IT-476 IT Security & Policies

College of Computing and InformaticsAssignment 1
Deadline: Thursday 29/09/2024 @ 23:59
[Total Mark for this Assignment is 8]
Student Details:
Name: ###
ID: ###
CRN: ###
Instructions:
• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).
• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.
• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.
• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.
Restricted – ‫مقيد‬
Question One
Pg. 01
Learning
Outcome(s):
Question One
CLO1: Explain
What is the concept of a zero-day vulnerability, and why is it particularly dangerous?
Give a real example of zero-day attack in recent years and its impact.
networking and
security, security
issues, trends,
and security
resource.
CLO4: Analyze
problems related
to the field of
Security and
Information
Assurance.
Restricted – ‫مقيد‬
1.5 Marks
Question Two
Pg. 02
Learning
Outcome(s):
CLO1: Explain
networking and
security, security
issues, trends,
and security
resource.
CLO3: Develop
security policies
and put in place
an effective
security
architecture that
comprises
modern hardware
and software
technologies and
protocols
Restricted – ‫مقيد‬
Question Two
2 Marks
What are some real-world examples of organizations that have successfully
implemented CMM, and how did achieving higher maturity levels impact their project
outcomes and business success?
Question Three
Pg. 03
Learning
Outcome(s):
CLO2: Apply the
most appropriate
solutions to
problems related
to the field of
Security and
Information
Assurance
Restricted – ‫مقيد‬
Question Three
1.5 Marks
How do firewalls and intrusion detection/prevention systems (IDS/IPS) work together
to defend against network-based attacks? Provide one example of an attack that can be
mitigated by these security tools.
Question Four
Pg. 04
Learning
Outcome(s):
CLO4: Analyze
problems related
to the field of
Security and
Information
Assurance
Restricted – ‫مقيد‬
Question Four
3 Marks
What are the key security risks associated with storing sensitive data in the cloud
compared to on-premises data centers, and how can companies effectively leverage
encryption and access control to mitigate these risks? Additionally, what delineations of
responsibility exist between the company and the cloud provider in ensuring the security
of cloud-stored data?

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
Are you stuck with your online class?
Get help from our team of writers!

Order your essay today and save 20% with the discount code RAPID