ICT security including security planning and policy

Assignment Help Other Engineering
Reference no: EM132518632 , Length: word count:2500

ITC358 IT Security - Charles Sturt University

Learning outcome 1: be able to explain fundamental information security concepts;

Learning outcome 2: be able to discuss and debate some of the security implications of computer networks, including cryptography;

Learning outcome 3: be able to compare and contrast firewall technologies;

Learning outcome 4: be able to communicate factors that relate to host and data security including vulnerabilities and patches and data protection mechanisms;

Learning outcome 5:be able to evaluate some of the key application security concepts and practices;

Learning outcome 6: be able to explain and debate issues and concepts related to management of ICT security including security planning and policy development.

Assessment item - Essay questions and hands-on task

A. Essay Questions
Write minimum 600 words for each of the following two short-essay questions. Both the questions are of equal value (25 marks each). You should provide credible references for each Problem according to the Faculty guidelines. Although there is no rigid maximum word limit, around 850 words maximum, per Problem will be appropriate.

Problem 1

Research the issue of insider threat in the context of information security and report your findings. Your report should include the following details: what insider threat means, what motivates it, types of threats involved and how to counter it.

Problem 2
Explain with a suitable example, how the Diffie-Hellman key agreement can be used for key negotiation, where more than two participants are involved. Can an attacker who captures the exchanged keying information compute the symmetric session key?

B. Hands-on Task
Port scanners usually generate lists of open, closed, and filtered ports for each scanned IP address and the information is used to identify network vulnerabilities.

In this task, you will run a simple port scan on your computer using the 'Port Scanner' produced by SolarWind. To complete this task, please follow the instructions given below.

Step 1. Download 'Port Scanner'

Step 2. Run portscanner.exe

Step 3. Under 'Scan Configuration', use your IP address in the 'Hostname and IP Address Ranges' box.

Step 4. Complete/select the remaining configurations for 'Port Ranges', 'Protocol' etc. Step 5. Now take a screenshot of your 'Scan Configuration'.
Step 6. Click on the 'SCAN' button to start scanning.

Step 7. Take a screenshot once the scan is complete.

Step 8. Using the 'SAVE RESULTS' tab, save the scan results in a .csv file. Take a screenshot of this scan report.

Assessment item - Research Report

TASK

Research the security and privacy issues associated with IoT, in the context of cybersecurity and write a report documenting your findings. Your report should include the following:

- Introduction
- Background
- Security and privacy concerns associated with IoT
- Strategies for addressing the concerns
- Conclusions and future trends

RATIONALE
This assessment task will assess the following learning outcome/s:
• be able to explain fundamental information security concepts.
• be able to discuss and debate some of the security implications of computer networks, including cryptography.
• be able to communicate factors that relate to host and data security including vulnerabilities and patches and data protection mechanisms.
• be able to evaluate some of the key application security concepts and practices.
• be able to explain and debate issues and concepts related to management of ICT security including security planning and policy development.

Attachment:- IT Security.rar

Reference no: EM132518632

Questions Cloud

About assistive input devices : Research the web to find information about assistive input devices, such as voice recognition and larger keyboards.
Confidence interval for the proportion of world campus : Construct a 95% confidence interval for the proportion of World Campus STAT200 students overall that have a dog.
What amount should the company report as cost of sales : How much is the total current assets of ABC's December 31, 2016 balance sheet? What amount should the company report as cost of sales?
Enhance your presentation or distract your audience : You will discuss your experiences using pictures in your PowerPoint 2016 presentations. Do they enhance your presentation or distract your audience?
ICT security including security planning and policy : Explain and debate issues and concepts related to management of ICT security including security planning and policy development.
Compute the probability that the sample mean : Let 1, 2, . . . , n form a random sample of size from some probability distribution with mean and variance 2. If is greater than 60,
Cisco networking devices : Describe your knowledge of and experience with this device. What did you know about it before your studies this week, and what did you know about it after?
Speculate on the relationship between x and y : Draw a scatter Diagram and speculate on the relationship between x and y
Should the project be undertaken and why or why not : Calculate the Net Present Value (NPV) of this project assuming the firm's weighted average cost of capital (WACC) is 12%. should this project be undertaken

Reviews

Write a Review

Other Engineering Questions & Answers

  Characterization technology for nanomaterials

Calculate the reciprocal lattice of the body-centred cubic and Show that the reciprocal of the face-centred cubic (fcc) structure is itself a bcc structure.

  Calculate the gasoline savings

How much gasoline do vehicles with the following fuel efficiencies consume in one year? Calculate the gasoline savings, in gallons per year, created by the following two options. Show all your work, and draw boxes around your answers.

  Design and modelling of adsorption chromatography

Design and modelling of adsorption chromatography based on isotherm data

  Application of mechatronics engineering

Write an essay on Application of Mechatronics Engineering

  Growth chracteristics of the organism

To examine the relationship between fermenter design and operating conditions, oxygen transfer capability and microbial growth.

  Block diagram, system performance and responses

Questions based on Block Diagram, System Performance and Responses.

  Explain the difference in a technical performance measure

good understanding of Mil-Std-499 and Mil-Std-499A

  Electrode impedances

How did this procedure affect the signal observed from the electrode and the electrode impedances?

  Write a report on environmental companies

Write a report on environmental companies

  Scanning electron microscopy

Prepare a schematic diagram below of the major parts of the SEM

  Design a pumping and piping system

creating the pumping and piping system to supply cool water to the condenser

  A repulsive potential energy should be a positive one

Using the data provided on the webvista site in the file marked vdw.txt, try to develop a mathematical equation for the vdW potential we discussed in class, U(x), that best fits the data

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd