Unit 5 - Assignment 1 Brief
Unit 5 - Assignment 1 Brief
Unit Tutor
Submission Format
The submission is in the form of two documents/files:
The presentation can include links to performance data with additional speaker notes and a
bibliography using the Harvard referencing system. The presentation slides for the
2. A detailed report that provides more thorough, evaluated or critically reviewed technical
You are required to make use of the font Calibri, Font size 12, Line spacing 1.5, Headings, Paragraphs, Subsections
and illustrations as appropriate, and all work must be supported with research and referenced using the Harvard
referencing system.
FIS works with medium sized companies in Vietnam, advising and implementing technical solutions to
potential IT security risks. Most customers have outsourced their security concerns due to lacking the
technical expertise in house. As part of your role, your manager Jonson has asked you to create an engaging
presentation to help train junior staff members on the tools and techniques associated with identifying and
assessing IT security risks together with the organizational policies to protect business critical data and
equipment.
In addition to your presentation you should also provide a detailed report containing a technical review of the
topics covered in the presentation.
1. Identify the security threats FIS secure may face if they have a security breach. Give an example of
a recently publicized security breach and discuss its consequences
2. Describe a variety of organizational procedures an organization can set up to reduce the effects to
the business of a security breach.
3. Propose a method that FIS can use to prioritize the management of different types of risk
4. Discuss three benefits to FIS of implementing network monitoring system giving suitable reasons.
5. Investigate network security, identifying issues with firewalls and IDS incorrect configuration and
show through examples how different techniques can be implemented to improve network
security.
6. Investigate a ‘trusted network’ and through an analysis of positive and negative issues determine
how it can be part of a security system used by FIS.
Your detailed report should include a summary of your presentation as well as additional, evaluated or
critically reviewed technical notes on all of the expected topics.