Reference no: EM13763995
Information Security
Module Overview:
A computer forensics investigator needs to develop an understanding about security standards and formal procedures within an organisation. This module will provide knowledge in addressing issues around security in the organisational environment. This module aims to introduce the main concept areas around information security and assurance.
Learning Outcomes:
On successful completion of this module, you will be able to:
1. Evaluate the available techniques to secure and manage an information system in a corporate environment.
2. Understand the challenges and evaluate the risks in managing the security of an information system
3. Critically analyse using a threat and risk assessment.
Title: Security Issues
Assignment
• Evaluate the available techniques to secure and manage an information system in a corporate environment.
This will be a report-based assignment, where you will discuss and evaluate issues in information security. Specifically, you must attempt the following tasks...
(a) Describe and critically evaluate the information security techniques available to secure the hardware and operating system platform that supports higher-level applications.
(b) Describe and critically evaluate the information security techniques available to a database administrator, including the tools and technique available to examine historical user actions.
(c) Describe and critically evaluate the information security techniques available to a network engineer in configuring web and email communications, including the option of anonymous communication.
For each task you should be prepared to do your own further research to find additional explanations, diagrams or examples that support or extend the techniques covered in the unit or perhaps alternative techniques not raised in the unit. In either case, as well as describing the technique, you must clearly evaluate its strengths, weaknesses and suitability.
Which eras were only the u.s. colleges can access internet
: Which of the following eras were only the U.S. government, colleges, and universities able to access the Internet?
|
Explain should employers be permitted to discriminate
: Not all discrimination is prohibited by law. For example, employers routinely discriminate between potential employees based upon education or experience. Should employers be permitted to discriminate based upon attractiveness
|
How this topic fits within the field of criminal justice
: Introduction concluding with your thesis statement, Discussion of key terms, How this topic fits within the field of criminal justice/criminology
|
The central nervous system and immunosation
: Explain how the spread of the infection within a population can be limited by immunization and other measures and the consequences of a zoonotic disease pool for herd-immunity.
|
Security issues
: A computer forensics investigator needs to develop an understanding about security standards and formal procedures within an organisation.
|
How is a deposition different from expert testimony
: How is a deposition different from expert testimony and What are the top 5 things you should do during a deposition
|
How is a deposition different from expert testimony
: How is a deposition different from expert testimony and What are the top 5 things you should do during a deposition
|
Why change the default administrator login and password
: what are some of the important measures you can take to ensure that your home wireless network is safe and secure. Change the default administrator login and password. Use something only you will remember.
|
Explain five defining features of modernism and renaissance
: Explain five defining features of Modernism, Post Modernism, Classicism, Renaissance, Enlightenment, Naturalism, Romanticism and Realism.
|