Need A++ Case Studies M3_A2

profiletkilh1

 

Assignment 2: LASA 1: Dropbox Assignment

Security Policies

On the basis of your research and understanding, respond to the following:

  • Commercial banks usually make their privacy policies publicly available. Locate a privacy policy from your financial institution and evaluate it in terms of core information system security concepts.
  • Procure or define the corporate policy of a company of your choice. Compare the corporate policy with the security policy. Comment on the discrepancies if any. Suggest how alignment of corporate and security policies can be brought about.
  • Think of a fictitious software house developing software for mission-critical applications. Develop measures to assess the level of maturity for each of the Systems Security Engineering Capability Maturity Model level. Suggest reasons why your measures should be adopted.
  • Use one of the prescribed risk management approaches in the textbook to calculate the level of risks your department might face. Calculate the business impact and the extent of financial loss. After undertaking the exercise, comment on the usefulness of risk assessment in recognizing potential risks and generating relevant management strategies.
  • Analyze examples from the popular press where a security breach has occurred because the security policy had not been followed. Undertake research to find reasons why the policy was not carried through and followed. Relate you findings to Information Security (IS) security planning principles discussed in this chapter.

Each response should consist of 1–2 pages in a Microsoft Word document.

Port Scanners

Port scanners are small utilities that can find all open ports on a host and even describe the types of services that run on such ports.

Create a report of 2–3 pages in a Microsoft Word document that includes the responses  to the following:

Explain the port scanner research, providing a short description of each of the following:

  • Compare and contrast different port scanners.
  • Discuss how port scanners can be used for positive tasks.
  • Describe how these tools can be used for malicious purposes.

Cite at least 5–10 references you reviewed using correct APA format. The references you cite must be reliable and should not include references from blogs and websites, such as Wikipedia. Support your answers with appropriate research and reasoning.

Support your responses with examples.

Cite any sources in APA format.

Submission Details

Name your report AUO_IST443_M3_A2_LastName_FirstInitial.doc.

Submit your report to the M3 Assignment 2 Dropbox by Tuesday, September 19, 2017.

Assignment 2 Grading CriteriaMaximum PointsEvaluated a privacy policy in terms of core information system security concepts.20Compared the corporate policy with the security policy and provided a suggestion for alignment of corporate and security policies.20Developed measures to assess the level of maturity for each SSE-CMM level, and provided reasons why measures should be adopted.20Analyzed the level of risk and business impact a department might face.20Analyzed how a security breech occurred due to failure to follow and carry out security policy as related to the IS security planning principles.36Compared, and contrasted various port scanners. Critically analyzed and explained how port scanners can be used for positive tasks and how these tools can be used for malicious purposes.44Wrote in a clear, concise, and organized manner; demonstrated ethical scholarship in accurate representation and attribution of sources (i.e. APA); and displayed accurate spelling, grammar, and punctuation.

Organization (12)
Usage and Mechanics (12)
APA Elements (12)
Style (4)
40Total:200
Copyright

Content Alert button 

    • 7 years ago
    • 20
    Answer(1)

    Purchase the answer to view it

    blurred-text
    NOT RATED
    • attachment
      order_66939_161517.doc