lOMoAR cPSD| 37668344
lOMoAR cPSD| 37668344
1 UNIT 5 - ASSIGNMENT 1 FRONTSHEET-
SECURITY
NETWORK SECURITY
lOMoAR cPSD| 37668344
ASSIGNMENT 1
FRONT SHEET
Qualification BTEC Level 5 HND Diploma in Computxing
Unit number and title Unit 5: Security
Submission date Date Received 1st submission
Re-submission Date Date Received 2nd submission
Student Name Student ID
Class Assessor name
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagia
making a false declaration is a form of malpractice.
Student’s signature
Grading grid
P1 P2 P3 P4 M1 M2 D1
, lOMoAR cPSD| 37668344
Summative Feedback:
Grade: Assessor Signature: Date:
Lecturer Signature:
, lOMoAR cPSD| 37668344
I. Introduction
I am an intern IT security specialist for a leading security consulting company in Vietnam
called FPT information security (FIS). The company works with a medium scale in Vietnam,
consulting and implementing technical solutions for potential risks of IT security. Most
customers have outsourced because of concerns about their security due to lack of technical
expertise. As part of my role, my manager Jonson asked me to do a presentation to help train
junior staff in the tools and techniques involved to identify and assess security risks. along with
your organization's policies to protect your data and devices
II. Identify types of security threat to organizations. Give an example of a
recently publicized security breach and discuss its consequences
1. Definition threat
Cyber threats are occasionally inaccurately mistook for weaknesses. Taking a gander at the
definitions, the watchword is "potential". The danger isn't a security issue that exists in an
execution or association. Rather something can disregard the security. This can measure up
to a weakness which is a real shortcoming that can be taken advantage of. The danger
generally exists, no matter what any countermeasures. Be that as it may, countermeasures
can be utilized to limit its likelihood being understood. (Helll, 2021)
2. Identify threats agents to organizations
Figure 1: Threat agent
A security threats is a malevolent demonstration that intends to ruin or take information or
disturb an association's frameworks or the whole association. A security occasion alludes to
an event during which organization information, or its organization might have been
lOMoAR cPSD| 37668344
1 UNIT 5 - ASSIGNMENT 1 FRONTSHEET-
SECURITY
NETWORK SECURITY
lOMoAR cPSD| 37668344
ASSIGNMENT 1
FRONT SHEET
Qualification BTEC Level 5 HND Diploma in Computxing
Unit number and title Unit 5: Security
Submission date Date Received 1st submission
Re-submission Date Date Received 2nd submission
Student Name Student ID
Class Assessor name
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagia
making a false declaration is a form of malpractice.
Student’s signature
Grading grid
P1 P2 P3 P4 M1 M2 D1
, lOMoAR cPSD| 37668344
Summative Feedback:
Grade: Assessor Signature: Date:
Lecturer Signature:
, lOMoAR cPSD| 37668344
I. Introduction
I am an intern IT security specialist for a leading security consulting company in Vietnam
called FPT information security (FIS). The company works with a medium scale in Vietnam,
consulting and implementing technical solutions for potential risks of IT security. Most
customers have outsourced because of concerns about their security due to lack of technical
expertise. As part of my role, my manager Jonson asked me to do a presentation to help train
junior staff in the tools and techniques involved to identify and assess security risks. along with
your organization's policies to protect your data and devices
II. Identify types of security threat to organizations. Give an example of a
recently publicized security breach and discuss its consequences
1. Definition threat
Cyber threats are occasionally inaccurately mistook for weaknesses. Taking a gander at the
definitions, the watchword is "potential". The danger isn't a security issue that exists in an
execution or association. Rather something can disregard the security. This can measure up
to a weakness which is a real shortcoming that can be taken advantage of. The danger
generally exists, no matter what any countermeasures. Be that as it may, countermeasures
can be utilized to limit its likelihood being understood. (Helll, 2021)
2. Identify threats agents to organizations
Figure 1: Threat agent
A security threats is a malevolent demonstration that intends to ruin or take information or
disturb an association's frameworks or the whole association. A security occasion alludes to
an event during which organization information, or its organization might have been