2.Demonstrate a systematic understanding of the key approaches to cryptography and their application.
4. Create a risk analysis for a given scenario with reference to compliance with security policies.
5. Critically evaluate legal, social and ethical issues of secure systems.
Your assignment should include: a title page containing your student number, the module name, the submission deadline and a word count; the appendices if relevant; and a reference list in Arden University (AU) Harvard format. You should address all the elements of the assignment task listed below. Please note that tutors will use the assessment criteria set out below in assessing your work.
Maximum word count: 4000 words
High schools in the UK now rely on IT as much as any other organisation. As well as the curriculum facilities provided for teaching both Computer Science and all the other subjects, a high school is a big business, with a large turnover, many staff and large assets in terms of both buildings and equipment. As with any large business, a high school will rely on their IT facilities for the day to day running of the business, including finance, staff records (human resources), asset management and so on. On top of this, they hold extensive records relating to the children they teach, which puts added responsibilities on the school. As part of the day to day running of the school, they must share relevant data with a range of individuals and other organisations, including the pupils and staff, parents, employers, colleges and universities that pupils may progress to, suppliers, examination boards and the Department of Education. Clearly, some of this information may be vital and confidential.
Schools are also required to comply with various laws and government guidelines, including “Keeping Children Safe in Education” (KCSE) and the “General Data Protection Regulation” (GDPR). Details of these can be found with a simple on-line search.
Most high schools now use some variation on virtual learning environments (like iLearn) for some of their teaching, homework and internal assessing. All pupils, teaching staff and increasingly parents have access to these VLEs. Schools also use standard office suites, often through Microsoft’s Office 365 facilities which provides not only the standard office packages but also cloud storage and sharing facilities via OneDrive and SharePoint.
As a final complication, the school will have pupils who are studying computing to A level, are highly intelligent, knowledgeable and motivated and have plenty of time on their hands. The school network therefore presents them with an entertaining challenge to which they can apply their computing skills.
The computer facilities usually comprise a school wide local area network running Microsoft servers, Active Directory and local networked storage. They will run both wired and wireless Ethernet around the school and provide login via school PCs, laptops and tablets as well as allowing pupils and staff to bring their own devices to log in to the network. Obviously high schools have Internet connections, with dedicated lines providing 200Mbps being commonly used.
Write a report explaining how to secure a high school’s computer facilities.
This report should be aimed at the school’s network manager, who has studied computing at degree level but who has not studied a module in Computer Security. You may assume a degree level of knowledge of computing, including of data communications and networking and do not need to explain general computing terms or concepts. However, you must explain all security terminology, issues, technologies and other information.
You should write this assignment in coherent and appropriate English. Your report should be presented in a professional way with appropriate technical language, structure and organisation.
This is a final year degree module. At this stage in your studies, you are expected to be able to scope a report like this. You are also expected to provide comprehensive and technically detailed, as well as accurate and correct information.
You should discuss the security issues in terms of assets, vulnerabilities, risks and protection.
You should clearly focus on relevant security issues for this scenario rather than give generic discussions and solutions. Your solutions should be specific, down to the specific hardware, software, configurations and procedures required to provide suitable security for this scenario.
Your solutions should be appropriate, suitable and reasonable for this scenario. You should clearly link aspects of your solution with issues raised in the scenario.
Holding a PhD degree in Finance, Dr. John Adams is experienced in assisting students who are in dire need...
55 - Completed Orders
Canada, Toronto I have acquired my degree from Campion College at the University of Regina Occuption/Desi...
52 - Completed Orders
Even since I was a student in Italy I had a passion for languages, in fact I love teaching Italian, and I...
102 - Completed Orders
To work with an organization where I can optimally utilize my knowledge and skills for meeting challenges...
109 - Completed Orders
JOB OBJECTIVE Seeking entry level assignments in Marketing & Business Development with an organization...
202 - Completed Orders
Current work profile Project manager- The Researchers Hub (2nd Jan 2016 to presently working) Researc...
20 - Completed Orders
Sales Assistant, Mito Marina Assigned to the Stationery dept – assisted in merchandising, stock taking...
100 - Completed Orders