0% found this document useful (0 votes)
21 views4 pages

IT409-IT476 Assignment2

Uploaded by

ahmed abdalla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views4 pages

IT409-IT476 Assignment2

Uploaded by

ahmed abdalla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

College of Computing and Informatics

Security and Policy


IT476

Assignmen
Instructions:

t2 

Name: ###

You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Student Details:

Blackboard via the allocated folder. These files must not be in compressed format.
It is your responsibility to check and make sure that you have uploaded both the correct files.
ID: ###
Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
CRN: ###
or any kind of manipulation).
 Email submission will not be accepted.
 You are advised to make your work clear and well-presented. This includes filling your information on the
cover page.
 You must use this template, failing which will result in zero mark.
 You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.
 Late submission will result in ZERO mark.
 The work should be your own, copying from students or other resources will result in ZERO mark.
 Use Times New Roman font for all your answers.

Res
tric
ted
-
‫مقي‬
‫د‬
Pg. 1 Question ThreeQuestion Three

Learning 3 Marks
Outcome(s): Question One
CLO2 : Hands-on
What are the two main techniques used by antivirus (AV) software to detect
application of malware, and why is AV software not 100% effective in detecting all forms of
modern security malware? Additionally, discuss three factors contributing to its limitations and
tools such as name three of the most popular antivirus software programs available today.
firewalls and
encryption
technologies

CLO4: Analyzing
security incidents
and problems,
identifying
vulnerabilities and
weaknesses.

CLO5 : Applying
appropriate security
solutions to protect
systems and data.

Res
tric
ted
-
‫مقي‬
‫د‬
Pg. 2 Question ThreeQuestion Three

3 Marks
Learning
Outcome(s): Question Two
Explain the different Incident Severity Levels and describe the corresponding
response times. Provide one example for each level that demonstrates the
CLO1 : Explaining
appropriate response.
networking and
security concepts,
and identifying
security issues and
trends.

CLO4: Analyzing
security incidents
and problems,
identifying
vulnerabilities and
weaknesses.

Res
tric
ted
-
‫مقي‬
‫د‬
Pg. 3 Question ThreeQuestion Three

2 Marks
Learning
Outcome(s): Question Three
What is the difference between Business continuity threat assessment and
CLO4: Analyzing Business continuity risk assessment?
security incidents
and problems,
identifying
vulnerabilities and
weaknesses.

CLO5 : Applying
appropriate security
solutions to protect
systems and data.

Res
tric
ted
-
‫مقي‬
‫د‬

You might also like