0% found this document useful (0 votes)
398 views3 pages

Unit 5 - Assignment 1 Brief

Uploaded by

Cục Muối
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
398 views3 pages

Unit 5 - Assignment 1 Brief

Uploaded by

Cục Muối
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Assessment Brief

Qualification BTEC Level 5 HND Diploma in Computing

Unit number Unit 5: Security

Assignment title Security Presentation

Academic Year 2020

Unit Tutor

Issue date Submission date


IV name and date Khoa Canh Nguyen, Michael Omar, Nhung 9th/01/2020

Submission Format
The submission is in the form of two documents/files:

1. A ten-minute Microsoft® PowerPoint® style presentation to be presented to your colleagues.

The presentation can include links to performance data with additional speaker notes and a

bibliography using the Harvard referencing system. The presentation slides for the

findings should be submitted with speaker notes as one copy.

2. A detailed report that provides more thorough, evaluated or critically reviewed technical

information on all of the topics.

You are required to make use of the font Calibri, Font size 12, Line spacing 1.5, Headings, Paragraphs, Subsections
and illustrations as appropriate, and all work must be supported with research and referenced using the Harvard
referencing system.

Unit Learning Outcomes


LO1 Assess risks to IT security.
LO2 Describe IT security solutions.
Assignment Brief and Guidance
You work as a trainee IT Security Specialist for a leading Security consultancy in Vietnam called FPT
Information security FIS.

FIS works with medium sized companies in Vietnam, advising and implementing technical solutions to
potential IT security risks. Most customers have outsourced their security concerns due to lacking the
technical expertise in house. As part of your role, your manager Jonson has asked you to create an engaging
presentation to help train junior staff members on the tools and techniques associated with identifying and
assessing IT security risks together with the organizational policies to protect business critical data and
equipment.

In addition to your presentation you should also provide a detailed report containing a technical review of the
topics covered in the presentation.

Your presentation should:

1. Identify the security threats FIS secure may face if they have a security breach. Give an example of
a recently publicized security breach and discuss its consequences
2. Describe a variety of organizational procedures an organization can set up to reduce the effects to
the business of a security breach.
3. Propose a method that FIS can use to prioritize the management of different types of risk
4. Discuss three benefits to FIS of implementing network monitoring system giving suitable reasons.
5. Investigate network security, identifying issues with firewalls and IDS incorrect configuration and
show through examples how different techniques can be implemented to improve network
security.
6. Investigate a ‘trusted network’ and through an analysis of positive and negative issues determine
how it can be part of a security system used by FIS.

Your detailed report should include a summary of your presentation as well as additional, evaluated or
critically reviewed technical notes on all of the expected topics.

Learning Outcomes and Assessment Criteria

Pass Merit Distinction

LO1 Assess risks to IT security

P1 Identify types of security threat to M1 Propose a method to LO1 & 2


organisations. assess and treat IT security D1 Investigate how a ‘trusted
Give an example of a recently publicized risks. network’ may be part of an
security breach and discuss its IT security solution.
consequences.
P2 Describe at least 3 organisational
security procedures.

LO2 Describe IT security solutions

P3 Identify the potential impact to IT M2 Discuss three benefits to


security of incorrect configuration of implement network
firewall policies and IDS. monitoring systems with
supporting reasons.
P4 Show, using an example for each,
how implementing a DMZ, static IP
and NAT in a network can improve
Network Security.

You might also like