Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

CIS8001: Assignment 3 Marking Sheet CIS2005: Assignment 2 Marking Criteria Student name: Student No: Mar k Comme nts Task 1.1 Identify and describe two ways people could intentionally or...

1 answer below »
CIS8001: Assignment 3 Marking Sheet
CIS2005: Assignment 2 Marking Criteria


Student name:

Student No:


Ma
k
Comme
nts
Task 1.1 Identify and describe two ways people could intentionally or
unintentionally compromise the security of information technology and
communications assets in an organisation (about 200 words)
XXXXXXXXXXExcellent coverage of two ways people could compromise ICT Asset security






0
12 Very good coverage of two ways people could compromise ICT Asset security
10 Good coverage of two ways people could compromise ICT Asset security
8 Average coverage of two ways people could compromise ICT Asset security
6 Poor coverage of two ways people could compromise ICT Asset security
4 Very poor coverage of two ways people could compromise ICT Asset security
0 Not Attempted or i
elevant
Task 1.2 Describe how security awareness and training could facilitate people
playing a proactive role in improving the security of an organisation’s
information communications and technology assets (about 500 words)
24 Excellent description how security awareness & training improve ICT security
XXXXXXXXXXVery good description how security awareness & training improve ICT security
16 Good description how security awareness & training improve ICT security
12 Average description how security awareness & training improve ICT security
XXXXXXXXXXPoor description how security awareness & training improve ICT security
4 Very poor description how security awareness & training improve ICT security
0 No Attempt made or i
elevant.






0
Task 2.1 Identify and describe two key risks to information stored in a data
centre elevated by poor physical security (about 300 words)
XXXXXXXXXXExcellent description of two risks to information elevated by poor physical security






0
XXXXXXXXXXVery good description of two risks to information elevated by poor physical security
XXXXXXXXXXGood description of two risks to information elevated by poor physical security
8 Average description of two risks to information elevated by poor physical security
6 Poor description of two risks to information elevated by poor physical security
4 Very poor description of two risks to information elevated by poor physical security
0 No Attempt made or i
elevant.
Task 2.2 Explain what physical security controls would be put in place in a data
centre to reduce these potential risks to security of information to an acceptable
level (about 500 words))
24 Excellent explanation of physical security controls reduce risks in data centre





0
20 Very good explanation of physical security controls reduce risks in data centre
XXXXXXXXXXGood explanation of physical security controls reduce risks in data centre
12 Average explanation of physical security controls reduce risks in data centre
XXXXXXXXXXPoor explanation of physical security controls reduce risks in data centre
XXXXXXXXXXVery poor explanation of physical security controls reduce risks in data centre
0 Not Attempt made or i
elevant.
Report is professionally structured and presented: cover page, table of contents,
heading and sub headings, page numbering with appropriate use of tables and
figures, writing style is clear and succinct grammatically co
ect and free from spelling
mistakes
10 Excellent report structure, presentation and writing style





0

8 Very good report structure, presentation and writing style
6 Good report structure, presentation and writing style
5 Average report structure, presentation and writing style
4 Poor report structure, presentation and writing style
0-3 Very poor report structure, presentation and writing style
Quality of Research and Referencing for each question evident in use of in text
eferencing acknowledging original sources of ideas presented in report and
complete reference list using Harvard referencing style provided for all references
cited in text in body of report
10 Excellent research of questions evident in text referencing and reference list





0
8 Very good research of questions evident in text referencing, reference list
7 Good research of questions evident in text referencing and reference list
5 Average research of questions evident in text referencing and reference list
3 Poor research of questions evident in text referencing and reference list
1 Very poor research of questions evident in text referencing, reference list.
0 No research of each task evident, no in text referencing, no reference list
Total Marks 0
Evidence of plagiarism or collusion (Yes/No)

Marker Comments:


CIS2005 Assignment 2

Description Marks out of Wtg(%) Word limit Due date
Assignment XXXXXXXXXXAUGUST
2018
SPECIFICATION
This assignment 2 assesses the following course objectives:
1. analyse information security vulnerabilities and threats and determine
appropriate controls that can be applied to mitigate the potential risks
2. communicate effectively both written and orally about the management of
information security in organisations.
This assignment 2 written report requires you to provide written answers to Tasks 1
and 2 that are supported by in text referencing and a reference list

Task 1 Role of people in operational security (40 marks)
Review the cu
ent literature on the role of people in operational security as a
potential risk to information assets versus a potential aide to improving security in
organisations
Task 1.1 Identify and describe two ways people could intentionally or unintentionally
compromise the information technology and communications assets in an
organisation (about 200 words)
Task 1.2 Describe how security awareness and training could facilitate people playing
a proactive role in improving the security of an organisation’s information technology
and communications assets (about 500 words)

Task 2 Physical security in a data centre (40 marks)
Review the cu
ent literature on the role of physical security in a data centre in order
to address the tasks
Task 2.1 Identify and describe two key risks to information stored in a data centre
elevated by poor physical security (about 300 words)
Task 2.2 Explain what physical security controls would be put in place in a data centre
to reduce these potential risks to security of information to an acceptable level (about
500 words)

Report structure and presentation, writing style (10 Marks) Report is professionally
structured and presented: cover page, table of contents, heading and sub headings, page
numbering with appropriate use of tables and figures, writing style is clear and succinct,
grammatically co
ect and free from spelling mistakes.
Quality of Research for each question evident in Referencing (10 Marks) appropriate
level of in text referencing acknowledging original sources of ideas presented in report,
eference list provides complete details for all references cited in body of report using
Harvard referencing style.

Harvard referencing resources
Install a bibliography referencing tool – Endnote which integrates with your word processor.
http:
www.usq.edu.au/li
ary
eferencing/endnote-bibliographic-software
USQ Li
ary how to reference co
ectly using the Harvard referencing system
https:
www.usq.edu.au/li
ary
eferencing/harvard-agps-referencing-guide
http:
www.usq.edu.au/li
ary
eferencing/endnote-bibliographic-software
https:
www.usq.edu.au/li
ary
eferencing/harvard-agps-referencing-guide
ASSIGNMENT SUBMISSION
1) The file naming guidelines are as follows:
a. It is important that you use this convention to ensure that assignments can be
tracked: Familyname_studentnumber_CIS2005_ASS2
i. Replace ‘familyname’ with YOUR family or surname
ii. Replace ‘studentnumber’ with YOUR student number (which starts with
‘00’)
2) Submit your assignment 2 using the Online Assignment 2 Submission link on the
Study Desk

3) Late submission of assignment work

a. Late assignments will be penalised unless permission has been granted by the
course leader BEFORE the assignment due date. Late assignments may be
penalised by reducing the allocated mark by 5% per day late.
GENERAL REQUIREMENTS
Using appropriate headings and sub-headings in your report to clearly identify each of the
equired questions and answers.
The report must be written in your own words.
1. Ideas obtained from sources must be included in your discussion by expressing the
idea in your words and citing the source using the Harvard Referencing style.

2. Direct quotes of more than five (5) words will not be considered a
demonstration of your knowledge and will be assessed accordingly
3. The assignment must be the expression of your own work. It is acceptable to discuss
course content with others to improve your understanding and clarify requirements, but
solutions to assignment questions must be done on your own. This also means that it is
not sufficient to merely paraphrase the entire assignment content from a textbook or
other source. Your assignment answers need be a reflection and synthesis of your
esearch of the associated topics. This should be evident in your in text referencing and
eference list.
4. You need to demonstrate your understanding of associated topics for each assignment.
You must not copy from anyone, including tutors and fellow students, nor provide copies
of your work to others.
5. Note carefully University policy on Academic Misconduct such as plagiarism, collusion
and cheating. If any of these occur they will be found and dealt with by the USQ
Academic Integrity Procedures. If proven, Academic Misconduct may result in failure of
an individual assessment, the entire course or exclusion from a University program or
programs.
http:
www.usq.edu.au/li
ary/help
eferencing/harvard.htm
http:
www.usq.edu.au/li
ary/help
eferencing/harvard.htm
http:
policy.usq.edu.au/documents/14132PL
http:
policy.usq.edu.au/documents/14727PL
http:
policy.usq.edu.au/documents/14727PL
Answered Same Day Aug 30, 2020 CIS2005

Solution

Ankit answered on Aug 31 2020
158 Votes
8
Student_Id    
                Student_Name
                Role of people in operational security
                Physical security in a data centre
Task 1.1 Role of people in operational security
“The two ways people could intentionally or unintentionally compromise the information technology and communications assets in an organisation by maintaining security monitoring tools and by investigating suspicious tasks”
1. First is by maintaining security monitoring tools: there is big role of people in effectively maintaining and secure the communication assets. There are number of tools available in an organization that people is checked and updated daily. If there are no tools available then it is impossible for people to secure network or communication assets in an organization. This is role and responsibility of people inside an organization to maintain tools to be used for security monitoring processes.
2. Second is by investigating suspicious tasks: the security monitoring tools used by people in an organization helps in investigating suspicious or unknown tasks within system and communication assets. The tools will make aware the suspicious or unknown tasks by giving alerts. The team of people in an organization then study the alerts and then evaluate the purpose of threat or vulnerabilities within system and communication assets. [Siemplify]
Similar to human or people, every organization may have different name for the roles in operational security but the type of responsibility is similar for very firm.
Task 1.2
“The Security awareness and training could facilitate people playing a proactive role in improving the security of an organisation’s information technology and communications assets”
Security awareness and training program play an important role in an organization as people get both basic level and advanced level security awareness and training which are effective for them. There are different security awareness programs like HIPAA, SOX, PCI DSS etc. There should be new-employ introduction training and yearly security training for security awareness and training program. The training program consists of classroom instructional courses, regular emails, online recordings, surveys, newsletter and perhaps infrequent visiting security lights. The program also consists of quarterly pamphlet that contains content on security subjects, which incorporates security-related crossword confuses, can likewise be utilized.
“The various free assets accessible on the internet, for example, NIST's OUCH! Security Awareness Newsletter. NIST additionally has a security awareness and training program (NIST Special Publication 800-50), as does Symantec” [Villegas]
In the case that people inside organization don't know or see how to keep up secrecy of data then it is not just hazard having one of their most significant business resources (data) misused, improperly utilized, or acquired by unapproved people, yet additionally chance being in resistance of a developing number of laws and controls that require certain sorts of data security and protection awareness and training tasks.
Security is fundamental to creating other awareness and training approach that is helpful presently and later on. The beginning stage is to perceive the...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here