+1(978)310-4246 credencewriters@gmail.com
  

College of Computing and Informatics
Assignment-1
Deadline: Day 3/7/2022 @ 23:59
[Total Mark for this Assignment is 15]
Student Details:
Name: ###
ID: ###
CRN: ###
Instructions:
• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).
• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the
cover page.
• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.
• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.
Question One
Pg. 01
Learning
Outcome(s):
Develop security
policies and put in
place an effective
security
architecture that
comprises
modern hardware
and software
technologies and
protocols
Question One
Why do standards change more often than policies?
Answer:
3 Marks
Question Two
Pg. 02
Learning
Outcome(s):
Demonstrate
processes to
implement and
enforce policy.
3 Marks
Question Two
A company decided to implement a security control that grants access to the
office via fingerprint. However, some employees have defective fingerprints.
Briefly discuss how this issue could be resolved in a security policy.
Answer:
Question Three
Pg. 03
Learning
Outcome(s):
Develop security
policies and put in
place an effective
security
architecture that
comprises
modern hardware
and software
technologies and
protocols
3 Marks
Question Three
Write a procedure to claim a forgotten password?
Answer:
Question Four
Pg. 04
Learning
Outcome(s):
LO1: Apply
effective, proper,
3 Marks
Question Four
Accountability and Accounting are fundamental objectives and attributes of an
information security program, by using your own word explain the difference
between them with one example for accounting?
and state-of-theart security tools
and technologies.
Answer:
Question Five
Pg. 05
Learning
Outcome(s):
3 Marks
Question Five
List and Discuss NIST Functions that could improve information systems
LO3: Develop
security policies
and put in place
an effective
security
architecture that
comprises
modern hardware
and software
technologies and
protocols
security (using your own word)?
Answer:

Purchase answer to see full
attachment

  
error: Content is protected !!