Answered You can hire a professional tutor to get the answer.
Assignment specification Qualification Bachelor of Science in Information Technology Module code C_ITSS311 NQF level Semester Assessor Copy-editor
1.1 Which approach would you follow in attempting to protect against inside attacks? Justify your answer. [AC1.2] (7 marks) 1.2 It is the responsibility of the government to ensure that they put in place relevant laws to ensure that attackers are prosecuted. Which two laws could an organisation in South Africa use to prosecute an inside attacker, should they get caught? Justify your answer. [AC3.2] (4 marks) 1.3 According to the article “over 50% of organisations report having encountered an insider cyberattack”. Research any three organisations that have experienced insider cyber-attacks. Describe each attack and indicate their severity. [AC2.1 and AC2.2] (9 marks) Note Without references to sources, you will not receive any marks. 1.4 Why are there a higher number of cyber-attacks coming from internal employees? Provide three researched reasons. Provide references for your answers. [AC2.2] (9 marks) 1.5 Two employees at an organisation that was in the middle of a labour dispute sabotaged the system controlling the traffic lights of a major city. The sabotage took four days to fix, during which time traffic was greatly affected. Identify the type of inside attack this is. Justify your answer. [AC2.2] (4