Explain networking and security, security issues, trends, and security resource Restricted
College of Computing and Informatics Assignment 2 Deadline: SUNDAY 5/05/2024 @ 23:59 [Total Mark for this Assignment is 8] Student Details: Name: ### ID: ### CRN: ### Instructions: • You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format. • It is your responsibility to check and make sure that you have uploaded both the correct files. • Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets, convert text into image or languages other than English or any kind of manipulation). • Email submission will not be accepted. • You are advised to make your work clear and well-presented. This includes filling your information on the cover page. • You must use this template, failing which will result in zero mark. • You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question. • Late submission will result in ZERO mark. • The work should be your own, copying from students or other resources will result in ZERO mark. • Use Times New Roman font for all your answers. Restricted – مقيد Question One Pg. 01 Learning Outcome(s): CLO1: Explain networking and security, security issues, trends, and security resource Restricted – مقيد Question One 2 Marks List and explain four types of malware, providing two real scenarios for each type along with references. Question Two Pg. 02 Learning Outcome(s): CLO2: Apply effective, proper, and state-of-theart security tools and technologies. Question Two Compare between Intrusion detection systems (IDS) and Intrusion prevention systems (IPSs): Intrusion detection systems (IDS) Description Location System Types Anomaly response Attacks Mitigation (Yes/No) Restricted – مقيد 2 Marks Intrusion prevention systems (IPS) Question Three Pg. 03 Learning Outcome(s): CLO5: Apply the most appropriate solutions to problems related to the field of Security and Information Assurance. Restricted – مقيد Question Three 2 Marks Describe the concept of a Business Continuity Plan (BCP) and outline its essential elements using your own words. Question Four Pg. 04 Learning Outcome(s): CLO4: Analyze problems related to the field of Security and Information Assurance Restricted – مقيد Question Four 2 Marks What are the recommended response timeframes for different levels of security incidents, and can you provide an illustrative example for each level?
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.