关键词 > CST235/CSM335/CST231/CSM331

CST235/CSM335/CST231/CSM331, SEM II, 2021-2022

发布时间:2022-08-03

Hello, dear friend, you can consult us at any time if you have any questions, add WeChat: daixieit

CST235/CSM335/CST231/CSM331, SEM II, 2021-2022 

PRINCIPLES OF COMPUTER NETWORKS AND INFORMATION SECURITY 

ASSIGNMENT 2 (10%)

CLO:

CLO4

Justify the use of various technologies, as well as the practice of proper principles and ethics for the development of network systems and information security.

PO6

A3

EM2

KEY OBJECTIVES:

#

DESCRIPTION

1

Propose appropriate solutions to the problem(s) based on the principles of information security.

2

Justify the use of information security technologies as the solutions.

QUESTIONS:

1.   A post-graduate student under the supervision of Assoc Prof Dr Aman told him that he had sent an email containing a draft of his PhD thesis which he had prepared for review. The student was in Beijing, People's Republic of China when he sent the email. The email was not received by his supervisor. After being contacted via whatsup, his supervisor asked him to resend the document via email. However, the email sent this time was also not received by the supervisor. He submitted in the form of 2 screenshots to prove to his supervisor that he had sent the documents in question.

His supervisor contacted the officer in charge of the email server at USM, and the staff in charge denied the USM email server facility was problematic, and they said that the system

did not receive any email from the student after making proper checks.

Discuss the information security principles relevant to this issue.

(30/100)

2.    Discuss why insiders are considered such a threat to organizations?

(10/100)

3.   You have just been hired as a system administrator in a small college. Your servers are used for database storage and Web sites serving the university community.

a)   Describe the laws that will potentially impact your job with respect to computer security.

b)  What actions will you take to ensure compliance with laws and regulations?

(20/100)

4.   Develop a list of five security-related issues to be put into a requirements document as part of a secure coding initiative.

(20/100)

5.   Using a graphics program, design several security awareness posters on the following themes: updating anti-virus signatures, protecting sensitive information, watching out for e- mail viruses, prohibiting use of company equipment for personal matters, changing and protecting passwords, avoiding social engineering, and protecting software copyrights.

What other areas can you come up with?

(20/100)

INSTRUCTIONS

1.   For questions that require explanation, please try to answer each question in about 300 - 500 words only.

2.   The answer script must be submitted in pdf format, with a new page for each question.