Answered You can hire a professional tutor to get the answer.
The article discusses 5 real situation relating to information security. Your task is as follows.
The article discusses 5 real situation relating to information security. Your task is as follows.
- Choose 2 out of the 5 situation for your individual assignment.
- Analyze the selected case studies in the context of the subject topics covered in this course. You are required to consult the fully reference a minimum of 5 different sources of information.
- Document your findings and ideas as a report. Citation format will be APA.
https://en.wikibooks.org/wiki/Information_Security_in_Education/Case_Studies#Breached Passwords
5 situation: Breached password, Malware, Stolen or lost equipment, Information pasted to the web, student Hacking
Marking criteria:
Introduction (Technology Description & Working)
excellent answer provided with clear explanation of the technology with its components, subcomponents (with diagram)
Maximum score
10
Analysis
Very good analysis done
Maximum score
10Case Study
company description is succinct, well written and clear, uses summarisation or paraphrasing, includes key attributes of the company
Maximum score
10
Organisation
submission is very organised with well constructed paragraphs, and has clear headings
Maximum score
10
Word Length
the specified word length for each section is less that 10% higher or lower
Maximum score
10
References
excellent in-text citations used throughout document. Full reference list
Maximum score
10