Reference no: EM13312132
Assignment 1 - Research Essay
1. Assignment 1 requires you to complete a research essay about information security. The research provides you with the opportunity to complete research and demonstrate knowledge of information security from a theoretical perspective. You will be required to complete and submit an essay on below of the topics listed below:
Topic: Security of information in commercial or business organisations.
2. The length of the essay should be 2,500 words
3. The research essay must contain the following:
- Table of contents that covers all aspects of the assignment topics (see below).
- Definitions and descriptions of the terms, 'integrity', 'availability' 'confidentiality', 'authenticity' and 'non-repudiation' in relation to the security protection of information assets in the chosen topic environment, i.e. what is it about these assets that must be protected?
- Definitions of human (people), technical (for example intangible magnetic data held on a computer) and physical (tangible objects such as the computer hardware and a printed document) information assets at potential risk in the chosen topic environment.
- Threats inherent in the chosen topic area: for example, malware and Trojan horses, hackers, insider risks (social engineering) and threats, physical weaknesses - refer to the weekly lecture topic notes and recommended readings).
- Implications of the threats that put organisations at risk.
- Suggested counter-measures (including technical, physical AND personnel counter- measures).
- References that are cited thoroughly in the essay - use EndNote, if you wish. This is available from the Library, free of charge. APA 5th should be used.
4. The marking guide shown above and often disregarded by a percentage of students is yet it is not a bad template on which to base your essay. It shows the marking structure of the essay and defines what you should comply with to maximise your grade. Please include the marking sheet at the beginning of your essay along with the coversheet. This speeds up the marking process and ensures you get your paper graded promptly.
5. You will also be assessed on the presentation of your essay, as well as the contents. Marks will not be awarded where correct referencing is not used and will also not be awarded where the above instructions are not followed. All assertions by other authors must be correctly referenced. Please restrict your own comments to observations about the work of authors you are quoting. Your own world view and statements of unsubstantiated facts (that are not referenced) do not earn marks.
6. For Assignment 1, the Research Essay must be fully referenced where the assertions of other authors are being used and must first be submitted to Turnitin before it is submitted to LMS as a completed assignment. The Turnitin account that will have been prepared for you by the Unit Coordinator and available through the Unit LMS site.
Find the velocity of the wood
: A block of wood of mass 4.85 kg rests on a horizontal frictionless surface. find the velocity of the wood after the bullet has passed through
|
What is the fluid velocity in the pipe in feet per second
: Water enters a pipe at 100 psig and 70 degrees F. The density of water under these conditions is 62.3 lbm/ft^3. The pipe has an inside diameter of 4.5 inches. The mass flow rate of the water is measured to be 7500 lbm/hr.
|
What is level of service before and after the development
: A divided multilane highway in a recreational area (fp = 0.90) has four lanes (two lanes in each direction) and is on rolling terrain. The highway has 10-ft lanes with a 6-ft right-side shoulder and a 3-fl left-side shoulder.
|
What is the acceleration of the two teams
: Two teams of nine members each engage in a tug of war. The first team's members have average masses of 65 kg and exert average forces of 1350 N horizontally. What is the acceleration of the two teams
|
Security of information in business organisations
: Definitions and descriptions of the terms, 'integrity', 'availability' 'confidentiality', 'authenticity' and 'non-repudiation' in relation to the security protection of information assets in the chosen topic environment, i.e. what is it about thes..
|
Estimate the inside diameter and wall thickness of the pipe
: Estimate the inside diameter, wall thicknes and outside diameter of the pipe. The carbon steel pipe has tensile yield strength of 250 MPa. Assume safety factore of 2 and a corrosion allowance of 2mm. The maximumoperating pressure (MOP) is 55 bar.
|
Determine what is the maximum elevation of the reservoir
: If a 100 horsepower pump is used to pump water (rho = 1.94 slugs/ft3) from a lake to a raised reservoir what is the maximum elevation of the reservoir above the lake if the pump operates at 30 cubic feet per second
|
Evaluation of capital budgeting project
: Provide a critical evaluation of the relevant techniques and recommend an appropriate techniques to be applied -
|
Describe a minimum of three heuristics to optimize queries
: Your supervisors and customers are very impressed with the database you have put together. Describe a minimum of three heuristics to optimize Queries.
|