Tải bản đầy đủ (.docx) (4 trang)

Security assignment 1 frontsheet

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (112.6 KB, 4 trang )

ASSIGNMENT 1 Frontsheet
Qualification

BTEC HND Diploma in Computing and Systems Development

Unit number and title

Unit 5: Security

Assignment due

November 28, 2018

Learner’s name

Assignment submitted
Assessor name

Phan Minh Tam

Learner declaration:
I certify that the work submitted for this assignment is my own and research sources are fully acknowledged.
Learner signature

Date

Grading grid
P1

P2


P3

Assignment title

P4

M1

M2

D1

Assignment 1: Security introduction

In this assignment, you will have opportunities to provide evidence against the following criteria.
Indicate the page numbers where the evidence can be found.

November 28, 2018


Assessment criteria

Expected evidence

Task
no.

LO1: Assess risks to IT security
P1 Identify types of security
risks to organisations


Explains what IT security is and why it is important
today. Also include who is responsible for attacks and
attack techniques

P2 Describe organisational
security procedures

Outlines general principles that can be used to protect
valuable assets.

1

2

LO2: Describe IT security solutions
Use the Internet to research some of the different
P3 Identify the potential impact ransomware attacks that have occurred recently.
to IT security of incorrect Identify at least three attacks that are current. What
configuration of firewall policies do they do? Why are they so successful? How are they
being spread? What can users do to protect
and third-party VPNs
themselves? How can ransomware be removed from a
computer?

3

Assessor’s Feedback



Attacks that exploit previously unknown vulnerabilities
P4 Show, using an example for are considered some of the most dangerous attacks.
each, how implementing a DMZ, Use the Internet to research these attacks. How are
4
static IP and NAT in a network the vulnerabilities discovered? What are some of the
can improve Network Security.
most recent zero-day attacks? What defenses are there
against them?

Assessment criteria
Merit descriptor No. (M1)
Propose a method to assess and treat IT
security risks
Merit descriptor No. (M2)
Discuss three benefits to implement network
monitoring systems with supporting reasons.
Distinction descriptor No. (D1)

Expected Evidence

Feedback


Summative feedbacks:

Assessor’s Signature:

Date:

December 12, 2018




×