Annual Report

Annual Report

FY [Year]

[Add a quote here from one of your company executives or use this space for a brief summary of the document content.]

 

IT Security and Policies

IT409

 

 

Instructions:
·      You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format.

·      It is your responsibility to check and make sure that you have uploaded both the correct files.

·      Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets, convert text into image or languages other than English or any kind of manipulation).

·      Email submission will not be accepted.

·      You are advised to make your work clear and well-presented. This includes filling your information on the cover page.

·      You must use this template, failing which will result in zero mark.

·      You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.

·      Late submission will result in ZERO mark.

·      The work should be your own, copying from students or other resources will result in ZERO mark.

·      Use Times New Roman font for all your answers.

 

Name: ###

 

CRN: ###

ID: ###

 

 

 

1.5 Marks

Learning Outcome(s):

CLO1: Explain networking and security, security issues, trends, and security resource.

CLO4: Analyze problems related to the field of Security and Information Assurance.

 

 

 

 

 

 

Question One

What is the concept of a zero-day vulnerability, and why is it particularly dangerous? Give a real example of zero-day attack in recent years and its impact.

 

 

 

 

 

 

 

 

 

2 Marks
Learning Outcome(s):

CLO1: Explain networking and security, security issues, trends, and security resource.

CLO3: Develop security policies and put in place an effective security architecture that comprises modern hardware and software technologies and protocols

 

 

 

 

Question Two

 

 

What are some real-world examples of organizations that have successfully implemented CMM, and how did achieving higher maturity levels impact their project outcomes and business success?

 

1.5 Marks
Learning Outcome(s):

CLO2: Apply the most appropriate solutions to problems related to the field of Security and Information Assurance

 

 

 

 

 

 

Question Three

 

How do firewalls and intrusion detection/prevention systems (IDS/IPS) work together to defend against network-based attacks? Provide one example of an attack that can be mitigated by these security tools.

 

3 Marks
Learning Outcome(s):

CLO4: Analyze problems related to the field of Security and Information Assurance

 

 

 

 

 

Question Four

 

What are the key security risks associated with storing sensitive data in the cloud compared to on-premises data centers, and how can companies effectively leverage encryption and access control to mitigate these risks? Additionally, what delineations of responsibility exist between the company and the cloud provider in ensuring the security of cloud-stored data?

 

attachment_1