0% found this document useful (0 votes)
78 views3 pages

1 - Unit 5 - Assignment Brief 2

The document provides an assignment brief for a security presentation. It outlines 3 tasks for the student to complete. Task 1 involves preparing a report considering security risks, data protection regulations, potential impacts of an IT security audit, and employee responsibilities. Task 2 involves designing and implementing a security policy for a manufacturing company, including justifying components of a disaster recovery plan. Task 3 evaluates proposed security tools and how they align with implementing and administering security policies. The brief also lists learning outcomes and assessment criteria for the assignment.

Uploaded by

Phát Trần
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
78 views3 pages

1 - Unit 5 - Assignment Brief 2

The document provides an assignment brief for a security presentation. It outlines 3 tasks for the student to complete. Task 1 involves preparing a report considering security risks, data protection regulations, potential impacts of an IT security audit, and employee responsibilities. Task 2 involves designing and implementing a security policy for a manufacturing company, including justifying components of a disaster recovery plan. Task 3 evaluates proposed security tools and how they align with implementing and administering security policies. The brief also lists learning outcomes and assessment criteria for the assignment.

Uploaded by

Phát Trần
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Assignment Brief 2 (RQF)

Higher National Certificate/Diploma in Computing

Student Name/ID Number:


Unit Number and Title: Unit 5: Security
Academic Year: 2021 – 2022
Unit Assessor: Van Ho
Assignment Title: Security Presentation
Issue Date: April 1st, 2021
Submission Date:
Internal Verifier Name:
Date:

Submission Format:

Format:
● The submission is in the form of an individual written report. This should be written in a concise,
formal business style using single spacing and font size 12. You are required to make use of
headings, paragraphs and subsections as appropriate, and all work must be supported with
research and referenced using the Harvard referencing system. Please also provide a bibliography
using the Harvard referencing system.
Submission
● Students are compulsory to submit the assignment in due date and in a way requested by the
Tutor.
● The form of submission will be a soft copy posted on http://cms.greenwich.edu.vn/.
● Remember to convert the word file into PDF file before the submission on CMS.
Note:
● The individual Assignment must be your own work, and not copied by or from another student.
● If you use ideas, quotes or data (such as diagrams) from books, journals or other sources, you
must reference your sources, using the Harvard style.
● Make sure that you understand and follow the guidelines to avoid plagiarism. Failure to comply
this requirement will result in a failed assignment.
Unit Learning Outcomes:

1
LO3 Review mechanisms to control organizational IT security.
LO4 Manage organizational security.
Assignment Brief and Guidance:

Assignment scenario
You work for a security consultancy as an IT Security Specialist.
A manufacturing company “Wheelie good” in Ho Chi Min City making bicycle parts for export has
called your company to propose a Security Policy for their organization, after reading stories in the
media related to security breaches, etc. in organizations and their ramifications.
Task 1
In preparation for this task, you will prepare a report considering:
 The security risks faced by the company.
 How data protection regulations and ISO risk management standards apply to IT security.
 The potential impact that an IT security audit might have on the security of the organization.
 The responsibilities of employees and stakeholders in relation to security.
Task 2
Following your report:
 You will now design and implement a security policy
 While considering the components to be included in disaster recovery plan for Wheelie good,
justify why you have included these components in your plan.
Task 3
In addition to your security policy, you will evaluate the proposed tools used within the policy and how
they align with IT security. You will include sections on how to administer and implement these
policies.

2
Learning Outcomes and Assessment Criteria (Assignment 1):
Learning Outcome Pass Merit Distinction
LO3 P5 Discuss risk M3 Summarise the D2 Consider how IT
assessment ISO 31000 risk security can be
procedures. management aligned with
methodology and its organisational policy,
P6 Explain data application in IT detailing the security
protection processes security. impact of any
and regulations as misalignment.
applicable to an M4 Discuss possible
organisation. impacts to
organisational security
resulting from an IT
security audit.
LO4 P7 Design and M5 Discuss the roles D3 Evaluate the
implement a security of stakeholders in the suitability of the tools
policy for an organisation to used in an
organisation. implement security organisational policy.
audit
P8 List the main recommendations.
components of an
organisational disaster
recovery plan,
justifying the reasons
for inclusion.

You might also like