Description
Unformatted Attachment Preview
College of Computing and Informatics
Assignment 1
Deadline: Wednesday 6/03/2024 @ 23:59
[Total Mark for this Assignment is 8]
Student Details:
Name: ###
ID: ###
CRN: ###
Instructions:
• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).
• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.
• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.
• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.
Question One
Pg. 01
Learning
Outcome(s):
Explain
networking and
security, security
issues, trends, and
security resource.
Question One
2 Marks
Select a company or organization of your preference and examine its official
website to discern the type of privacy policy in place, particularly concerning the
protection of employee data. Evaluate the information provided on the website
to identify the specific measures and guidelines implemented to ensure the
privacy and security of employee information.
Question Two
Pg. 02
Learning
Outcome(s):
Explain
networking and
security, security
issues, trends, and
security resource.
Question Two
2 Marks
Why was the Supplier Relationships section (Section 15) introduced in the 2013
version of ISO 27002? Share your perspective, supported by a real-world
example illustrating the necessity of incorporating this section.
Question Three
Pg. 03
Learning
Outcome(s):
Question Three
2 Marks
Describe the significance of background checks in the employment process.
Give at least three personal justifications.
Explain
networking and
security, security
issues, trends, and
security resource.
Question Four
Pg. 04
Learning
Outcome(s):
Apply effective,
Question Four
2 Marks
a) Which control policy is necessary for the prevention of unauthorized entry
and facility damage?
proper, and stateof-the-art security
tools and
technologies.
b) Write two examples of the controls needed to secure the facilities, offices,
and rooms.
Purchase answer to see full
attachment