ICT security including security planning and policy

Assignment Help Other Engineering
Reference no: EM132518632 , Length: word count:2500

ITC358 IT Security - Charles Sturt University

Learning outcome 1: be able to explain fundamental information security concepts;

Learning outcome 2: be able to discuss and debate some of the security implications of computer networks, including cryptography;

Learning outcome 3: be able to compare and contrast firewall technologies;

Learning outcome 4: be able to communicate factors that relate to host and data security including vulnerabilities and patches and data protection mechanisms;

Learning outcome 5:be able to evaluate some of the key application security concepts and practices;

Learning outcome 6: be able to explain and debate issues and concepts related to management of ICT security including security planning and policy development.

Assessment item - Essay questions and hands-on task

A. Essay Questions
Write minimum 600 words for each of the following two short-essay questions. Both the questions are of equal value (25 marks each). You should provide credible references for each Problem according to the Faculty guidelines. Although there is no rigid maximum word limit, around 850 words maximum, per Problem will be appropriate.

Problem 1

Research the issue of insider threat in the context of information security and report your findings. Your report should include the following details: what insider threat means, what motivates it, types of threats involved and how to counter it.

Problem 2
Explain with a suitable example, how the Diffie-Hellman key agreement can be used for key negotiation, where more than two participants are involved. Can an attacker who captures the exchanged keying information compute the symmetric session key?

B. Hands-on Task
Port scanners usually generate lists of open, closed, and filtered ports for each scanned IP address and the information is used to identify network vulnerabilities.

In this task, you will run a simple port scan on your computer using the 'Port Scanner' produced by SolarWind. To complete this task, please follow the instructions given below.

Step 1. Download 'Port Scanner'

Step 2. Run portscanner.exe

Step 3. Under 'Scan Configuration', use your IP address in the 'Hostname and IP Address Ranges' box.

Step 4. Complete/select the remaining configurations for 'Port Ranges', 'Protocol' etc. Step 5. Now take a screenshot of your 'Scan Configuration'.
Step 6. Click on the 'SCAN' button to start scanning.

Step 7. Take a screenshot once the scan is complete.

Step 8. Using the 'SAVE RESULTS' tab, save the scan results in a .csv file. Take a screenshot of this scan report.

Assessment item - Research Report

TASK

Research the security and privacy issues associated with IoT, in the context of cybersecurity and write a report documenting your findings. Your report should include the following:

- Introduction
- Background
- Security and privacy concerns associated with IoT
- Strategies for addressing the concerns
- Conclusions and future trends

RATIONALE
This assessment task will assess the following learning outcome/s:
• be able to explain fundamental information security concepts.
• be able to discuss and debate some of the security implications of computer networks, including cryptography.
• be able to communicate factors that relate to host and data security including vulnerabilities and patches and data protection mechanisms.
• be able to evaluate some of the key application security concepts and practices.
• be able to explain and debate issues and concepts related to management of ICT security including security planning and policy development.

Attachment:- IT Security.rar

Reference no: EM132518632

Questions Cloud

About assistive input devices : Research the web to find information about assistive input devices, such as voice recognition and larger keyboards.
Confidence interval for the proportion of world campus : Construct a 95% confidence interval for the proportion of World Campus STAT200 students overall that have a dog.
What amount should the company report as cost of sales : How much is the total current assets of ABC's December 31, 2016 balance sheet? What amount should the company report as cost of sales?
Enhance your presentation or distract your audience : You will discuss your experiences using pictures in your PowerPoint 2016 presentations. Do they enhance your presentation or distract your audience?
ICT security including security planning and policy : Explain and debate issues and concepts related to management of ICT security including security planning and policy development.
Compute the probability that the sample mean : Let 1, 2, . . . , n form a random sample of size from some probability distribution with mean and variance 2. If is greater than 60,
Cisco networking devices : Describe your knowledge of and experience with this device. What did you know about it before your studies this week, and what did you know about it after?
Speculate on the relationship between x and y : Draw a scatter Diagram and speculate on the relationship between x and y
Should the project be undertaken and why or why not : Calculate the Net Present Value (NPV) of this project assuming the firm's weighted average cost of capital (WACC) is 12%. should this project be undertaken

Reviews

Write a Review

Other Engineering Questions & Answers

  Discuss advantages of working for each gender

Discuss from your personal point of view the advantages/disadvantages and like/dislike of working for each gender. Use real life experiences if applicable

  Discuss to conduct patent search on the technology

Conduct Patent Search on the technology and key referenced patents - Describe these patents claims / novel features / broad or specific claims ?

  Circuit in multisim and run a single frequency analysis

Consider the circuit demonstrated in this week's presentation. Analyze the circuit to determine the following (include both polar and complex forms where applicable):

  Determine the magnitude of the force on the plate

Water discharges at a rate of 5L/s through a nozzle. The jet, 25 mm in diameter, strikes a flat plate held perpendicular to its line of flow. Determine the magnitude of the force on the plate

  Question regarding the temperature of the mixture

In a shower, cold water at 10°C flowing at a rate of 5 kg/min is mixed with hot water at 60°C flowing at a rate of 2 kg/min. The exit temperature of the mixture is

  Analyse the load vs time graphs and maximum demand

Obtain and analyse the load vs time graphs and maximum demand for each case - plotting the time Vs load curve from the 30 min profile under each case

  Describe specific observational methods

Describe specific experimentation and observational methods that could be used within your discipline to gather data. Include your rationale.

  Determine the discharge that could be collected

Determine the discharge that could be collected from the infiltration gallery of Example if the water level was maintained at a 2-ft depth within the gallery.

  Describe the born technique

Explain what parent-child relations are in Solidworks and why they are important in your own words,Describe the BORN technique your own words?

  What is the population equivalent of the waste

What is the population equivalent of the waste and what degree of treatment (% BOD satisfied) does this represent, assuming the plant influent to have a BOD5 of 250 mg/L

  Compute flow in each pipe

Using the HAESTED Methods Software (water cad), and the available base map compute flow in each pipe, the pressure at each node and the HL in each pipe. The following design values should be used

  Derive an equation for the discharge per unit

Assume that the discharge is a function of the weir height P, the head above the crest H, the acceleration of gravity g, and the kinematic viscosity V.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd