SEU Computer Science Standard Operating Procedure Worksheet


Don't use plagiarized sources. Get Your Custom Assignment on
SEU Computer Science Standard Operating Procedure Worksheet
From Just $13/Page

College of Computing and Informatics
Assignment 2
Deadline: Thursday 14/4/2022 @ 23:59
[Total Mark for this Assignment is 8]
Student Details:
Name: ###
ID: ###
CRN: ###

You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
It is your responsibility to check and make sure that you have uploaded both the correct files.
Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).
Email submission will not be accepted.
You are advised to make your work clear and well-presented. This includes filling your information on the cover
You must use this template, failing which will result in zero mark.
You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.
Late submission will result in ZERO mark.
The work should be your own, copying from students or other resources will result in ZERO mark.
Use Times New Roman font for all your answers.
Question One
Pg. 01
processes to
implement and
enforce policy
Question One
3 Marks
Write a standard operating procedure (SOP) in hierarchical format for setting up
a new account on an organization website.
Note: Write your answer in the table below. Answer should be on your own
words. Zero mark will be awarded for copied answer.
Question Two
Pg. 02
Explain networking
and security,
security issues,
trends, and security
Apply the most
solutions to
problems related to
the field of Security
and Information
Question Two
2 Marks
Cybersecurity helps organizations to avoid attacks. It also helps to mitigate the
risks if an attack occurs. For instance, network segmentation plays a vital role in
reducing the risk of a cyber breach by isolating it. Explain the following:
What does network segmentation mean; compare it to its flat network
counterpart. [1 mark]
Mention at least two of the best practices for network segmentation (i.e., what
should be considered when segmenting an organization’s network)? [1 mark]
Question Three
Pg. 03
CLO 3:
Develop security
policies and put in
place an effective
architecture that
modern hardware
and software
technologies and
Question Three
2 Marks
Software Assurance Maturity Model (SAMM) is an open framework to help
organizations formulate and implement security policy for an organization.
Answer the following questions regarding SAMM:
a. How do organizations generally deploy SAMM Model? [1 Mark]
b. Is SAMM a descriptive model or prescriptive model? Write the rationale
behind your answer. [1 Mark]
Question Four
Pg. 04
Apply effective,
proper, and stateof-the-art security
tools and
Apply the most
solutions to
problems related
to the field of
Security and
Question Four
1 Marks
Block Ciphers are a class of Encryption Algorithms. Describe Block Cipher in
your own words and explain working of one block cipher algorithms currently

Purchase answer to see full


Essays Assignment Help

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for upto 20% off in their first Order. Our payment method is safe and secure. Hire a tutor today CLICK HERE to make your first order