Blog
College of Computing and Informatics Pg. 04 Question Four Assignment 2 Deadline:
College of Computing and Informatics
Pg. 04
Question Four
Assignment 2
Deadline: Thursday 3/8/2023 @ 23:59
[Total Mark for this Assignment is 15]
Assignment 2
Deadline: Thursday 3/8/2023 @ 23:59
[Total Mark for this Assignment is 15]
Professional Issues in IT
IT409
Professional Issues in IT
IT409
Student Details:
Name: ###
CRN: ###
ID: ###
Student Details:
Name: ###
CRN: ###
ID: ###
Instructions:
You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format.
It is your responsibility to check and make sure that you have uploaded both the correct files.
Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets, convert text into image or languages other than English or any kind of manipulation).
Email submission will not be accepted.
You are advised to make your work clear and well-presented. This includes filling your information on the cover page.
You must use this template, failing which will result in zero mark.
You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.
Late submission will result in ZERO mark.
The work should be your own, copying from students or other resources will result in ZERO mark.
Use Times New Roman font for all your answers.
Instructions:
You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format.
It is your responsibility to check and make sure that you have uploaded both the correct files.
Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets, convert text into image or languages other than English or any kind of manipulation).
Email submission will not be accepted.
You are advised to make your work clear and well-presented. This includes filling your information on the cover page.
You must use this template, failing which will result in zero mark.
You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.
Late submission will result in ZERO mark.
The work should be your own, copying from students or other resources will result in ZERO mark.
Use Times New Roman font for all your answers.
4 Marks
4 Marks
Learning Outcome(s):
CLO1
Explain networking and security, security issues, trends, and security resource.
Learning Outcome(s):
CLO1
Explain networking and security, security issues, trends, and security resource.
Question One
What the different between Intrusion Detection Systems and Intrusion prevention Systems?
3 Marks
3 Marks
Learning Outcome(s):
CLO3
Develop security policies and put in place an effective security architecture that comprises modern hardware and software technologies and protocols.
Learning Outcome(s):
CLO3
Develop security policies and put in place an effective security architecture that comprises modern hardware and software technologies and protocols.
Question Two
According to NIST, explain is what the systems development lifecycle (SDLC)? List with brief explanation each phase of the SDLC?
4.5 Marks
4.5 Marks
Learning Outcome(s):
CLO 4
Analyze problems related to the field of Security and Information Assurance.
Learning Outcome(s):
CLO 4
Analyze problems related to the field of Security and Information Assurance.
Question Three
What is the difference between a Denial of Service (DoS) attack, malware, and an information security incident, and how can these threats potentially harm a business or its operations?
3.50 Marks
3.50 Marks
Learning Outcome(s):
CLO 5
Apply the most appropriate solutions to problems related to the field of Security and Information Assurance.
Learning Outcome(s):
CLO 5
Apply the most appropriate solutions to problems related to the field of Security and Information Assurance.
Question Four
Describe the core elements of a resilient organization and explain how they contribute to its ability to adapt and recover from known or unknown environmental changes.
Sensitivity: This content has been classified as Petro Rabigh: General Use
Sensitivity: This content has been classified as Petro Rabigh: General Use
Sensitivity: This content has been classified as Petro Rabigh: General Use
Sensitivity: This content has been classified as Petro Rabigh: General Use
Sensitivity: This content has been classified as Petro Rabigh: General Use
Sensitivity: This content has been classified as Petro Rabigh: General Use
Sensitivity: This content has been classified as Petro Rabigh: General Use
Sensitivity: This content has been classified as Petro Rabigh: General Use
Sensitivity: This content has been classified as Petro Rabigh: General Use
Sensitivity: This content has been classified as Petro Rabigh: General Use
Sensitivity: This content has been classified as Petro Rabigh: General Use
Sensitivity: This content has been classified as Petro Rabigh: General Use

