SophiaPretty

(5)

$14/per page/Negotiable

About SophiaPretty

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Algebra See all
Accounting,Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Communications,Computer Science,Economics,Engineering,English,Environmental science,Essay writing Hide all
Teaching Since: Jul 2017
Last Sign in: 304 Weeks Ago, 2 Days Ago
Questions Answered: 15833
Tutorials Posted: 15827

Education

  • MBA,PHD, Juris Doctor
    Strayer,Devery,Harvard University
    Mar-1995 - Mar-2002

Experience

  • Manager Planning
    WalMart
    Mar-2001 - Feb-2009

Category > Computer Science Posted 13 Dec 2017 My Price 10.00

Late submission will result in ZERO marks being awarded.

the questions in the Attach file ..........................................................................................................................................................................................................................................................

 

    

    

    

 

Security program and policies

IT409


 

Instructions:

·       This Assignment must be submitted on Blackboard via the allocated folder.

·       Email submission will not be accepted.

·       You are advised to make your work clear and well-presented, marks may be reduced for poor presentation.

·       You MUST show all your work.

·       Late submission will result in ZERO marks being awarded.

·       Identical copy from students or other resources will result in ZERO marks for all involved students.

·       Convert this Assignment to PDF just before submission.

    

 

 

 

Name:###

 

CRN:###

 

ID:###

 

 

 

 

 


6#Marks

Learning Outcome(s):

understanding Cryptography chapter 10

 

 

 

 

 

 

 

Question One

Compare and contrast symmetric and asymmetric key cryptography with examples.

 

 

5 # Marks

Learning Outcome(s):

understanding System security requirements chapter 10

 

 

 

 

 

 

Question Two

The systems development lifecycle (SDLC) provides a standardized process for all phases of any system development. What are the different phases involved in SDLC give a brief note on all its phases in your own words.

 

10# Marks

Learning Outcome(s):

learn more about network segmentations chapter 9

 

 

 

 

 

 

Question Three

What is network segmenting? List four different types of network segments and provide examples for each from your daily life.

 

 

 

                 

9# Marks

Learning Outcome(s):

understand incident severity levels. Chapter 11

 

 

 

 

 

 

Question Four

In the table below, explain what would happen in every attack based on the severity level.

 

 

Severity level

Attack

Ordinary

Impact is minimal

Medium

Impact is moderate

Severe

Impact is significant

Distributed denial service of attack

 

 

 

Social Engineering

 

 

 

Viruses/warms

 

 

 

 

Attachments:

Answers

(5)
Status NEW Posted 13 Dec 2017 10:12 AM My Price 10.00

-----------  ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly

Not Rated(0)