The portfolio should cover the following Case study / Scenario: You work as an IT Security Specialist for a consultancy.

computer science

Description

Approx. 700-word limit for each part (1,2 & 3)

Assessment Deliverables:

The portfolio should cover the following Case study / Scenario:

You work as an IT Security Specialist for a consultancy. As part of your role, you have been asked you to create a portfolio to help staff members on the tools and techniques associated with identifying and assessing IT security risks together with the organisational policies to protect business critical data and equipment.

1)      Create a basic security audit of a familiar situation (e.g. home, workplace) paying attention to assets, threats, vulnerabilities, risks and responses, Configuration and use of security tools such as VPN and others.

 

2)      Identify and explain the different types of security risks to individuals’ organisations. Address unauthorised use of a system; unauthorised removal or copying of data or code from a system; damage to or destruction of physical system assets and environment; damage to or destruction of data or code inside or outside the system and naturally occurring risks. You may include a survey or quiz given to users.

 

3)      Describe Organisational Security Procedures. This may include security legislation, technology solutions and the management associated with operating effective IT security procedures. Propose a method to assess and treat IT security risks. A review of different security technologies supported with the tools and software used to develop effective IT security practice in an organisation. You may discuss the importance of Business continuance, backup and restoration of data, audits and testing procedures put into place for security of the system. You may discuss the network security, the impact of security breaches through WAN, intranets and wireless access system

Formatting requirements

·         Harvard referencing format must be used to credit secondary research sources. In-text citations should be included within your discussion (where relevant) using the author-date format and full reference details should be included in your bibliography.

·         Diagrams should be captioned and discussed in the body of your report.

·         A table of contents should be included

·         Page numbers should be inserted in the centre of the footer.

 


Related Questions in computer science category