Attachment 1
Attachment 1
Attachment 1
Project
Deadline: Tuesday 8/11/2022 @ 23:59
[Total Mark is 14]
Student Details: CRN:
Name: ID:
Name: ID:
Name: ID:
Name: ID:
Instructions:
You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
It is your responsibility to check and make sure that you have uploaded both the correct files.
Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words,
hide characters, use different character sets, convert text into image or languages other than English or any kind
of manipulation).
Email submission will not be accepted.
You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.
You must use this template, failing which will result in zero mark.
You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the
question.
Late submission will result in ZERO mark.
The work should be your own, copying from students or other resources will result in ZERO mark.
Use Times New Roman font for all your answers.
Pg. 1 Question OneQuestion One
The leader of each group must send an email with the group member's
details (name, id) before 6/10/2022 (midnight), and the group leader must submit
the project with all group member details mentioned on the cover page.
The work should be your own. Copying from students or other resources will
result in ZERO marks.
You are advised to make your work clear and well presented; marks may be
reduced for poor presentation. This includes filling in your information on the
cover page.
You MUST show all your work, and text must not be converted into an image
unless specified otherwise by the question.
Learning 2 Marks
Outcome:
Question One
CLO1:
Identify a shared attitude, values, goals, or practices that
Explain
networking and characterize the culture of the chosen organization/company.
security, security Is your chosen organization currently ISO 27001 certified? If does
issues, trends,
and security not, write in your own words how an organization achieves ISO
resource 27001 certification.
CLO4:
Analyze problems
related to the field
of Security and
Information
Assurance
CLO3:
Develop security
policies and put in
place an effective
security
architecture that
comprises
modern hardware
and software
technologies and
protocols
Pg. 4 Question OneQuestion One
Learning 2 Marks
Outcome:
Question Two
CLO1:
What are the information security policies that relate to protecting
Explain
networking and the CIA of the organization's information assets (Note: information
security, security assets include both software and hardware assets)?
issues, trends,
and security
Determine which ISO 27002:2013 domains and sections should
resource apply to these information security policies.
CLO3:
Develop security
policies and put in
place an effective
security
architecture that
comprises
modern hardware
and software
technologies and
protocols
Pg. 5 Question OneQuestion One
Learning 6 Marks
Outcome:
Question Three
CLO4:
Conduct a risk assessment using any risk assessment tool of your choice
Analyze problems (you may use the "smart sheet" tool), and fill the following Tables.
related to the field
of Security and Assets Threats Vulnerabilities Risk
Information
Assurance
b. Risk Matrix (at least two threats for each asset): (4 marks)
Learning 2 Marks
Outcome:
Question Four
CLO3:
Locate a copy of the Acceptable Use Agreement (or an equivalent
Develop security document). Read and write a critique of the agreement by answering the
policies and put in following questions:
place an effective
a. Explain which activities are prohibited or encouraged? (0.25
security
mark)
architecture that
comprises
modern hardware
and software
b. How does it encourage users to be security conscious? (0.25
technologies and mark)
protocols
Learning 2 Marks
Outcome:
Question Five
CLO3:
Identify at least two examples of the organization security awareness
Develop security reminder/program. In your opinion, is the reminder effective? Explain
policies and put in
why or why not.
place an effective
security
architecture that
comprises
modern hardware
and software
technologies and
protocols
CLO6:
Demonstrate
processes to
implement and
enforce policy