Cyber Security Question

Annual Report

FY [Year]

[Add a quote here from one of your company executives or use this space for a brief summary of the document content.]

 

IT Security and Policies

IT409

 

Instructions:
·       You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format.

·       It is your responsibility to check and make sure that you have uploaded both the correct files.

·       Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets, convert text into image or languages other than English or any kind of manipulation).

·       Email submission will not be accepted.

·       You are advised to make your work clear and well-presented. This includes filling your information on the cover page.

·       You must use this template, failing which will result in zero mark.

·       You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.

·       Late submission will result in ZERO mark.

·       The work should be your own, copying from students or other resources will result in ZERO mark.

·       Use Times New Roman font for all your answers.

 

     
Name: ###

 

CRN: ###

  ID: ###

 

     

 

 

3 Marks

Learning Outcome(s):

Develop security policies and put in place an effective security architecture that comprises modern hardware and software technologies and protocols

 

 

 

 

 

 

 

Question One

Why do standards change more often than policies?

Answer:

3 Marks

Learning Outcome(s):

Demonstrate processes to implement and enforce policy.

 

 

 

 

 

Question Two

A company decided to implement a security control that grants access to the office via fingerprint. However, some employees have defective fingerprints.

Briefly discuss how this issue could be resolved in a security policy.

Answer:

3 Marks
Learning Outcome(s):

Develop security policies and put in place an effective security architecture that comprises modern hardware and software technologies and protocols

 

 

 

 

 

 

Question Three

Write a procedure to claim a forgotten password?

Answer:

 

 

3 Marks
Learning Outcome(s):

LO1: Apply effective, proper, and state-of-the-art security tools and technologies.

 

 

 

 

Question Four

Accountability and Accounting are fundamental objectives and attributes of an information security program, by using your own word explain the difference between them with one example for accounting?

Answer:

 

 

 

 

 

 

 

 

 

 

 

3 Marks
Learning Outcome(s):

LO3: Develop security policies and put in place an effective security architecture that comprises modern hardware and software technologies and protocols

 

 

 

 

Question Five

List and Discuss NIST Functions that could improve information systems security (using your own word)?

Answer:

 

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.