Need A++ Case Studies M3_A2
tkilh1
Assignment 2: LASA 1: Dropbox Assignment
Security Policies
On the basis of your research and understanding, respond to the following:
- Commercial banks usually make their privacy policies publicly available. Locate a privacy policy from your financial institution and evaluate it in terms of core information system security concepts.
- Procure or define the corporate policy of a company of your choice. Compare the corporate policy with the security policy. Comment on the discrepancies if any. Suggest how alignment of corporate and security policies can be brought about.
- Think of a fictitious software house developing software for mission-critical applications. Develop measures to assess the level of maturity for each of the Systems Security Engineering Capability Maturity Model level. Suggest reasons why your measures should be adopted.
- Use one of the prescribed risk management approaches in the textbook to calculate the level of risks your department might face. Calculate the business impact and the extent of financial loss. After undertaking the exercise, comment on the usefulness of risk assessment in recognizing potential risks and generating relevant management strategies.
- Analyze examples from the popular press where a security breach has occurred because the security policy had not been followed. Undertake research to find reasons why the policy was not carried through and followed. Relate you findings to Information Security (IS) security planning principles discussed in this chapter.
Each response should consist of 1–2 pages in a Microsoft Word document.
Port Scanners
Port scanners are small utilities that can find all open ports on a host and even describe the types of services that run on such ports.
Create a report of 2–3 pages in a Microsoft Word document that includes the responses to the following:
Explain the port scanner research, providing a short description of each of the following:
- Compare and contrast different port scanners.
- Discuss how port scanners can be used for positive tasks.
- Describe how these tools can be used for malicious purposes.
Cite at least 5–10 references you reviewed using correct APA format. The references you cite must be reliable and should not include references from blogs and websites, such as Wikipedia. Support your answers with appropriate research and reasoning.
Support your responses with examples.
Cite any sources in APA format.
Submission Details
Name your report AUO_IST443_M3_A2_LastName_FirstInitial.doc.
Submit your report to the M3 Assignment 2 Dropbox by Tuesday, September 19, 2017.
Assignment 2 Grading CriteriaMaximum PointsEvaluated a privacy policy in terms of core information system security concepts.20Compared the corporate policy with the security policy and provided a suggestion for alignment of corporate and security policies.20Developed measures to assess the level of maturity for each SSE-CMM level, and provided reasons why measures should be adopted.20Analyzed the level of risk and business impact a department might face.20Analyzed how a security breech occurred due to failure to follow and carry out security policy as related to the IS security planning principles.36Compared, and contrasted various port scanners. Critically analyzed and explained how port scanners can be used for positive tasks and how these tools can be used for malicious purposes.44Wrote in a clear, concise, and organized manner; demonstrated ethical scholarship in accurate representation and attribution of sources (i.e. APA); and displayed accurate spelling, grammar, and punctuation.
Organization (12)
Usage and Mechanics (12)
APA Elements (12)
Style (4)
40Total:200
- 7 years ago
- 20
Purchase the answer to view it
- order_66939_161517.doc
- i need help with my history homework
- Vaccination essay
- dq topic 7 dq 1
- I will pay for this in full. I will not separate the payment. I trust any professor will do it.
- Please help with homework
- Person-Situation Interactions
- Eonomics
- Explain the value that professional nursing organizations have in networking and in the legislative process. Provide a rationale for your response.
- Module 02 Written Assignment - Job Motivation
- A chess piece is wandering around on an otherwise vacant 8×8 chessboard. At each move, the piece (a king, queen, rook, bishop, or knight) chooses uniformly at random where to go, among the legal choices (according to the rules of chess, which you should l