Preview

NT2580 Graded Assignments

Better Essays
Open Document
Open Document
5288 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT2580 Graded Assignments
Graded Assignments

STUDENT COPY

The following sections contain student copies of the assignments. These must be distributed to students prior to the due dates for the assignments. Online students will have access to these documents in PDF format, which will be available for downloading at any time during the course.

Graded Assignment Requirements

Assignment Requirements documents provided below must be printed and distributed to students for guidance on completing the assignments and submitting them for grading.

Instructors must remind students to retain all handouts and assignment documents issued in every unit, as well as student-prepared documentation and graded assignments. Some or all these documents will be used repeatedly across different units.
Unit 1 Assignment 1: Match Risks/Threats to Solutions

Learning Objectives and Outcomes
You will learn how to match common risks or threats within the seven domains of a typical IT infrastructure with solutions and preventative actions.

Assignment Requirements
This is a matching activity. You will receive the Match Risks/Threats to Solutions worksheet, which contains a numbered list of common risks and threats found in a typical IT infrastructure. You must enter the letter for the correct solution or preventative action in the blank to the right of each risk or threat.

Required Resources
Worksheet: Match Risks/Threats to Solutions

Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Length: 1 page
Due By: Unit 2

Self-Assessment Checklist
I have correctly matched all the risks or threats within the seven domains of a typical IT infrastructure with the solutions and preventative actions.

Unit 1 Assignment 2: Impact of a Data Classification Standard

Learning Objectives and Outcomes
You will learn how to determine the impact of a data classification standard on an organization's IT infrastructure.

Assignment Requirements
You are a

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS3110: Unit 1 Role Scenario 1) Identify threats to the seven domains of IT within the organization: A. User: Destroy data B. Workstation: Loss of data, not updated C. LAN: Unauthorized user, weak password D. LAN –WAN: Hackers, weak traffic filtering E. WAN- FTP anon uploads, DoS/DDoS F. System Application: Fire, DoS/DDoS, SQL injection corrupting data G. Remote: user virus, remote from office unsecure, VPN tunnel hack 2) Identify vulnerabilities in the seven domains of IT within the organization. A. User: Infected media, social engineering B. Workstation: OS vulnerability, browser vulnerability C. LAN: Worms, LAN OS vulnerability D. LAN-WAN: malicious websites, unblocked ports E. WAN: network outages F. System Application: ISP…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    There are quite a few vulnerabilities that can affect organizations productivity. These vulnerabilities can be environmental, utilities & service, criminal behavior, equipment failure, and information security issues. To protect the organization against loss of productivity and data loss we have created an assessment of the potential danger each category of threat presents. We created a worksheet (located on the last page of this document) listing each type of vulnerability and ranked the probability and severity of each of the threats. Using a probability and severity legend that had one…

    • 2036 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    is3110 lab 1

    • 626 Words
    • 3 Pages

    How many threats and vulnerabilities did you find that impacted risk within each of the seven domains of a typical IT…

    • 626 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The following sections contain student copies of the assignments. These must be distributed to students prior to the due dates for the assignments. Online students will have access to these documents in PDF format, which will be available for downloading at any time during the course.…

    • 1245 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Psy/201 Course Syllabus

    • 1338 Words
    • 6 Pages

    Whenever there is a question about what assignments are due, please remember this syllabus is considered the ruling document.…

    • 1338 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Mgt 311 Syllabus

    • 3537 Words
    • 15 Pages

    Whenever there is a question about what assignments are due, please remember this syllabus is considered the ruling document.…

    • 3537 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    Risk Management

    • 622 Words
    • 3 Pages

    To assess risks and vulnerabilities with the operating IT facilities we must create a mitigation plan. The mitigation plan will ensure what actions or steps to take when a risk were to occur. If the company were to experience risk such as fire, users outages, remote access, opening unknown e-mail attachment or have equipment failure, the mitigation plan will let you know…

    • 622 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Denise Clark, Joseph Huiet, Anthony Brown, Orlando Rodriguez, Niko Budworth, Cory Mooney, Armando Rocha, Denny Hoang…

    • 454 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    IS3110 Lab 6

    • 734 Words
    • 3 Pages

    A user inserts a CD or USB hard drive with personal photos, music, and videos on organization owned computers. A good antivirus program and have all devices scanned as soon as they are plugged in. Educate employees Disable optical drives/USB ports.…

    • 734 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    A hard copy of the first page of this document to be attached to the assignment with your details.…

    • 857 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Incident response is usually one of those security areas that tend to be impromptu—companies don 't think about it until they have to. But that needs to change. In this paper I will discuss five steps - identification, containment, eradication, and recovery and follow up a business use to effectively response to a security threat and I will suggest four actions -use encryption and passwords, e-mail protection, install antivirus software, install workstation firewalls a businesses can take to effectively prevent a security incident in the future.…

    • 1280 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    report

    • 4220 Words
    • 19 Pages

    Your assignments must be submitted as either Word documents, text documents with .rtf extension or as .pdf documents. If you wish to submit in any other file format please discuss this with your lecturer well before the assignment submission date.…

    • 4220 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    Assignment

    • 3821 Words
    • 16 Pages

    In an organisation there will always be threat of IT security. My organisation is about security threats. In security you get all kinds of threats such as viruses, spam, malware and network monitoring, lost emails, data theft, lost data, time wasting and employees.…

    • 3821 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    Mr Shi

    • 738 Words
    • 3 Pages

    Details of the work required and the contents of the submission are included in the hand-out During your work you should take pay full attention to the information in the Departmental booklet “Notes on preparation, production and submission of coursework”…

    • 738 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    1. Completed assignments must be hand written neatly and hard copies should be submitted on or before the dates mentioned above. (January 30 th , 2013) 2. Ensure that you answer all questions according to the marks allocated. 3. Content that has been directly copied from the Internet will NOT be accepted. 4. Please attempt all the assignments individually and independently. Assignments that have been copied and shared among students will be automatically rejected and disqualified. 5. All students must sign the acknowledgement sheet while submitting assignments. 6. Late submissions will NOT be accepted. 7. Follow…

    • 431 Words
    • 2 Pages
    Satisfactory Essays