SECURITY-BSA180022-NGUYENDINHDUY.docx - ASSIGNMENT BRIEF SHEET Qualification Pearson BTEC Level 5 HND Diploma in Computing Unit number and title Unit 5

SECURITY-BSA180022-NGUYENDINHDUY.docx - ASSIGNMENT BRIEF...

This preview shows page 1 - 6 out of 65 pages.

ASSIGNMENT BRIEF SHEET Qualification Pearson BTEC Level 5 HND Diploma in Computing Unit number and title Unit 5 : Security Assignment due Assignment submitted December 28th,2019 Learner’s name NGUYEN DINH DUY Assessor name Tu Duong Thien Learner declaration: I certify that the work submitted for this assignment is my own and research sources are fully acknowledged. Learner signature Date December 28th,2019 Grading grid P1 P2 P3 P4 P5 P6 P7 P8 P9 P10 M1 M2 M3 D1 D2 D3 Learning Outcomes and Assessment Criteria
Image of page 1
Pass Merit Distinction LO1 Assess risks to IT security LO1 & 2 D1 Evaluate a minimum of three of physical and virtual security measures that can be employed to ensure the integrity of organizational IT security. P1 Identify types of security risks to organizations. P2 Describe organizational security procedures. M1 Propose a method to assess and treat IT security risks. LO2 Describe IT security solutions P3 Identify the potential impact to IT security of incorrect configuration of firewall policies and third party VPNs. Cau hinh VPN,firewall Cau hinh sai VPN Potential cua cau hinh sai P4 Show, using an example for each, how implementing a DMZ, static IP and NAT in a network can improve Network Security. M2 Discuss three benefits to implement network monitoring systems with supporting reasons. LO3 Review mechanisms to control organizational IT security D2 Consider how IT security can be aligned with organizational policy, detailing the security impact of any misalignment. P5 Discuss risk assessment procedures. P6 Explain data protection processes and regulations as applicable to an organization. M3 Summarize the ISO 31000 risk management methodology and its application in IT security. M4 Discuss possible impacts to organizational security resulting from an IT security audit. LO4 Manage organizational security D3 Evaluate the suitability of the tools used in an
Image of page 2
organizational policy. P7 Design and implement a security policy for an organization. P8 List the maincomponents of anorganizational disasterrecovery plan, justifying thereasons for inclusion. Summative feedback Assessor’s Signature Date December 28 th ,2019
Image of page 3
<ATTACHED EVIDENCE>
Image of page 4
LO1 Assess risks to IT security P1 Identify types of security risks to organizations.What Is Information Systems Security?
Image of page 5
Image of page 6

You've reached the end of your free preview.

Want to read all 65 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture