insider attack , cryptogrraphy, password policy – Term Paper Buddy | termpaperbuddy.com
Information Systems – Term Paper Buddy | termpaperbuddy.com
Writeminimum600 words foreachof the three questions given below. All questions are of equal value (25 marks each). You should provide credible references for each question according to the Faculty guidelines. Although there is no rigid maximum word limit, around 850 words maximum, per question will be appropriate.Topic 1 – Introduction to Information SecurityQuestion 1Insider attacks are launched by malicious users who are entrusted with authorized access of a system.Research the issue of Insider Attack in the context of cybersecurity and report your findings. Your report should include the following details: what Insider Attackmeans; motivation; types of insider attacks; and detection mechanisms. Incorporate appropriate diagrams and examples in your answer.Topic 2 – CryptographyQuestion 2Compare and contrast the concepts of hashing and encryption. You may use the following criteria for comparison: Description, popular algorithms, applications, strengths, limitations (if any) and also recent research trends. Incorporate appropriate diagrams and examples in your answer.Topics 3 & 4 – Network Security fundamentals 1 & 2Question 3The following link presents a guide for Windows 10 hardening from the Australian Signals Directorate (ASD):https://www.cyber.gov.au/publications/hardening-microsoft-windows-10-build-1709Present an analysis of thePassword Policygiven in this document. Also justify thepriority levelused for the Password Policy.Rationaleback to topThis assessment task will assess the following learning outcome/s:be able to explain fundamental information security concepts.be able to discuss and debate some of the security implications of computer networks, including cryptography.Marking criteria and standardsback to topCriteriaHD100% – 85%DI84% – 75%CR74% – 65%PS64% – 50%FL49% – 0Able to apply theories and concepts to analyse IT security implicationsDemonstrates comprehensive understanding of the relevant IT security perspectives. Correct application of the theories and concepts through indepth discussion, providing highly relevant real world examples.Demonstrated clear understanding of the relevant IT security perspectives. Correct application of the theories and mostly comprehensive analysis with suitable examples.Correct application of the IT Security perspective and mostly comprehensive analysis with suitable examples.Mostly correct application of the IT security perspective; includes reasonable level of analysis. Some omission.Major omissions in the application of the IT security concepts and the analysis.Demonstrates application of research skills through the critical analysis and evaluation of relevant literatureLiterature and sources presented is evidence of high level application of research skills; with comprehensive and critical appraisal of the literature and discussion of theory supported by sources in addition to those recommended in the course content. Referencing style has no mistakes.Clear evidence of research relevant to the subject; able to critically appraise the literature and theory gained from a variety of sources. Referencing style correctly used.Clear evidence of research relevant to the subject; uses indicative texts identified. Referencing style correctly used. Minor omissions only.Some evidence of research. Some mistake in referencing style.Either no evidence of literature being consulted or cited references irrelevant to the assignment set.Written communication is scholarly in tone and purpose, and conforms to scholarly writing requirements.The tone and style is exemplary, and is appropriate to the content of the scholarly review.Mostly Fluent writing style appropriate for the assignment with accurate grammar and spelling.Mostly fluent writing style appropriate for the assignment with mostly accurate grammar and spelling. Minor omissions only.Requirementsback to topAll sources of information must be appropriately referenced using the APA style ( http://student.csu.edu.au/library/integrity/referencing-at-csu )there are slides available in the files section to get fromm those as wellNOTE it has to be submit on the turnitin so do the work that is not going to catch for plagiarism.
| Term Paper Buddy | termpaperbuddy.com
It begins when the user submits their assignment order form, which is visible to our whole database of professional writers. After reading your order requirements and assessing whether they are qualified to do it, writers submit offers or “bids” to write your paper. In their bid, they include working conditions and the price they charge. You are free to check out each potential writer’s background on their profile page. You can also contact them through our chat, ask questions and get answers in real-time. It’ll help you to determine which writer is better to select.