100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

BTEC IT DATA MODELLING UNIT 5 ASSIGNMENT 2 EXCEL 2023

Puntuación
-
Vendido
-
Páginas
97
Grado
A+
Subido en
13-06-2023
Escrito en
2022/2023

BTEC IT DATA MODELLING UNIT 5 ASSIGNMENT 2 EXCEL 2023 ASSIGNMENT FRONT SHEET Qualification BTEC Level 5 HND Diploma in Computing Unit number and title Unit 5: Security Submission date Date Received 1st submission Re-submission Date Date Received 2nd submission Student Name Student ID Class Assessor name Student declaration I certify that the assignment submission is entirely my own work and I fully understand the consequences of plamaking a false declaration is a form of malpractice. Student’s signature Grading grid P5 P6 P7 P8 M3 M4 M5 D2 D3 2  Summative Feedback:  Resubmission Feedback: Grade: Assessor Signature: Date: Internal Verifier’s Comments: Signature & Date: 3 Table of Contents TABLE OF CONTENTS ............................................................................................................................................................... 3 TABLE OF FIGURES .................................................................................................................................................................. 6 LIST OF TABLES........................................................................................................................................................................ 7 A. INTRODUCTION ............................................................................................................................................................. 8 B. (P1) DISCUSS RISK ASSESSMENT PROCEDURES. ............................................................................................................. 9 I. DEFINE RISK & RISK ASSESSMENT........................................................................................................................................ 9 1. Define Risk: ........................................................................................................................................................... 9 2. Define risk assessment......................................................................................................................................... 11 II. EXPLAIN ASSET, THREAT AND THREAT IDENTIFICATION PROCEDURE , GIVE EXAMPLE ........................................................................ 12 1. Asset Identification .............................................................................................................................................. 12 2. Threat Identification ............................................................................................................................................ 13 3. Threat Identification Procedure ........................................................................................................................... 15 Example: ...................................................................................................................................................................... 17 III. EXPLAIN THE RISK ASSESSMENT PROCEDURE ........................................................................................................................ 18 IV. List risk identification steps .................................................................................................................................. 22 C. (P6) EXPLAIN DATA PROTECTION PROCESSES AND REGULATIONS AS APPLICABLE TO AN ORGANIZATION. ................ 22 I. DEFINE DATA PROTECTION .............................................................................................................................................. 22 II. DATA PROTECTION PROCESS WITH RELATIONS TO ORGANIZATION .............................................................................................. 24 III. WHY ARE DATA PROTECTION AND REGULATION IMPORTANT ? .................................................................................................. 24 1. Why is data protection important? ...................................................................................................................... 24 2. Why is data regulation important? ...................................................................................................................... 25 D. (P7) DESIGN AND IMPLEMENT A SECURITY POLICY FOR AN ORGANIZATION. .............................................................. 31 I. DEFINE AND DISCUSS WHAT IS SECURITY POLICY .................................................................................................................... 31 II. GIVE EXAMPLES OF POLICIES ............................................................................................................................................ 33 III. GIVE THE MOST & SHOULD THAT MUST EXIST WHILE CREATING POLICY . ...................................................................................... 37 IV. EXPLAIN AND WRITE DOWN THE ELEMENT OF SECURITY POLICY ................................................................................................. 39 1. Purpose ............................................................................................................................................................... 39 2. Information security objectives ............................................................................................................................ 39 3. Subjects............................................................................................................................................................... 40 4. Data classification ............................................................................................................................................... 40 5. Cognition and behavior ....................................................................................................................................... 40 4 6. Access control permissions and policies................................................................................................................ 41 7. Responsibilities, rights and obligations of employees ........................................................................................... 41 8. Supporting data and operations .......................................................................................................................... 41 9. Government Network Services Policy: .................................................................................................................. 42 10. Vulnerability Scan: ............................................................................................................................................... 42 11. Patch Management: ............................................................................................................................................ 42 12. Data security accountability: ............................................................................................................................... 43 13. System data security policy: ................................................................................................................................. 43 14. Incident Response:............................................................................................................................................... 43 15. Account Monitoring and Control: ......................................................................................................................... 43 16. Acceptable Uses: ................................................................................................................................................. 44 17. Compliance Monitoring: ...................................................................................................................................... 44 V. GIVE THE STEPS TO DESIGN A PARTICULAR SECURITY POLICY ..................................................................................................... 44 Policy definition: ........................................................................................................................................................... 44 Security policy cycle: ..................................................................................................................................................... 45 E. (P8) LIST THE MAIN COMPONENTS OF AN ORGANIZATIONAL DISASTER RECOVERY PLAN, JUSTIFYING THE REASONS FOR INCLUSION. .................................................................................................................................................................... 46 I. DISCUSS WITH EXPLANATION ABOUT BUSINESS CONTINUITY ..................................................................................................... 46 II. LIST THE COMPONENTS OF RECOVERY PLAN. ........................................................................................................................ 47 III. WRITE DOWN ALL THE STEPS REQUIRED IN DISASTER RECOVERY PROCESS .................................................................................... 52 IV. EXPLAIN SOME OF THE POLICIES AND PROCEDURES THAT ARE REQUIRED FOR BUSINESS CONTINUITY . .................................................. 55 1. Forensics Procedures: .......................................................................................................................................... 55 F. (M3) SUMMARIES THE ISO 31000 RISK MANAGEMENT METHODOLOGY AND ITS APPLICATION IN IT SECURITY. ........ 61 HOW DOES ISO 31000 A FAMILY OF STANDARDS RELATING TO RISK MANAGEMENT METHODS APPLY IN IT SECURITY SUMMARIZE YOUR DISCUSSION : ......................................................................................................................................................................................... 61 1. Definition of ISO 31000: ....................................................................................................................................... 61 2. BENEFITS THAT ISO 31000 BRINGS: ...................................................................................................................... 63 3. PRINCIPLE OF ISO 31000: ..................................................................................................................................... 64 .................................................................................................................................................................................... 64 4. Framework of ISO 31000: .................................................................................................................................... 64 5. PROCESS OF ISO 31000: ....................................................................................................................................... 69 G. (M4) DISCUSS POSSIBLE IMPACTS TO ORGANIZATIONAL SECURITY RESULTING FROM AN IT SECURITY AUDIT............ 71 1. DEFINITIONOF SECURITY AUDIT ............................................................................................................................... 71

Mostrar más Leer menos
Institución
Grado











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Estudio
Grado
Año escolar
3

Información del documento

Subido en
13 de junio de 2023
Número de páginas
97
Escrito en
2022/2023
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

BTEC IT DATA
MODELLING UNIT 5
ASSIGNMENT 2 EXCEL
2023

, ASSIGNMENT FRONT SHEET

Qualification BTEC Level 5 HND Diploma in Computing


Unit number and title Unit 5: Security


Submission date Date Received 1st submission


Re-submission Date Date Received 2nd submission


Student Name Student ID


Class Assessor name


Student declaration

I certify that the assignment submission is entirely my own work and I fully understand the consequences of
making a false declaration is a form of malpractice.


Student’s signature


Grading grid

P5 P6 P7 P8 M3 M4 M5 D2 D3

, Summative Feedback:  Resubmission Feedback:




Grade: Assessor Signature: Date:
Internal Verifier’s Comments:




Signature & Date:




2

, Table of Contents

TABLE OF CONTENTS ............................................................................................................................................................... 3

TABLE OF FIGURES .................................................................................................................................................................. 6

LIST OF TABLES........................................................................................................................................................................ 7

A. INTRODUCTION ............................................................................................................................................................. 8

B. (P1) DISCUSS RISK ASSESSMENT PROCEDURES. ............................................................................................................. 9

I. DEFINE RISK & RISK ASSESSMENT ........................................................................................................................................ 9
1. Define Risk: ........................................................................................................................................................... 9
2. Define risk assessment......................................................................................................................................... 11
II. EXPLAIN ASSET, THREAT AND THREAT IDENTIFICATION PROCEDURE , GIVE EXAMPLE ........................................................................ 12
1. Asset Identification .............................................................................................................................................. 12
2. Threat Identification ............................................................................................................................................ 13
3. Threat Identification Procedure ........................................................................................................................... 15
Example: ...................................................................................................................................................................... 17
III. EXPLAIN THE RISK ASSESSMENT PROCEDURE ........................................................................................................................ 18
IV. List risk identification steps .................................................................................................................................. 22

C. (P6) EXPLAIN DATA PROTECTION PROCESSES AND REGULATIONS AS APPLICABLE TO AN ORGANIZATION. ................ 22

I. DEFINE DATA PROTECTION .............................................................................................................................................. 22
II. DATA PROTECTION PROCESS WITH RELATIONS TO ORGANIZATION .............................................................................................. 24
III. WHY ARE DATA PROTECTION AND REGULATION IMPORTANT ? .................................................................................................. 24
1. Why is data protection important? ...................................................................................................................... 24
2. Why is data regulation important? ...................................................................................................................... 25

D. (P7) DESIGN AND IMPLEMENT A SECURITY POLICY FOR AN ORGANIZATION. .............................................................. 31

I. DEFINE AND DISCUSS WHAT IS SECURITY POLICY .................................................................................................................... 31
II. GIVE EXAMPLES OF POLICIES ............................................................................................................................................ 33
III. GIVE THE MOST & SHOULD THAT MUST EXIST WHILE CREATING POLICY . ...................................................................................... 37
IV. EXPLAIN AND WRITE DOWN THE ELEMENT OF SECURITY POLICY ................................................................................................. 39
1. Purpose ............................................................................................................................................................... 39
2. Information security objectives ............................................................................................................................ 39
3. Subjects............................................................................................................................................................... 40
4. Data classification ............................................................................................................................................... 40
5. Cognition and behavior ....................................................................................................................................... 40




3
$10.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
onlinetutor2025 University of South Africa (Unisa)
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
250
Miembro desde
2 año
Número de seguidores
218
Documentos
848
Última venta
1 mes hace

4.0

17 reseñas

5
8
4
4
3
3
2
1
1
1

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes