Security of information in business organisations

Assignment Help Computer Network Security
Reference no: EM13312132

Assignment 1 - Research Essay

1. Assignment 1 requires you to complete a research essay about information security.  The research provides you with the opportunity to complete research and demonstrate knowledge of information security from a theoretical perspective. You will be required to complete and submit an essay on below of the topics listed below:

Topic: Security of information in commercial or business organisations.

2. The length of the essay should be 2,500 words

3. The research essay must contain the following:

  • Table of contents that covers all aspects of the assignment topics (see below).
  • Definitions and descriptions of the terms, 'integrity', 'availability' 'confidentiality', 'authenticity' and 'non-repudiation' in relation to the security protection of information assets in the chosen topic environment, i.e. what is it about these assets that must be protected?
  • Definitions of human (people), technical (for example intangible magnetic data held on a computer) and physical (tangible objects such as the computer hardware and a printed document) information assets at potential risk in the chosen topic environment.
  • Threats inherent in the chosen topic area: for example, malware and Trojan horses, hackers, insider risks (social engineering) and threats, physical weaknesses - refer to the weekly lecture topic notes and recommended readings).
  • Implications of the threats that put organisations at risk.
  • Suggested counter-measures (including technical, physical AND personnel counter- measures).
  • References that are cited thoroughly in the essay - use EndNote, if you wish. This is available from the Library, free of charge. APA 5th should be used.

4. The marking guide shown above and often disregarded by a percentage of students is yet it is not a bad template on which to base your essay.  It shows the marking structure of the essay and defines what you should comply with to maximise your grade. Please include the marking sheet at the beginning of your essay along with the coversheet. This speeds up the marking process and ensures you get your paper graded promptly.

5. You will also be assessed on the presentation of your essay, as well as the contents.  Marks will not be awarded where correct referencing is not used and will also not be awarded where the above instructions are not followed.  All assertions by other authors must be correctly referenced.  Please restrict your own comments to observations about the work of authors you are quoting.  Your own world view and statements of unsubstantiated facts (that are not referenced) do not earn marks.

6. For Assignment 1, the Research Essay must be fully referenced where the assertions of other authors are being used and must first be submitted to Turnitin before it is submitted to LMS as a completed assignment. The Turnitin account that will have been prepared for you by the Unit Coordinator and available through the Unit LMS site.

Verified Expert

Reference no: EM13312132

Questions Cloud

Find the velocity of the wood : A block of wood of mass 4.85 kg rests on a horizontal frictionless surface. find the velocity of the wood after the bullet has passed through
What is the fluid velocity in the pipe in feet per second : Water enters a pipe at 100 psig and 70 degrees F. The density of water under these conditions is 62.3 lbm/ft^3. The pipe has an inside diameter of 4.5 inches. The mass flow rate of the water is measured to be 7500 lbm/hr.
What is level of service before and after the development : A divided multilane highway in a recreational area (fp = 0.90) has four lanes (two lanes in each direction) and is on rolling terrain. The highway has 10-ft lanes with a 6-ft right-side shoulder and a 3-fl left-side shoulder.
What is the acceleration of the two teams : Two teams of nine members each engage in a tug of war. The first team's members have average masses of 65 kg and exert average forces of 1350 N horizontally. What is the acceleration of the two teams
Security of information in business organisations : Definitions and descriptions of the terms, 'integrity', 'availability' 'confidentiality', 'authenticity' and 'non-repudiation' in relation to the security protection of information assets in the chosen topic environment, i.e. what is it about thes..
Estimate the inside diameter and wall thickness of the pipe : Estimate the inside diameter, wall thicknes and outside diameter of the pipe. The carbon steel pipe has tensile yield strength of 250 MPa. Assume safety factore of 2 and a corrosion allowance of 2mm. The maximumoperating pressure (MOP) is 55 bar.
Determine what is the maximum elevation of the reservoir : If a 100 horsepower pump is used to pump water (rho = 1.94 slugs/ft3) from a lake to a raised reservoir what is the maximum elevation of the reservoir above the lake if the pump operates at 30 cubic feet per second
Evaluation of capital budgeting project : Provide a critical evaluation of the relevant techniques and recommend an appropriate techniques to be applied -
Describe a minimum of three heuristics to optimize queries : Your supervisors and customers are very impressed with the database you have put together. Describe a minimum of three heuristics to optimize Queries.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd