Answered You can hire a professional tutor to get the answer.

QUESTION

The article discusses 5 real situation relating to information security. Your task is as follows.

The article discusses 5 real situation relating to information security. Your task is as follows.

  1. Choose 2 out of the 5 situation for your individual assignment.
  2. Analyze the selected case studies in the context of the subject topics covered in this course. You are required to consult the fully reference a minimum of 5 different sources of information.
  3. Document your findings and ideas as a report. Citation format will be APA.

https://en.wikibooks.org/wiki/Information_Security_in_Education/Case_Studies#Breached Passwords

5 situation: Breached password, Malware, Stolen or lost equipment, Information pasted to the web, student Hacking

Marking criteria:

Introduction (Technology Description & Working)

excellent answer provided with clear explanation of the technology with its components, subcomponents (with diagram)

Maximum score

10

Analysis

Very good analysis done

Maximum score

10Case Study

company description is succinct, well written and clear, uses summarisation or paraphrasing, includes key attributes of the company

Maximum score

10

Organisation

submission is very organised with well constructed paragraphs, and has clear headings

Maximum score

10

Word Length

the specified word length for each section is less that 10% higher or lower

Maximum score

10

References

excellent in-text citations used throughout document. Full reference list

Maximum score

10

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question