Design security architecture for a business

Assignment Help Other Subject
Reference no: EM133082838

ICTCYS613 Utilise design methodologies for security architecture

Assessment Task

In this task, you are required to demonstrate your skills and knowledge by working through a number of activities and completing and submitting a project portfolio.
You will need access to:
• a suitable place to complete activities that replicates an ICT environment including computer and internet access
• ICTCYS613 Simulation Pack or access to information about your own business including its structure, procedures relevant to designing security architecture and relevant data
• your learning resources and other information for reference
• Project Portfolio
Ensure that you:
• review the advice to students regarding responding to written tasks in the IT Works Student User Guide
• comply with the due date for assessment which your assessor will provide
• adhere with your RTO's submission guidelines
• answer all questions completely and correctly
• submit work which is original and, where necessary, properly referenced
• submit a completed cover sheet with your work
• avoid sharing your answers with other students.
Activities
Complete the following activities:

QUESTION 1

Carefully read the following:
This assessment task requires you to design security architecture for a business using specific design methodologies.
This project can be based on the case study business in the ICTCYS613 Simulation Pack or you may like to base this on your own business, or a business you are currently working for or are familiar with. It is important that you can access information about the business including its structure, procedures relevant to designing security architecture and relevant data. Speak to your assessor to get approval if you want to base this on your own business or one you work for.

QUESTION 2
Planning
Make sure you are familiar with the business you are basing this assessment on and have read through the necessary background information and policies and procedures. For the case study business, this is all of the documents included in the ICTCYS613 simulation pack. If it's your own business or a business where you are working or are familiar with, it's important at this step that you have your business or case study approved by your assessor.
Complete Page 4 of your Project Portfolio for this unit.
Read through the requirements of Section 1 and 2 of your Project Portfolio.

QUESTION 3
Security architecture planning
You are now to complete Section 1 of your Project Portfolio.
When you complete Section 1, you need to:
• Analyse and report on the business' security requirements.
• Describe the data types that will be included in the security architecture.
Discuss industry standard design methodologies that can be used for security architecture.
Complete Section 1 of your Project Portfolio.
Submit your Portfolio to your assessor and if approved, you will move to the next step.

QUESTION 4
Security architecture design
You are now to complete Section 2 of your Project Portfolio.
When you complete Section 2, you need to:
• Design the security architecture to meet the business' needs using industry standard design methodologies.
• Demonstrate how your design uses industry standard methodologies and meets requirements.
• Submit all of your documentation associated with the security architecture design and seek feedback.
Complete Section 2 of your Portfolio.

QUESTION 5
Submit your completed Project Portfolio

Make sure you have completed all sections of your Project Portfolio, answered all questions, provided enough detail as indicated and proofread for spelling and grammar as necessary.

Attachment:- Design methodologies for security architecture.rar

Reference no: EM133082838

Questions Cloud

Draw a graph that shows the demand for attendance : 2. Are the New York Yankees correct when they claim that revenue sharing simply rewards teams that do not try to win?3.Suppose that each team in a league has a
Employ the aggregate demand and aggregate supply model : The Australia Federal Government established a AUD 2 billion grant to help sectors affected by the bushfires to get the support they needed to recover.
Explain the decreasing returns to scale : The following statements are either true or false. If true provide a proof. If false provide a counter example. Assume Y is non empty. You may use the aid of di
Calculations of accounting profit and economic profit : Henri quit his job as a teacher earning AUD 70,000 per year to start his own food kiosk business. To save on rent, Henri utilized his own property.
Design security architecture for a business : Design security architecture for a business using specific design methodologies and Analyse and report on the business' security requirements
Implicated in irrational decisions across multiple contexts : Sunk cost have been implicated in irrational decisions across multiple contexts. In the context of car usage, a typical rationalization:
Utilise design methodologies for security architecture : ICTCYS613 Utilise design methodologies for security architecture Assignment Help and Solution - List the principles of cyber security
Number of high school dropouts : In Loewenstein and Thaler (1989), the authors discuss a change in a West Virginia law that substantially reduced the number of high school dropouts.
Compute tommy economic profit : After advertising: Suppose that the price elasticity of demand equals 6. Can you compute Tommy's economic profit?

Reviews

Write a Review

Other Subject Questions & Answers

  Creating performance expectations for an expatriate

What cultural differences must be considered when creating performance expectations for an expatriate

  Maximum hydraulic conductivity in an aquifer

Using your knowledge of the two-dimensional, anisotropic forms of Darcy's Law, estimate the magnitude and direction of groundwater flow at this site. Sketch a conceptual model of this situation, show all calculations and results.

  Elements of the us health care system

lists the top five elements of the US health care system that most need reform - Justify your choices through a logical analysis of the elements impact

  Is it ever acceptable to make threat that involves violence

Sherman made some threats and claims he could not prove. What were they? Was doing this a good strategy? Is it ever acceptable to make a threat that involves physical violence?

  Discuss how the winner-take-all economy was made

Discuss how the winner-take-all economy was made? Discuss how we can renew Democratic Capitalism and beat the winner-take-all political problem?

  Identify and discuss five period of juvenile justice history

Identify and discuss the five periods of juvenile justice history and which period you think was the most influential to the evolution of the juvenile justice system.

  Explain the role of hormones in normal body functioning

Explain the role of hormones in normal body functioning. Evaluate the impact of the various classes of psychoactive drugs on human thought and behavior

  Draw a swimlane diagram for that process

understand the ABC Pty Ltd case - should list the report topics using decimal notation. Need to include the main headings and subheadings with corresponding

  If not describe the alternative means used for assessing

in 1965 sir austin bradford hill proposed guidelines for assessing causality. his intention was not for these to be

  Discuss the humanist movement

Discuss the Humanist Movement. When and where did it start? Why? How are Humanist changes reflected in the art and society of the Renaissance? Touch upon some of the major events occurring at this time that influence these changes? What role did r..

  What is the history of right to work laws

What is the history of 'Right to Work' laws? Where did they come from? Who proposed them and why? Has their purpose or effect changed since original inception?

  Participating provider agreement assignment-healthcare law

Participating Provider Agreement Assignment-HealthCare LAW, capacity as chief negotiator for Independence Hospital

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd