CIS2005 Assignment 2 Description Marks out of Wtg(%) Word limit Due date Assignment 2 100 15 1500 31 AUGUST 2018 SPECIFICATION This assignment 2 assesses the following course objectives: 1. analyse...

1 answer below »
CIS2005 Assignment 2
Description
Marks out of
Wtg(%)
Word limit
Due date
Assignment 2
100
15
1500
31 AUGUST 2018
SPECIFICATION
This assignment 2 assesses the following course objectives:
1. analyse information security vulnerabilities and threats and determine appropriate controls that can be applied to mitigate the potential risks
2. communicate effectively both written and orally about the management of information security in organisations.
This assignment 2 written report requires you to provide written answers to Tasks 1 and 2 that are supported by in text referencing and a reference list
Task 1 Role of people in operational security (40 marks)
Review the current literature on the role of people in operational security as a potential risk to information assets versus a potential aide to improving security in organisations
Task 1.1 Identify and describe two ways people could intentionally or unintentionally compromise the information technology and communications assets in an organisation (about 200 words)
Task 1.2 Describe how security awareness and training could facilitate people playing a proactive role in improving the security of an organisation’s information technology and communications assets (about 500 words)
Task 2 Physical security in a data centre (40 marks)
Review the current literature on the role of physical security in a data centre in order to address the tasks
Task 2.1 Identify and describe two key risks to information stored in a data centre elevated by poor physical security (about 300 words)
Task 2.2 Explain what physical security controls would be put in place in a data centre to reduce these potential risks to security of information to an acceptable level (about 500 words)
Report structure and presentation, writing style (10 Marks) Report is professionally structured and presented: cover page, table of contents, heading and sub headings, page numbering with appropriate use of tables and figures, writing style is clear and succinct, grammatically correct and free from spelling mistakes.
Quality of Research for each question evident in Referencing (10 Marks) appropriate level of in text referencing acknowledging original sources of ideas presented in report, reference list provides complete details for all references cited in body of report using Harvard referencing style.
Harvard referencing resources
Install a bibliography referencing tool – Endnote which integrates with your word processor.
http://www.usq.edu.au/library/referencing/endnote-bibliographic-software
USQ Library how to reference correctly using the Harvard referencing system https://www.usq.edu.au/library/referencing/harvard-agps-referencing-guide
ASSIGNMENT SUBMISSION
1) The file naming guidelines are as follows:
a. It is important that you use this convention to ensure that assignments can be tracked: Familyname_studentnumber_CIS2005_ASS2
i. Replace ‘familyname’ with YOUR family or surname
ii. Replace ‘studentnumber’ with YOUR student number (which starts with ‘00’)
2) Submit your assignment 2 using the Online Assignment 2 Submission link on the Study Desk
3) Late submission of assignment work
a. Late assignments will be penalised unless permission has been granted by the course leader BEFORE the assignment due date. Late assignments may be penalised by reducing the allocated mark by 5% per day late.
GENERAL REQUIREMENTS
Using appropriate headings and sub-headings in your report to clearly identify each of the required questions and answers.
The report must be written in your own words.
1. Ideas obtained from sources must be included in your discussion by expressing the idea in your words and citing the source using the Harvard Referencing style.
2. Direct quotes of more than five (5) words will not be considered a demonstration of your knowledge and will be assessed accordingly
3. The assignment must be the expression of your own work. It is acceptable to discuss course content with others to improve your understanding and clarify requirements, but solutions to assignment questions must be done on your own. This also means that it is not sufficient to merely paraphrase the entire assignment content from a textbook or other source. Your assignment answers need be a reflection and synthesis of your research of the associated topics. This should be evident in your in text referencing and reference list.
4. You need to demonstrate your understanding of associated topics for each assignment. You must not copy from anyone, including tutors and fellow students, nor provide copies of your work to others.
5. Note carefully University policy on Academic Misconduct such as plagiarism, collusion and cheating. If any of these occur they will be found and dealt with by the USQ Academic Integrity Procedures. If proven, Academic Misconduct may result in failure of an individual assessment, the entire course or exclusion from a University program or programs.
Answered Same DayAug 29, 2020CIS2005

Answer To: CIS2005 Assignment 2 Description Marks out of Wtg(%) Word limit Due date Assignment 2 100 15 1500 31...

Abr Writing answered on Aug 30 2020
147 Votes
Assignment 2
TABLE OF CONTENTS
INTRODUCTION    2
Task 1.1 two ways people could compromise ICT Asset security    2
Task 1.2 how security awareness & training improve ICT security    2
Task 2.1 two risks to information elevated by poor physical security    4
Task 2.2 ways to reduce these potential risks to security of information to an acceptable level    4
CONCLUSION    5

REFERENCES    6
INTRODUCTION
The business assets mainly focus on the information security hardware, software as well as the network that is required to be protected and secured so that it may be beneficial for the overall organization. On the other hand, it requires adopting security measures that result in reducing error, fraud as well as the loss within the business (Rizvi et al. 2017). The present report focuses on gaining insights regarding the security of the information system within the organization along with associated risks to information stored in a data center that is often elevated by poor physical security.
Task 1.1 two ways people could compromise ICT Asset security
The era of cybersecurity is progressing at the faster rate thus; it is required safeguarding and protecting of the data so that business may easily take the decisions effectively. Through reviewing the activities of the data center, it has been stated that management must engage in maintaining operational security so that it may easily overcome the potential risk factor from the ICT Assets (6 Common Ways Employees Compromise Enterprise Data Security (And What You Can Do about it), 2015). There are two ways in which people intentionally and unintentionally could comprise the security of their ICT assets that mainly include-
· Through installing cracked software- With the help of installing software in the personal computers as well as laptops it will assist in overcoming the attack from malware and viruses. But unintentionally implementing the cracked software in the PC’s would result in compromising the security of ICT assets as it occurs in attacking the unwanted malware and malicious activities that lead to crash the information and important data from the hard disk (Nye and Hwang, 2017).
· Regular data backup and update- Another way in which people of the data center would comprise the security of ICT asset is by backing up the data by updating the software and database. With the help of implementing backup and update activities in the data center, it might result in overcoming the layer of security that results in corrupting the data stored in the ICT assets.
Task 1.2 how security awareness & training improve ICT security
With the increasing cyber function in the organization, it focuses on increasing the rate of cybercrime. Thus, high-impact organizations are preliminarily recognizing the significance of implementing cybersecurity awareness training programs to protect and secure their intellectual property. Therefore, it is stated that security awareness and training directly results in attaining the combination of digital security, physical safety as well as the personal safety of the assets and stored information by the employees (Khari et al. 2018). To improve the security and safety of the ICT assets in the data center, it has been assessed that security awareness and training activities play the significant role in enhancing awareness regarding the risks and threats associated with the technological activities. Cybersecurity plays the vital role in managing the internet activities within the organization and assists the employees in performing best practices that result in reducing the level of threats and...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here