ComputerScienceExpert

(11)

$18/per page/

About ComputerScienceExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Applied Sciences,Calculus See all
Applied Sciences,Calculus,Chemistry,Computer Science,Environmental science,Information Systems,Science Hide all
Teaching Since: Apr 2017
Last Sign in: 103 Weeks Ago, 3 Days Ago
Questions Answered: 4870
Tutorials Posted: 4863

Education

  • MBA IT, Mater in Science and Technology
    Devry
    Jul-1996 - Jul-2000

Experience

  • Professor
    Devry University
    Mar-2010 - Oct-2016

Category > Programming Posted 29 Apr 2017 My Price 11.00

College of Computing and Informatics IT Security and Policies

Q1- There are seven successful policy characteristics, list them all and give one example from your experience for only one of these characteristics (NOT from the book).

6 Marks

Learning Outcome(s):

Distinguish between a policy, a standard, a baseline, a procedure, a guideline, and a plan.

Chapter 2

Singular and consolidate policy

 

Q2-

a) What are the pros and cons of Singular and Consolidated policy format?

b) Is it necessary to include standards, baselines, guidelines or procedures in this policy document? Explain your answer.

6 Marks

Learning Outcome(s):

Writing style and technique - using PLAIN language

PLAIN language techniques for Policy writing

Chapter 2

PLAIN language

 

Q3- The following table summarize changing password policy rules and related settingused in Windows Server Active Directory. Write the corresponding policy statement using PLAIN language.

Rule

Setting

Enforce password history

24 password remembered

Maximum password age

42 days

Minimum password age

1 day

Minimum password length

7

Password complexity requirement

Yes

Store password using reversible encryption

No

6 Marks

Learning Outcome(s):

Information security framework

Chapter 3

Understanding CIA

 

Q4-

a) Define the security term confidentiality. Provide an example of a health situation where confidentiality is required.

b) Define the security term integrity. Provide an example of a financial situation in which a loss of integrity could result in significant harm.

c) Define the security term availability. Provide an example of a business situation in which availability is more important than confidentiality.

 

 

College of Computing and Informatics IT Security and Policies
IT409 Assignment 1
Deadline: Day 04/03/2017 @ 23:59
[Total Mark for this Assignment is 25]
Student Details:
Name:### ID:### CRN:###
Instructions:
This Assignment must be submitted on Blackboard via the allocated folder.
Email submission will not be accepted.
You are advised to make your work clear and well-presented, marks may be reduced for poor presentation.
You MUST show all your work.
Late submission will result in ZERO marks being awarded.
Identical copy from students or other resources will result in ZERO marks for all involved students.
Convert this Assignment to PDF just before submission. Pg. 1 Assignment 1 Learning
Outcome(s): Policy characteristics Identity and Q1- There are seven successful policy characteristics, list them all and give understand the one example from your experience for only one of these characteristics (NOT characteristics of from the book). a successful
policy
Chapter 1 7 Marks Pg. 2 Assignment 1 Learning
Outcome(s): Singular and consolidate policy Distinguish Q2- between a policy,
a standard, a 6 Marks a) What are the pros and cons of Singular and Consolidated policy format? baseline, a b) Is it necessary to include standards, baselines, guidelines or procedures in procedure, a this policy document? Explain your answer. guideline, and a
plan.
Chapter 2 Assignment 1 Pg. 3
Learning
Outcome(s):
Writing style and
technique - using
PLAIN language 6 Marks PLAIN language Q3- The following table summarize changing password policy rules and related
settingused in Windows Server Active Directory. Write the corresponding policy
statement using PLAIN language. PLAIN language
techniques for
Policy writing Enforce password history 24 password remembered Chapter 2 Maximum password age 42 days Minimum password age 1 day Rule Minimum password length Setting 7 Password complexity requirement Yes Store password using reversible encryption No Pg. 4
Learning
Outcome(s):
Information
security
framework
Chapter 3 Understanding CIA Assignment 1
6 Marks Q4a) Define the security term confidentiality. Provide an example of a health
situation where confidentiality is required.
b) Define the security term integrity. Provide an example of a financial situation
in which a loss of integrity could result in significant harm.
c) Define the security term availability. Provide an example of a business
situation in which availability is more important than confidentiality.

Attachments:

Answers

(11)
Status NEW Posted 29 Apr 2017 04:04 AM My Price 11.00

-----------

Not Rated(0)