The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Jul 2017 |
| Last Sign in: | 304 Weeks Ago, 2 Days Ago |
| Questions Answered: | 15833 |
| Tutorials Posted: | 15827 |
MBA,PHD, Juris Doctor
Strayer,Devery,Harvard University
Mar-1995 - Mar-2002
Manager Planning
WalMart
Mar-2001 - Feb-2009
the questions in the Attach file ..........................................................................................................................................................................................................................................................
Â
|
             |
|
Security program and policies IT409 |
Â
|
Instructions: |
|
·      This Assignment must be submitted on Blackboard via the allocated folder. ·      Email submission will not be accepted. ·      You are advised to make your work clear and well-presented, marks may be reduced for poor presentation. ·      You MUST show all your work. ·      Late submission will result in ZERO marks being awarded. ·      Identical copy from students or other resources will result in ZERO marks for all involved students. ·      Convert this Assignment to PDF just before submission. |
|
   Â
 |
Compare and contrast symmetric and asymmetric key cryptography with examples.
Â
Â
|
5 # Marks |
|
Learning Outcome(s): understanding System security requirements chapter 10 Â Â Â Â Â Â |
The systems development lifecycle (SDLC) provides a standardized process for all phases of any system development. What are the different phases involved in SDLC give a brief note on all its phases in your own words.
Â
|
10# Marks |
|
Learning Outcome(s): learn more about network segmentations chapter 9 Â Â Â Â Â Â |
What is network segmenting? List four different types of network segments and provide examples for each from your daily life.
Â
Â
Â
                Â
|
9# Marks |
|
Learning Outcome(s): understand incident severity levels. Chapter 11 Â Â Â Â Â Â |
In the table below, explain what would happen in every attack based on the severity level.
Â
|
Â
|
Ordinary Impact is minimal |
Medium Impact is moderate |
Severe Impact is significant |
||
|
Distributed denial service of attack |
 |
 |
 |
||
|
Social Engineering |
 |
 |
 |
||
|
Viruses/warms |
 |
 |
 |
----------- Â ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly