College of Computing and Informatics
Deadline: Thursday 14/4/2022 @ 23:59
[Total Mark for this Assignment is 8]
You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
It is your responsibility to check and make sure that you have uploaded both the correct files.
Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).
Email submission will not be accepted.
You are advised to make your work clear and well-presented. This includes filling your information on the cover
You must use this template, failing which will result in zero mark.
You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
Late submission will result in ZERO mark.
The work should be your own, copying from students or other resources will result in ZERO mark.
Use Times New Roman font for all your answers.
Write a standard operating procedure (SOP) in hierarchical format for setting up
a new account on an organization website.
Note: Write your answer in the table below. Answer should be on your own
words. Zero mark will be awarded for copied answer.
trends, and security
Apply the most
problems related to
the field of Security
Cybersecurity helps organizations to avoid attacks. It also helps to mitigate the
risks if an attack occurs. For instance, network segmentation plays a vital role in
reducing the risk of a cyber breach by isolating it. Explain the following:
What does network segmentation mean; compare it to its flat network
counterpart. [1 mark]
Mention at least two of the best practices for network segmentation (i.e., what
should be considered when segmenting an organization’s network)? [1 mark]
policies and put in
place an effective
Software Assurance Maturity Model (SAMM) is an open framework to help
organizations formulate and implement security policy for an organization.
Answer the following questions regarding SAMM:
a. How do organizations generally deploy SAMM Model? [1 Mark]
b. Is SAMM a descriptive model or prescriptive model? Write the rationale
behind your answer. [1 Mark]
proper, and stateof-the-art security
Apply the most
to the field of
Block Ciphers are a class of Encryption Algorithms. Describe Block Cipher in
your own words and explain working of one block cipher algorithms currently
Purchase answer to see full