SEU Computer Science It Security Polcies Question

Description


College of Computing and Informatics
Assignment 2
Deadline: Thursday 14/4/2022 @ 23:59
[Total Mark for this Assignment is 8]
Student Details:
Name: ###
ID: ###
CRN: ###
Instructions:










You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
It is your responsibility to check and make sure that you have uploaded both the correct files.
Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).
Email submission will not be accepted.
You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.
You must use this template, failing which will result in zero mark.
You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.
Late submission will result in ZERO mark.
The work should be your own, copying from students or other resources will result in ZERO mark.
Use Times New Roman font for all your answers.
Question One
Pg. 01
Learning
Outcome(s):
CLO6:
Demonstrate
processes to
implement and
enforce policy
Question One
3 Marks
Write a standard operating procedure (SOP) in hierarchical format for setting up
a new account on an organization website.
Note: Write your answer in the table below. Answer should be on your own
words. Zero mark will be awarded for copied answer.
Procedure
Details
Question Two
Pg. 02
Learning
Outcome(s):
CLO1:
Explain networking
and security,
security issues,
trends, and security
resources.
CLO5:
Apply the most
appropriate
solutions to
problems related to
the field of Security
and Information
Assurance.
Question Two
2 Marks
Cybersecurity helps organizations to avoid attacks. It also helps to mitigate the
risks if an attack occurs. For instance, network segmentation plays a vital role in
reducing the risk of a cyber breach by isolating it. Explain the following:
What does network segmentation mean; compare it to its flat network
counterpart. [1 mark]
Mention at least two of the best practices for network segmentation (i.e., what
should be considered when segmenting an organization’s network)? [1 mark]
Question Three
Pg. 03
Learning
Outcome(s):
CLO 3:
Develop security
policies and put in
place an effective
security
architecture that
comprises
modern hardware
and software
technologies and
protocols.
Question Three
2 Marks
Software Assurance Maturity Model (SAMM) is an open framework to help
organizations formulate and implement security policy for an organization.
Answer the following questions regarding SAMM:
a. How do organizations generally deploy SAMM Model? [1 Mark]
b. Is SAMM a descriptive model or prescriptive model? Write the rationale
behind your answer. [1 Mark]
Question Four
Pg. 04
Learning
Outcome(s):
CLO2:
Apply effective,
proper, and stateof-the-art security
tools and
technologies.
CLO5:
Apply the most
appropriate
solutions to
problems related
to the field of
Security and
Information
Assurance.
Question Four
1 Marks
Block Ciphers are a class of Encryption Algorithms. Describe Block Cipher in
your own words and explain working of one block cipher algorithms currently
available.

Purchase answer to see full
attachment

ORDER ASSIGNMENT



Essays Assignment Help

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for upto 20% off in their first Order. Our payment method is safe and secure. Hire a tutor today CLICK HERE to make your first order