Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

ICT418 Assignment – Report Template Instructions to students In general, you should keep your comments brief and to the point. Do NOT copy in large amounts of text from articles you find on the web –...

1 answer below »
ICT418 Assignment – Report Template
Instructions to students
In general, you should keep your comments
ief and to the point. Do NOT copy in large amounts of text from articles you find on the web – shorter is often better!
Keep your sentences and paragraphs short – it helps the reader understand your report. Don’t be afraid to use bullet points and lists, but make sure you introduce the lists appropriately e.g. examples of security measures include: (your list follows).
To help you structure your report, you can use the template below.
Introduction
This section of the report should describe who the report is being prepared for e.g. the CEO fo ABC Education, when it was prepared (date of report) and by who (you should list the names and student ids of each person in your group)
Recommendations on organisational copyright policy
Should describe what an organisational copyright policy needs to address, how it could be made consistent with organisational practices, and what legislation it needs to be compliant with (examples/specifics should be provided)
Recommendations on organisational privacy policy
Should describe what an organisational privacy policy needs to address, and what legislation it needs to be compliant with (examples/specifics should be provided)
Recommendations on organisational ethics policy
Should describe what an organisational ethics policy needs to address (examples/specifics should be provided)
Recommendation on distributing policy to stakeholders and gathering feedback
Describe how the proposed copyright, ethics and copyright policies can be distributed to stakeholders, who those stakeholders might be, and how the feedback from stakeholders could be captured
Information security, integrity and availability – IT considerations
Describe why IT is important, and how privacy-related considerations such as information confidentiality/security, integrity and availability of information can be addressed by IT systems. You should provide examples of IT-related technologies for each of information security, integrity and availability
Protecting the proprietary rights of stakeholders
Describe how any applicable proprietary rights of stakeholders will be maintained. You need to describe what approach will be made to keep the intellectual property of stakeholders, such as teachers, safe in the organisation
Assessing organisational impact of the new policies
Describe how any impact the new privacy, ethics and copyright policies will have on existing work practices will be determined. For example, why this is needed, what ways you can assess organizational impact etc.
Meeting stakeholder expectations and monitoring
eporting policy violations.
Describe what organisational processes could be put in place for various organisational stakeholders to support the policies e.g. to enable employees to report policy violations, customers/students to report customer service that is inconsistent with company policies etc.

ICANWK503A – Install and Maintain Valid Authentication Processes
    
    
    a
RTO No: 20829
CRICOS Provider No: 02044E
ABN: XXXXXXXXXX
STUDENT COPY- CR
    Assessment Workbook
    Unit Details
    ICTDBS502 – Design a database
    Assessment Requirements
    This unit requires each student to undergo adequate practice and preparation prior to undertaking the assessments in a classroom/simulated environment or an actual job workplace (formative).
Students are required to complete ALL assessment tasks listed below in order to be deemed “Satisfactory” in this unit of competency.
    Assessment Methods
(Three Assessments for this unit)
    1. Practical Observation
    Assessment type:
Laboratory Exercises
        2. Written Test
    Assessment type:
Multiple choice/short answe
        3. Project / Report
    Assessment type:
Short answe
Written Report
        
    
    
    Document Version 1.1. Issued July 2017
    Unit Summary
    The unit objectives, prerequisites, corequisites and other pertinent information about this unit is described at https:
training.gov.au/Training/Details/ICTDBS502
General Instructions for Students
READ THESE INSTRUCTIONS CAREFULLY BEFOR YOU BEGIN!
· You should download the softcopy of this document and use it as a template for your own assignment submission.
· You will be directed to save screen prints and/or write down answers to questions when you complete this workbook. You need to include those screen prints/answers inline (i.e. at the co
ect place in the document) so your assignment can be assessed. If there are sample screen prints included in the document, you need to delete those and include your own screen prints. Do not submit your assignment without all the required screen prints/documents, as you will be marked NYC and need to resubmit the assignment
· To complete the practical tasks, you will need to consult the Learner Resources and/or Lab Guide. These are available in Moodle
· Keep your softcopy of your assessment/workbook (in case you need to resubmit it)
· Answer all parts of the assessment
· Type all your answers (do not handwrite)
· Do not cheat. Anyone caught cheating will automatically be marked Not Yet Satisfactory for this unit. There are NO EXCEPTIONS to this rule.
In order to achieve competency, all assessment tasks MUST be completed to a satisfactory level
Note:
All references made to workplace and or employer, are directly related to the trainers and facilities at VIT.
PRACTICAL OBSERVATION – INFORMATION FOR STUDENTS
Laboratory Exercises
This information is to be handed to each student to outline the assessment requirements
This assessment is to be undertaken in an actual job workplace or a classroom/simulated environment. Read the scenario below and then work through the lab exercises. At different points in the lab you will need to write down answers to questions, and/or include screen prints showing you completed practical tasks on the computer. Make sure you answer all questions and include all required screen prints. Where example screen prints and ansers have been included for you, make sure you delete these and include your own answers/screen prints
This assessment is done during the allocated laboratory/tutorial sessions or can be completed offsite. Once you have finished the workbook, you need to print it out and submit the hardcopy for assessment
Reference Material/Textbooks:
See your Learner resources for each topic in Moodle
Microsoft, Database Administration Fundamentals (in Learner Resources)
See ICTDBS502 Lab Guide (in Learner resources) for instructions
esources on how to complete the la
Lab 1 Logical database design
Complete lab1 as described in the Lab Guide. Save your evidence for completing lab 1 in the space below (see lab guide for details)
Lab 2. Database implementation
Complete lab 2 as described in the Lab Guide. Save your evidence for completing lab 2 in the space below (see lab guide for details)
Lab 3 Implementing constraints and indexes
Complete lab 3 as described in the Lab Guide. Save your evidence for completing lab 3 in the space below (see lab guide for details)
Lab 4 Querying and reporting data
Complete lab 4 as described in the Lab Guide. Save your evidence for completing lab 4 in the space below (see lab guide for details). Make sure you save evidence for all five questions for lab 4. Label your evidence clearly e.g. query1, query 2 etc
Lab 5 Backing up your database
Complete lab 5 as described in the Lab Guide. Save your evidence for completing lab 4 in the space below (see lab guide for details).
PRACTICAL OBSERVATION – ASSESSOR INFORMATION
Assessor Use Only
    Assessor Comments
( Satisfactory (S)
( Not Yet Satisfactory (NYS)
Assessor Signature: _______________________________
Date: _____________
Questions – INFORMATION FOR STUDENTS
Multiple choice questions
This information is to be handed to each student to outline the assessment requirements
This is an open book written assessment that will be delivered through Moodle, the VIT e-learning platform. You need to logon to Moodle to complete the test. You can make as many attempts as you like at the test, but you must get all questions co
ect to be judged competent in this assessment task (100%).
Note: Once you have got the required score, you need to take a screen print in Moodle and include that screen print in your assessment as proof you completed the test. If you do not include this screen print in your submission, you cannot be marked Competent for the task. Make sure you include your screen print of your Moodle result!
Include your Moodle Test result here (delete the sample image first)
Assessor Use Only
    Assessor Comments
( Satisfactory (S)
( Not Yet Satisfactory (NYS)
Assessor Signature: _______________________________
Date: _____________
Project – Information for Students
Answer all the questions below. Keep your answers short and to the point. No answers should exceed 70 words.
Type (do not handwrite) your answers inline in the document. Do not write your answers in separate document; write them inline in this document.
Note: to answer these topics, you will need to refer to Lesson 5 “Administering a Database” in Database Administration Fundamentals and other references in lecture topics in Moodle
1. What is the main advantage of using Windows Authentication mode as the way I authenticate users trying to access SQL Server?
2. Give two examples of predefined server roles in SQL Server.
3. Write down the SQL command I would use to assign a user called Fred to the Marketing role in SQL Server?
4. What are the three recovery modes available for a database in SQL Server?
5. What is one advantage and one disadvantage of full recovery mode on a SQL database?
6. You have proposed the following design for a CUSTOMER table to a client (see SQL statement defining the CUSTOMER table below). The client points out that, for his business, customer identifiers can have letters as well as numbers e.g. MR12345 is a valid customer id, and also points out that we need to store the customer’s date of birth. Write a new CREATE TABLE statement for the Customer table that addresses the concerns of this customer by defining a CUSTOMER table that will suit the client’s expressed needs.
CREATE TABLE [dbo].[Customer](
[CustomerId] [int] NOT NULL,
[Fname] [varchar](10) NULL,
[Sname] [varchar](10) NULL,
CONSTRAINT [PK_Customer] PRIMARY KEY CLUSTERED
7. You have proposed a database design to a client, where the database has four tables: CUSTOMER, ORDER, PRODUCT and SALESPERSON. The client has informed you that the database will have two users, Andy and Betty. Andy only needs read (or SELECT) access to the CUSTOMER table on the database, whereas Betty needs full access (SELECT, INSERT, UPDATE, DELETE) to the CUSTOMER table table. Write the SQL statements to (i) grant Andy read access to the CUSTOMER table; and (ii) grant Betty full access to the CUSTOMER table
8. List one benefit of using Transparent Data Encryption (TDE) on a SQL Server Database
9. You have been asked to investigate the scalability of SQL Server 2014 Standard Edition. Specify (i) the maximum size of database permitted (ii) the maximum amount of memory addressable; and (iii) the maximum number of cores allowed on the database serve
10. A programmer has proposed the following Student table definition to you below. You notice that the field Language is a repeating group, and that the proposed table design violates the rules for First Normal Form. Write down two SQL CREATE TABLE statements that
Answered Same Day Jun 13, 2020 ICTICT511 Training.Gov.Au

Solution

Vignesh answered on Jun 20 2020
147 Votes
RTO No: 20829
CRICOS Provider Code: 02044E
ABN: 41 085 128 525
STUDENT COPY
Assessment Resources Summary
    Unit Details
    ICTNWK502 - Implement secure encryption technologies
This unit requires each student to undergo adequate practice and preparation prior to undertaking the assessments in a classroom/simulated environment.
Students are required to complete ALL summative assessments listed below in order to be deemed “Competent” in this unit of competency.
    
    Written Assessment
    Assessment 1
    
    
    
    
    
    Case Study
    Assessment 2
    Assessment
    
    
    Methods
    
    
    
    
    La
    Assessment 3
    
    
    
    
    
    
    
    
    Questions
    Assessment 4
    
    
    
    
    Issue Date
    January 2018
    
    
    
    
Version 1.2
Assessment Resources ICTNWK502
a
Unit Summary
The unit objectives, prerequisites, co-requisites and other pertinent information about this unit is described at https:
training.gov.au/Training/Details/ICTNWK502
Resources
Students should refer to this unit in Moodle (e-learning.vit.edu.au) to access a list of resources for this unit (see Learner Resources section for relevant articles, links etc).
Lab-1 resources:
Watch “How to SSH in Windows with freeSSHd, and PuTTY” https:
www.youtube.com/watch?v=Zei2DPCnMl4
Watch “Private/Public Key SSH in Windows using freeSSHd and PuTTYgen”
https:
www.youtube.com/watch?v=lwHktjugAYM
Lab-2 resources:
gpg4win (a Windows implementation of GPG)
https:
www.gpg4win.org
Watch “gpg4win Installation” https:
www.youtube.com/watch?v=ZMfFGkYibNQ
Watch “gpg4win generate keys” https:
www.youtube.com/watch?v=NDGpQlAU4PM
Watch “gpg4win encrypting and decrypting” https:
www.youtube.com/watch?v=Cbv4jPIJ8J8
Issue Date: January 2018
Version 1.2
Page 2 of 18
Assessment Resources ICTNWK502
a
    
    
    Assessment 1: Written Assessment
    
    
    
    
    Student Name:
    ______________________________________________________________
    Student ID No:
    ______________________________________________________________
Student Instructions:
· Your answers should be on a separate document using word processing software such as MS Word & or other software (hand written submissions are only acceptable with prior approval from your Trainer)
· Your document should be professionally formatted and include
o Your Name
o Your Student ID o Unit Code
o Assessment Number (i.e. ICTNWK502 Assessment 1)
· Please reference to each question number and retype each question with your answers
· This is an open book assessment, you must answer every question and provide enough information to demonstrate sufficient understanding of what has been asked to achieve competency. Please ask your Traine
Assessor if you are unsure what is sufficient detail for an answe
· Ask your traine
assessor if you do not understand a question. Whist your traine
assessor cannot tell you the answer, he/she may be able to re-word the question for you or provide further assistance based on the Institute’s “Reasonable Adjustment Policy”
· Answers should be your own work, in your own words and not plagiarised, nor copied. However, if an answer is cut & pasted (such as a definition), then the source should be referenced
Issue Date: January 2018
Version 1.2
Page 3 of 18
Assessment Resources ICTNWK502
a
Questions
Explain the purpose and function of the following certificate related infrastructure (Not more than 100 words per item):
    1.
    •
    Certificate authorities
    
    •
    Registration authorities
    
    
    
    
    •
    Repository services
    
    ANS: Purpose of certificate authority (CA) is to secure the communication. CA is an electronic document that verifies the digital entity’s identity on the internet. Although any entity that wants to issue digital certificates for secure communications can potentially become their own certificate authority, most e-commerce websites use certificates issued by commercial CAs
 purpose of the RA is to off- load certain functions from the CA to enhance scalability and decrease operational costs.
 The registration function can be implemented directly with the CA component, it sometimes makes sense to off-load the registration function to a separate component refe
ed to as a Registration Authority (RA). For example, as the number of end entities in a given PKI domain increases and/or the end entities are widely dispersed geographically, the notion of centralized registration becomes problematic.
A central PKI certificate repository holds all types of certificates and keys, it is common to have a dedicated repository for specific Public Key Infrastructure environments.
In order for the PKI certificate repository to be able to function, it has to have a way to identify and locate the certificates and public keys. If this could not be done quickly and efficiently, it would cause delays when accessing websites, sending encrypted emails, providing a digital signature or in being able to process credit or debit card information online.
    2.
    Briefly describe two common asymmetric key algorithms, such as RSA and
    
    PKI, and their usage. (Not more than 300 words)
    
    
    
    
    RSA is an algorithm used by modern computers to encrypt and decrypt messages. It’s asymmetric because there are two different keys. This is also called public key cryptography, because one of them can be given to everyone. The other key must be kept private. The prime factors must be kept secret. Anyone can use the public key to encrypt a message, but with cu
ently published methods, if the public key is large enough, only someone with knowledge of the prime factors can feasibly decode the message.
A public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption. The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, internet banking and confidential email. It is required for activities where simple passwords are an inadequate authentication method and more rigorous proof is required to confirm the identity of the parties involved in the communication and to validate the information being transfe
ed
Explain the following symmetric key algorithms and their usage in your own words: (Not more than 100 words per item)
· Advanced encryption standard (AES)
3. • Data encryption standard (DES)
· Triple data encryption algorithm (triple DES)
· Blowfish
4. Explain what is meant by encryption strength in 100 words.
The strength of encryption is related to the difficulty of discovering the key, which in turn depends on both the cipher used and the length of the key. For example, the difficulty of discovering the key for the RSA cipher most commonly used for public-key encryption depends on the difficulty of factoring large numbers, a well-known mathematical problem.
Encryption strength is often described in terms of the size of the keys used to perform the encryption: in general, longer keys provide stronger 
5. What are the encryption strengths supported by the following symmetric key algorithms: (Not more than 100 words per item) DES, 3DES, AES, Blowfish
Briefly describe following types of encryption in your words (Not more than 300 words per item)
6. • Public key
· Secret key
· Hash key
Issue Date: January 2018
Version 1.2
Page 4 of 18
Assessment Resources ICTNWK502
a
Briefly describe the functions and features of the following (Not more than 100 words per item):
· Access control permissions
7. • Digital signatures
· One-way encryption
· Timestamps
8. What are two of the most commonly used one-way message digest algorithms?
9. Explain Message Digest algorithm 5 (MD5) and secure hash algorithm (SHA) in 100 words.
Explain in...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here