100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CRI3701 ASSIGNMENT 2 SEMESTER 2 2025 *COMPLETE ANSWERS* DUE DATE 24 SEPTEMBER 2025 (BEST ANSWERS FOR THIS ASSIGNMENT)

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
20-09-2025
Written in
2025/2026

CRI3701 ASSIGNMENT 2 SEMESTER 2 2025 *COMPLETE ANSWERS* DUE DATE 24 SEPTEMBER 2025 (BEST ANSWERS FOR THIS ASSIGNMENT)










Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
September 20, 2025
Number of pages
9
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

, CRI3701 ASSIGNMENT 2 SEMESTER 2 2025 ANSWERS
DUE DATE 24 SEPTEMBER 2025




QUESTION 1.

1.1 Security measures for different types of information

Protection of Public Information

Public information refers to content that an organization intends to make available to the wider
community, such as its website content, brochures, and press releases. Although this category
of information is not confidential, it must still be safeguarded against unauthorized modification
and cyberattacks. Basic measures such as web application firewalls, intrusion detection
systems, and continuous monitoring can protect public data from manipulation or defacement.
For example, a company’s official website may be hosted on a secure server with firewall rules
that prevent hackers from altering published information. Even though the data is public, its
accuracy and integrity remain critical because reputational damage can occur if false or
misleading information is introduced (Von Solms & Van Niekerk, 2013).

Safeguarding Internal Information

Internal information includes operational procedures, staff guidelines, and internal
communication that are not necessarily confidential but are restricted to organizational
members. To secure this type of data, organizations often use role-based access control
(RBAC), password authentication, and internal intranet portals. These mechanisms ensure
that only authorized employees can access the information relevant to their duties. A practical
example is when an organization restricts access to human resources policies and procedures
to employees through an intranet system that requires username and password login. This
ensures that sensitive internal documents are not leaked outside the organization, while also
maintaining accountability for who has accessed or modified the data (Whitman & Mattord,
2021).

Protection of Confidential Information

Confidential information covers personal employee records, customer data, supplier details,
and financial statements. Such information requires a higher level of protection since
unauthorized disclosure could lead to financial losses, legal consequences, and reputational
harm. Security measures such as encryption of data at rest and in transit, multi-factor
authentication (MFA), and secure backup systems are essential for safeguarding

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
THEUNISAPRO UNISA
View profile
Follow You need to be logged in order to follow users or courses
Sold
259
Member since
5 months
Number of followers
0
Documents
326
Last sold
7 hours ago

4,4

39 reviews

5
26
4
4
3
7
2
1
1
1

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions