The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 3 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
Q1- There are seven successful policy characteristics, list them all and give one example from your experience for only one of these characteristics (NOT from the book).
6 Marks
Learning Outcome(s):
Distinguish between a policy, a standard, a baseline, a procedure, a guideline, and a plan.
Chapter 2
Singular and consolidate policy
Â
Q2-
a) What are the pros and cons of Singular and Consolidated policy format?
b) Is it necessary to include standards, baselines, guidelines or procedures in this policy document? Explain your answer.
6 Marks
Learning Outcome(s):
Writing style and technique - using PLAIN language
PLAIN language techniques for Policy writing
Chapter 2
PLAIN language
Â
Q3- The following table summarize changing password policy rules and related settingused in Windows Server Active Directory. Write the corresponding policy statement using PLAIN language.
|
Rule |
Setting |
|
Enforce password history |
24 password remembered |
|
Maximum password age |
42 days |
|
Minimum password age |
1 day |
|
Minimum password length |
7 |
|
Password complexity requirement |
Yes |
|
Store password using reversible encryption |
No |
6 Marks
Learning Outcome(s):
Information security framework
Chapter 3
Understanding CIA
Â
Q4-
a) Define the security term confidentiality. Provide an example of a health situation where confidentiality is required.
b) Define the security term integrity. Provide an example of a financial situation in which a loss of integrity could result in significant harm.
c) Define the security term availability. Provide an example of a business situation in which availability is more important than confidentiality.
Â
Â
College of Computing and Informatics IT Security and Policies
IT409 Assignment 1
Deadline: Day 04/03/2017 @ 23:59
[Total Mark for this Assignment is 25]
Student Details:
Name:### ID:### CRN:###
Instructions:
This Assignment must be submitted on Blackboard via the allocated folder.
Email submission will not be accepted.
You are advised to make your work clear and well-presented, marks may be reduced for poor presentation.
You MUST show all your work.
Late submission will result in ZERO marks being awarded.
Identical copy from students or other resources will result in ZERO marks for all involved students.
Convert this Assignment to PDF just before submission. Pg. 1 Assignment 1 Learning
Outcome(s): Policy characteristics Identity and Q1- There are seven successful policy characteristics, list them all and give understand the one example from your experience for only one of these characteristics (NOT characteristics of from the book). a successful
policy
Chapter 1 7 Marks Pg. 2 Assignment 1 Learning
Outcome(s): Singular and consolidate policy Distinguish Q2- between a policy,
a standard, a 6 Marks a) What are the pros and cons of Singular and Consolidated policy format? baseline, a b) Is it necessary to include standards, baselines, guidelines or procedures in procedure, a this policy document? Explain your answer. guideline, and a
plan.
Chapter 2 Assignment 1 Pg. 3
Learning
Outcome(s):
Writing style and
technique - using
PLAIN language 6 Marks PLAIN language Q3- The following table summarize changing password policy rules and related
settingused in Windows Server Active Directory. Write the corresponding policy
statement using PLAIN language. PLAIN language
techniques for
Policy writing Enforce password history 24 password remembered Chapter 2 Maximum password age 42 days Minimum password age 1 day Rule Minimum password length Setting 7 Password complexity requirement Yes Store password using reversible encryption No Pg. 4
Learning
Outcome(s):
Information
security
framework
Chapter 3 Understanding CIA Assignment 1
6 Marks Q4a) Define the security term confidentiality. Provide an example of a health
situation where confidentiality is required.
b) Define the security term integrity. Provide an example of a financial situation
in which a loss of integrity could result in significant harm.
c) Define the security term availability. Provide an example of a business
situation in which availability is more important than confidentiality.