Critically evaluate a range of pertinent security risks

Assignment Help Other Subject
Reference no: EM133079025 , Length: word count:4000

COM6003 Computer Systems Security - Arden University

Assignment Brief: As part of the formal assessment for the programme you are required to submit a Computer Systems Security assignment. Please refer to your Student Handbook for full details of the programme assessment scheme and general information on preparing and submitting assignments.

Learning Outcome 1: Demonstrate a conceptual understanding of common security risks and recognise the importance of risk analysis within different IT environments.

Learning Outcome 2: Demonstrate a systematic understanding of the key approaches to cryptography and their application

Learning Outcome 3: Critically evaluate relevant literature with regard to notable security issues.

Learning Outcome 4: Create a risk analysis for a given scenario with reference to compliance with security policies

Learning Outcome 5: Critically evaluate legal, social and ethical issues of secure systems.

Responsible Global Citizenship - Understand global issues and their place in a globalised economy, ethical decision-making and accountability. Adopt self-awareness, openness, and sensitivity to diversity in culture.

Your assignment should include: a title page containing your student number, the module name, the submission deadline and a word count; the appendices if relevant; and a reference list in Arden University (AU) Harvard format. You should address all the elements of the assignment task listed below. Please note that tutors will use the assessment criteria set out below in assessing your work.

Maximum word count: 4,000 words

Assignment Task

To make this assignment more relevant and interesting for you, you will select your own real- world organization (and thus case study) and then apply the concepts and techniques you have learned from this module to that case study. The case study you select must not have been used by you, or any other student, in any other module current or historic. Please ensure you check your selected organization and the scope of the case study with your tutor before starting.

Your selected organization for this case study intends to upgrade their current IT infrastructure to meet the organizational IT needs in the 21st century. You have an option of using a technology of your choice or technologies such as Internet of Things, Cloud Computing, Content Centric Networking, or Software Defined Networks for this upgrade. You as an IT Lead have been asked to write a report for the management justifying viability of the proposed future IT infrastructure in the context of its security.

Assessment Task 1

a) Discuss briefly the profile of your selected organization, its existing IT infrastructure, and pertinent issues with the current infrastructure to justify the need for an infrastructure upgrade.

b) Identify and justify the choice of technology (or technologies) you are proposing to use to upgrade the IT Infrastructure of your selected organization. You are expected to briefly compare technologies to justify your choice.

c) In the context of proposed future IT infrastructure for your organization, discuss critical assets (including information assets) that will need protection, and list vulnerabilities related to each of the identified assets.

Assessment Task 2

a) Risk analysis lies at the heart of any successful IT project. Through arguments backed by literature, justify the importance of risk analysis phase in any IT project. Also discuss what risk analysis process in relation to IT infrastructure projects entails.

b) Critically evaluate a range of pertinent security risks posed to the selected organization in context of their proposed IT infrastructure upgraded through the technology of your choice. Also, briefly discuss the proposed protection against those risks.

c) Conduct a detailed risk analysis of your organization based on the risks evaluated in Task 2b.

Assessment Task 3

a) Critically evaluate key aspects of the security policy of your selected organization (or an organization of a similar profile and size) also discussing how effective the policy is in protecting against security risks evaluated in Task 2b.

b) Cryptography acts as a key measure in tackling a range of security threats. Discuss a cryptographic approach (or a combination of approaches) you are proposing for your organization to adopt and justify your choice by briefly comparing your approach against other available approaches. Explain in what areas of your organization's future IT infrastructure you will use the proposed cryptographic approach.

Assessment Task 4

a) Provide a brief assessment of the security of your proposed IT infrastructure using layered security approach.

b) Critically evaluate legal, social and ethical issues in relation to the security of proposed IT infrastructure.

Reference no: EM133079025

Questions Cloud

Market rate of substitution between good x and good y : Suppose a consumer with an income of $800 is faced with Px =$7 and Py =$2. What is the market rate of substitution between good x (horizontal axis) and good y (
Efficiency of the market economy : How do firms contribute to the efficiency of the market economy in ways that networks of independent contractors do not? Use your organization, or one with whic
Providing logistic services : The Liam and Vince cargo company is providing logistic services within the Luzon area. The company is growing and they need additional delivery trucks to meet d
Prepare an analysis of the current situation : Based on the above information prepare an analysis of the current situation and the alternative as suggested by the Executive Chairman
Critically evaluate a range of pertinent security risks : Create a risk analysis for a given scenario with reference to compliance with security policies and Critically evaluate legal, social and ethical issues
What are the materials requirements : The company estimates it will sell 83,000 units of this item. The beginning finished goods inventory contain 28,000 units. What are materials requirements
What amounts will you and your sister have : You annually invest $1,500 in an individual retirement account (IRA) starting at the age of 25. What amounts will you and your sister have at age 60
Emerging technologies transform organizations : Explain how evolving demographics and emerging technologies transform organizations.
Determine the amount and character of gains or losses : At the time of sale, ABC Corporation had an adjusted basis in the property of $ 250,000. Determine the amount and character of gains or losses

Reviews

Write a Review

Other Subject Questions & Answers

  What are the political dimensions of the play

Butterfly arrives with friends and rela- tives, greeting Pinkerton and showing him her paltry belongings,including the dag- ger her father used to kill himself.

  What are the different types of perception

What are the different types of perception? How do the different types of perception come together to determine cognitive functioning? Is it possible for a person to function cognitively solely on one type of perception? Explain why or why not.

  Discuss types of administrative agencies exceeds the volume

Legal scholars have pointed out that " the sheer volume of law generated by all types of administrative agencies exceeds the volume produced by both

  Identify a business in your local community

Identify a business in your local community. This can be your current place of employment or a business with which you are familiar. Identify the potential ethical implications associated with this decision

  Compare the advantages and disadvantages of a paper

Compare and Contrast the advantages and disadvantages of paper- based shipping container, a wood-based shipping container and plastic-based shipping container.

  Differences between prejudice and discrimination

In sociology, what is the major differences between Prejudice and Discrimination? Please explain adequately and with references.

  Enforceable traditional contract or an e-contract

What are the four elements necessary to form an enforceable traditional contract or an e-contract? What affect does lack of contractual capacity have on any of the three elements? How might a deficiency in contractual capacity, related to contract fo..

  Evaluate how successful the author was in convincing

Clearly state in your own words the "surprise ending" in the reading you selected. Clearly identify the point in the reading when you realized that there were elements in the reading that surprised you. Not all of the surprises come at the end.

  What are three sales promotion strategies

What are three sales promotion strategies? Compare and contrast the three strategies and use one product to illustrate each strategy.

  Analyze the company diversity citing of ethical theories

Analyze the company's diversity citing one of the ethical theories or approaches ...are they really a diverse company or not? Cite the theory/approach.

  What are strengths and weaknesses to the theory of nursing

What are characteristics of a human becoming nurse? What are strengths and weaknesses to this theory of nursing? What challenges exist for healthcare.

  Edwards rule pertaining to police interviewing-interrogation

Briefly discuss the impact of the Edwards Rule pertaining to police interviewing and interrogation.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd