Help
Maximum stress allowed in compression parallel : The minimum size of post required to support the load if the maximum stress allowed in compression parallel to the grain is 1,200 psi.
Find the range of the values : During UEFA Euro 2016 competition the football national team with the lowest average age was England. The following table gives the ages of the 23 English footb
Make a two-way scatter plot for data : a. Make a two-way scatter plot for these data. b. Does Apgar score tend to increase or decrease as systolic blood pressure increases?
COM713 Cyber Security Application Assignment : COM713 Cyber Security Application Assignment Help and Solution, Solent University - Assessment Writing Service - Secure communication for both organisational
Present a frequency distribution for grades : Present a frequency distribution for grades in that unit (that is, find the number of students with HD, D, C,
Confidence interval for the average length : The average length of calls in this sample was 3.8 minutes with a standard deviation of 0.9 minutes.
Will the measurement of my blood pressure be biased : Will the measurement of my blood pressure be biased? Reliable? Valid? Explain your answer.
Assignment - Lab - Research a Hardware Upgrade : Assignment - Lab - Research a Hardware Upgrade - which RAM would you select? Be prepared to discuss your decisions regarding the RAM you select

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd