KING’S OWN INSTITUTE
Success in Higher Education
ICT 205 CYBER SECURITY T220
Assessment type: Written Individual assignment (2,000 words).
Purpose: The purpose of this assessment is to demonstrate student awareness of current industry and research trends in the field of information security. Analyse and evaluate the organizational adoption of security controls. Design solutions for concrete security problems for distributed applications This assessment contributes to learning outcomes c, d.
Submission requirements details: All work must be submitted on Moodle by the due date followed by the presentation in week 12. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using Harvard Anglia referencing style.
Assessment topic: Security Plan and Training Program
Task Details: This assignment requires you to design a security plan based on a given case study. The learning outcomes of this assignment are to recognize the threats that exist in your current or future work place. Through your research, identify the threats, outline security guidelines and develop a robust and pragmatic training programme. You are required to complete and submit a security plan based on the following scenario:
The assignment has two parts: Report Submission & Presentation
Case Study Scenario: You are the recently appointed head of a security team responsible for protecting the information holdings of Seek Hardware Ltd which is a medium organization selling IT hardware parts. The organization is based in multiple locations managing its communications through logical point to point connections. Each of the location office comprises of 550 staffs.
The security team is responsible for administering the security of information from deliberate and accidental threats. The recent information security management team found that the security has not been properly addressed in some key areas such as social engineering attacks, password security, various other threats to the organization. The team also realized that there is lack of personnel awareness about security among the user group belonging to the organization.
Technical systems were found to be reasonably effective in maintaining database and document management security, and were well serviced by the IT team. The above issues required urgent remedy considering the fact that unattended vulnerabilities in the network are open to attacks. As the head of the team, it becomes your responsibility to ask your team to analyze the possible threats and provide a report on the detailed security countermeasures for all the possible threats.
As a part of the security analysis, the tasks of the team is to:
For solution, connect with our online professionals.