University Uxbridge College
Subject Unit 5 Security

Unit 5: Security

Please note that this Example Assessment Brief is NOT an authorised assignment brief. It is provided as a reference only.

Centres must develop assignments and assessment materials that meet the needs of their students and align with their curriculum planning. This Example Assessment Brief may be used as a starting point for the development of an assignment; however, Centres are expected to modify and revise the Example Assessment Brief to meet the specific needs of their students and curriculum. All assessment briefs must be Internally Verified.

Assignment Title

Secure 2020: Security sector training event

Submission Format

The submission is in the form of two documents:

  1. A 20-25 slide presentation with presenter notes.
  2. A security awareness handbook
  3. A security policy

Are You Searching Answer of this Question? Request British Writers to Write a plagiarism Free Copy for You.

Unit Learning Outcomes

LO1 Assess risks to IT security
LO2 Describe IT security solutions
LO3 Review mechanisms to control organisational IT security
LO4 Manage organisational security

Learning Outcomes and Assessment Criteria

Pass Merit Distinction
L01 Assess risks to IT security
P1 Identify types of security risks to organisations. M1 Propose a method to assess and treat IT security risks. L01 & 2 D1 Evaluate a minimum of three of physical and virtual security measures that can be employed to ensure the integrity of organisational IT security.
P2 Describe organisational security procedures.
L02 Describe IT security solutions
P3 Identify the potential impact to IT security of incorrect configuration of firewall policies and third-party VPNs. M2 Discuss three benefits to implement network monitoring systems with supporting reasons.
P4 Show, using an example for each, how implementing a DMZ, static IP and NAT in a network can improve Network Security.
L03 Review mechanisms to control organisational IT security
P5 Discuss risk assessment procedures. M3 Summarise the ISO 31000 risk management methodology and its application in IT security. D2 Consider how IT security can be aligned with organisational policy, detailing the security impact of any misalignment.
P6 Explain data protection processes and regulations as applicable to an organisation. M4 Discuss possible impacts to organisational security resulting from an IT security audit.
L04 Manage organisational security
P7 Design and implement a security policy for an organisation. M5 Discuss the roles of stakeholders in the organisation to implement security audit recommendations. D3 Evaluate the suitability of the tools used in an organisational policy.
P8 List the main components of an organisational disaster recovery plan, justifying the reasons for inclusion.

Get Solution of this Assessment. Hire Experts to solve this assignment for you Before Deadline.

Assignment Brief and Guidance

You have been asked in your role as a security professional to support ‘Secure 2020’, an online networking event aimed at local SMEs within the security sector. The 2-day event includes a series of security sector updates, seminars and workshops from industry professionals.

You are required to produce a set of materials to include a presentation with accompanying notes, a security awareness booklet and a security policy activity to support one of these workshops. The topic being: IT security: risks, policies and procedures – what you need to know!

LO1 and LO2

The presentation that you create, should conform to the event guidelines of between 20-25 slides with a group activity and accompanying notes for the delegates. The content should include references to:

  • Types of security risks and an understanding of organisational security procedures
  • An overview of how IT security risks can be assessed/treated
  • Specific references to the configuration of firewall policies and third-party VPNs in terms of the impact to IT security if these were configured incorrectly
  • Use examples to show how network security can be improved by implementing a DMZ, static IP and NAT
  • Discussion slides outlining three benefits with justification as to why network monitoring systems should be implemented

Within the presentation, time should be given to allow for a ‘networking opportunity’ that delegates could discuss in the online break-out rooms. The theme for the discussion is ‘physical and virtual security measures that can be employed to ensure the integrity of organisational IT security’.

Within the presentation provide an evaluation of at least three physical and virtual security measures that could ensure the integrity of organisational security. This will provide the content of the discussion. You will need supporting slide notes to support the evaluative element.

LO3 and LO4

Each delegate that attends the online seminars/workshops are given a downloadable copy of a ‘security awareness handbook’. This provides information on risk management, standards, organisational security and the alignment of organisational policy.

Stuck in Completing this Assignment and feeling stressed ? Take our Private Writing Services

Security Awareness Handbook Assignment

Create a handbook in line with the event guidelines of between 8-10 pages that address the following key headline topics/questions:

  • Risk assessmentwhat are the procedures and provide an overview of ISO 3100 risk management methodology and its application in IT security?
  • Data protectionwhat are the processes and regulations as applicable to an Organisation?
  • IT security and Organisational Policyhow can organisational security be impacted through an IT security audit? How can organisational policy and IT security policy be aligned? Discuss what could happen if there was a misalignment. Within this section also provide an Evaluate the suitability of the tools used in an organisational policy.
  • Organisation security and stakeholder involvementwhat are the main components of an organisational disaster recovery plan, justify why? When implementing security audit recommendations discuss what roles stakeholders have within the organisation.

The final component of the workshop is to provide delegates with a task that they can then complete in their own security work environments. The event guidelines state that the task can be chosen by the presenter, based on the workshop theme. An example solution to the task should be produced as guidance.

The task that you have selected is to design and implement a security policy for an organisation. Using a template, similar to the ones provided in the link, design a security policy and state how this can be implemented/implement within an organisation.

Security policy templates: https://www.template.net/business/policy/security-policy/

Please review the subsequent grading criteria for more details on the expected elements and topics that need to be included.

Please access HN Global for additional resources support and reading for this unit. For further guidance and support on report writing please refer to the Study Skills Unit on HN Global www.highernationals.com

Looking for Plagiarism free Answers for your college/ university Assignments.

Recent Solved Questions

UP TO 30 % DISCOUNT

Get Your Assignment Completed At Lower Prices

Plagiarism Free Solutions
100% Original Work
24*7 Online Assistance
Native PhD Experts
Hire a Writer Now

Facing Issues with Assignments? Talk to Our Experts Now!Download Our App Now!

Have Questions About Our Services?
Download Our App!

Get the App Today!

QRcode