Security Assignment - Batch 14
Security Assignment - Batch 14
1
Assignment Brief (RQF)
2
Assignment Brief (RQF)
Submission Format
The submission is in the form of a single word document. You are required to make use of
headings, paragraphs, subsections and illustrations as appropriate, and all work must be
supported with research and referenced using the Harvard referencing system. Make use
the font Times New Roman, size 12, all borders 1 inch, 1.5 line spacing and justified
alignment. No specific word limit given.
Programme:
Unit:
Plagiarism
Plagiarism is a particular form of cheating. Plagiarism must be avoided at all
costs and students who break the rules, however innocently, may be penalised.
It is your responsibility to ensure that you understand correct referencing
practices. As a university level student, you are expected to use appropriate
references throughout and keep carefully detailed notes of all your sources of
materials for material you have used in your work, including any material
downloaded from the Internet. Please consult the relevant unit lecturer or your
course tutor if you need any further advice.
3
Assignment Brief (RQF)
Student Declaration
Student declaration
I certify that the assignment submission is entirely my own work and I fully
understand the consequences of plagiarism. I understand that making a false
declaration is a form of malpractice.
Assignment Feedback
Action plan
Summative feedback
4
Assignment Brief (RQF)
Qualification
Unit 5- Security
Student name
5
Assignment Brief (RQF)
LO4 Manage organisational security
6
Assignment Brief (RQF)
General Guidelines
A cover page or title page should be attached to your assignment. Use page 1 of this
assignment brief as your cover page and make sure all details are accurately filled. The
entire assignment brief should be attached as the first section of your assignment report.
The assignment report should be prepared using a word processing software. (A4 Sized
paper) Allow 1” margin on top, bottom and right sides of the paper and 1.25” on the left
side (for binding).
Overall, your report content (answer content) should not be lengthy more than 40 pages.
The font size (Body text) should be 12 point and should be in the style of Time New Roman.
Set line spacing to 1.5. Justify all paragraphs. Ensure that all headings are consistent in
terms of size and font style.
Use the spell check and grammar check function of the word processing application to
review the use of language on your assignment.
Important Points:
Carefully read the instructions given with the assignment. Do not unnecessarily write
irrelevant content.
Ensure that sufficient time is spent to complete the assignment by the due date. If you use
other people’s work or ideas in your assignment, it must be properly referenced, using the
HARVARD referencing system, in your text or any bibliography. Otherwise, you’ll be found
guilty of committing plagiarism.
Scenario
7
Assignment Brief (RQF)
Tech Solutions also about to expand their company with other products and make it
a group of companies in next year. Hence company requires you to consider the
long-term plan and propose the security solution. Also, company is willing to
allocate a considerable amount from their budget for security and willing to
embrace new suitable technologies for their management.
In preparation for the following tasks, you will be required to prepare a report.
Task 1 (LO1)
10
Assignment Brief (RQF)
1. The security risks that can be faced by the company. (P1)
2. How data protection regulations and ISO risk management standards can be
applied to IT security. (P2)
3. Propose a method to assess and treat IT security risks. (M1, D1)
Task 2 (LO2)
Task 3 (LO3)
Task 4 (LO4)
11
Assignment Brief (RQF)
Further include the following in your report:
1. A new set of security policies for the organization for the IT infrastructure.
(P7)
2. Explain how those policies can be implemented within the organization and
the responsibilities of employees and stakeholders in relation to security.
(M5)
3. While considering the components to be included in disaster recovery plan for
Tech Solutions, justify why you have included these components in your
plan. (P8)
4. Suggest tools and techniques to be used to improve the security of the
organization and explain how suitable they are for the company. (D3)
12
Assignment Brief (RQF)
P5 Discuss risk assessment M3 Summarise the ISO 31000 risk D2 Consider how IT
procedures. management methodology and its security can be aligned
P6 Explain data protection application in IT Security with organisational policy,
processes and regulations as M4 Discuss possible impacts to detailing the security
applicable to an organisation organisational security resulting impact of any
from an IT security audit misalignment
13