NT2580 Graded Assignments

Topics: Security, Information security, Computer security Pages: 25 (5288 words) Published: October 24, 2013

Graded Assignments

STUDENT COPY

The following sections contain student copies of the assignments. These must be distributed to students prior to the due dates for the assignments. Online students will have access to these documents in PDF format, which will be available for downloading at any time during the course.

Graded Assignment Requirements

Assignment Requirements documents provided below must be printed and distributed to students for guidance on completing the assignments and submitting them for grading.

Instructors must remind students to retain all handouts and assignment documents issued in every unit, as well as student-prepared documentation and graded assignments. Some or all these documents will be used repeatedly across different units. Unit 1 Assignment 1: Match Risks/Threats to Solutions

Learning Objectives and Outcomes
You will learn how to match common risks or threats within the seven domains of a typical IT infrastructure with solutions and preventative actions.

Assignment Requirements
This is a matching activity. You will receive the Match Risks/Threats to Solutions worksheet, which contains a numbered list of common risks and threats found in a typical IT infrastructure. You must enter the letter for the correct solution or preventative action in the blank to the right of each risk or threat.

Required Resources
Worksheet: Match Risks/Threats to Solutions

Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Length: 1 page
Due By: Unit 2

Self-Assessment Checklist
I have correctly matched all the risks or threats within the seven domains of a typical IT infrastructure with the solutions and preventative actions.

Unit 1 Assignment 2: Impact of a Data Classification Standard

Learning Objectives and Outcomes
You will learn how to determine the impact of a data classification standard on an organization's IT infrastructure.

Assignment Requirements
You are a networking intern at Richman Investments, a mid-level financial investment and consulting firm. Your supervisor has asked you to draft a brief report that describes the “Internal Use Only” data classification standard of Richman Investments. Write this report addressing which IT infrastructure domains are affected by the standard and how they are affected. In your report, mention at least three IT infrastructure domains affected by the “Internal Use Only” data classification standard. Your report will become part of an executive summary to senior management.

Required Resources
None

Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Citation Style: Chicago Manual of Style
Length: 1–2 pages
Due By: Unit 2

Self-Assessment Checklist
I have identified at least three IT infrastructure domains affected by the “Internal Use Only” data classification standard. In my report, I have included details on how those domains are affected. Unit 2 Assignment 1: Calculate the Window of Vulnerability

Learning Objectives and Outcomes
You will learn how to calculate a window of vulnerability (WoV).

Assignment Requirements
You are reviewing the security status for a small Microsoft workgroup LAN. The workgroup contains many distinct separations in the network determined by group memberships. An example of the network divisions is as follows: Windows laptops: Traveling salespeople, remote suppliers, branch offices Windows desktops: Accounting group, developer group, customer service group Windows servers: Administrative server, Microsoft SharePoint server, Server Message Block (SMB) server

A security breach has been identified in which the SMB server was accessed by an unauthorized user due to a security hole. The hole was detected by the server software manufacturer the previous day. A patch will be available within three days. The LAN administrator needs at least one week to download, test, and install the patch. Calculate the WoV...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Security and Graded Assignment Requirements Essay
  • NT2580 Essay
  • NT2580 Research Paper
  • NT2580 Essay
  • Assignment 4 Nt2580 Essay
  • Essay about NT2580 Unit 1 Assignment 2
  • NT2580 Project part 1 Essay
  • NT2580 Unit 1 Assignment 2 Essay

Become a StudyMode Member

Sign Up - It's Free