How would you secure the work spaces within your building

[meteor_slideshow slideshow="slide1"]

IT409

 

College of Computing and Informatics

Question One

1.5 Mark

Learning Outcome(s):

Chapter 6

LO 2 : Develop security policies and put in place an effective security architecture that comprises modern hardware and software technologies and protocols

An enterprise diffuses the following online job offer:

For our site XYZ, we are looking for an Experienced Hybrid Mobile Application Developer (Male / Female) to strengthen our website development team and applications for mobile terminals / tablets. Your mission consists in: – Develop cross-platform websites and mobile applications – Design solutions and propose hybrid software architectures – Write and validate project technical documentation – Apply development quality rules based on internal tools (software forge, continuous integration, reporting tool …). – Participate in costing and pre-sales. You must also be able to explain the various technical choices and present the chosen software architecture.

Required Qualifications

Bachelor’s Degree in Computer Science, or a related degree

You have several experiences in the web and mobile field and especially in hybrid environments.

You have skills in: Technology: Angular, HTML5, CSS3, JavaScript, RWD, Ionic, Cordova

Mobile Culture: Technical Knowledge iOS, Android, Xamarin, Windows, Native Script English.

a) What information should be removed from this job description to avoid security problem?

b) Rewrite this job offer to meet the required job description.

Question Two

1.5 Marks

Learning Outcome(s):

Chapter 7

LO 2: Develop security policies and put in place an effective security architecture that comprises modern hardware and software technologies and protocols

Assume that you own a building that includes work spaces such as offices, rooms and facilities:

a) How would you secure the works paces within your building?

b) It is not enough to physically secure an area; you must also consider physical entry and exit controls. How can you identify authorized personnel entering your building?

Question Three

1.5 Marks

Learning Outcome(s):

Chapter 8

LO 5: Analyze and apply the most appropriate solutions to problems related to the field of Security and Information Assurance.

.

a) Assume that you are working in a company and your company’s assets have been attacked by hybrid malware. What is hybrid malware?

b) How can malware be controlled? List two examples for each control.

Question four

Learning Outcome(s):

Chapter 10

LO 5: Analyze and apply the most appropriate solutions to problems related to the field of Security and Information Assurance

.

1.5 Marks

Company A and company B need to communicate in a secure way.

For each of the following scenarios, you need to identify and justify which of the following four states has been achieved:

1- Confidentiality. 2- Integrity. 3- Authenticity. 4- Non-repudiation.

A. Scenario A:

Company A sends an encrypted message to Company B using a shared key. (Assumption: Both companies maintain the secrecy of the shared key.)

B. Scenario B:

Company A encrypts a hashed message using its own private key.

C. Scenario C:

Company A hashes a message and sends the hash and the message through two channels. Company B receives the message and hashes it using the same hash function. After comparing the received hash to the generated hash, they find an exact match.

[meteor_slideshow slideshow="slide3"]

Are you looking for a similar paper or any other quality academic essay? Then look no further. Our research paper writing service is what you require. Our team of experienced writers is on standby to deliver to you an original paper as per your specified instructions with zero plagiarism guaranteed. This is the perfect way you can prepare your own unique academic paper and score the grades you deserve.

[meteor_slideshow slideshow="slide2"]

Use the order calculator below and get ordering with idealtermpapers.com now! Contact our live support team for any assistance or inquiry.

[order_calculator]

Purchase Guarantee

Why ORDER at IdealTermPapers.com?

  • Educated and experienced writers.
  • Quality, Professionalism and experience.
  • Original Content writing.
  • Best customer support.
  • Affordable Pricing on orders.
  • Thorough research.
  • Ontime delivery of finished work.
  • 100% plagiarism free papers.

Reasonable Prices

  • To get the best quality papers isn’t cheap so don’t trust extremely low prices.
  • We can’t claim that we have unreasonably low prices because low prices equal to low quality.
  • Our prices are good and they balance with the quality of our work.
  • We have a Moneyback guarantee.

Original and Quality work

  • Our writers are professionals and they write your paper from scratch and we don’t encourage copy pasting.
  • All writers are assessed and they have to pass our standards for them to work with us.
  • Plagiarism is an offence and it’s never tolerated in our company.

Native Writers plus Researchers

  • Our writers are qualified and excellent and will guarantee the best performance in your order.
  • Our team has writers who have master's and PhD qualifications who can handle any assignment
  • We have the best standards in essay writing.

We have been in business for over 7 syears

  • We have always served our customers from all over the world and they have continued to order with us.
  • We value our customers since they have trusted us to do their assignments.
  • We are competent in our writing gained from experience over the years
  • Our company has 24/7 Live Support.

You will get

  •  Custom Admission Essay written by competent professional English writers.
  •  Free revisions according to our revision policy if required
  •  Paper format:  275 words per page, Times New Roman font and size 12, doublespaced text and1 inch margin
  •  On time delivery and direct order download
  •  Privacy guaranteed

We can help you:

  •  acquire a comprehensive professional presentation.
  •  get a unique and remarkable content as per your instructions.
  •  Get an additional portion that can be included to your existing presentation;
  •  turn your work in to an eyecatching presentation with well communicated ideas.
  •  improve your presentation to acquire the best professional standards.