IT Security and Policies
IT409
College of Computing and Informatics
Question One
1.5 Mark
Learning Outcome(s):
Chapter 6
LO 2 : Develop security policies and put in place an effective security architecture that comprises modern hardware and software technologies and protocols
An enterprise diffuses the following online job offer:
For our site XYZ, we are looking for an Experienced Hybrid Mobile Application Developer (Male / Female) to strengthen our website development team and applications for mobile terminals / tablets. Your mission consists in: – Develop cross-platform websites and mobile applications – Design solutions and propose hybrid software architectures – Write and validate project technical documentation – Apply development quality rules based on internal tools (software forge, continuous integration, reporting tool …). – Participate in costing and pre-sales. You must also be able to explain the various technical choices and present the chosen software architecture.
Required Qualifications
Bachelor’s Degree in Computer Science, or a related degree
You have several experiences in the web and mobile field and especially in hybrid environments.
You have skills in: Technology: Angular, HTML5, CSS3, JavaScript, RWD, Ionic, Cordova
Mobile Culture: Technical Knowledge iOS, Android, Xamarin, Windows, Native Script English.
a) What information should be removed from this job description to avoid security problem?
b) Rewrite this job offer to meet the required job description.
Question Two
1.5 Marks
Learning Outcome(s):
Chapter 7
LO 2: Develop security policies and put in place an effective security architecture that comprises modern hardware and software technologies and protocols
Assume that you own a building that includes workspaces such as offices, rooms and facilities:
a) How would you secure the workspaces within your building?
b) It is not enough to physically secure an area; you must also consider physical entry and exit controls. How can you identify authorized personnel entering your building?
Question Three
1.5 Marks
Learning Outcome(s):
Chapter 8
LO 5: Analyze and apply the most appropriate solutions to problems related to the field of Security and Information Assurance.
.
a) Assume that you are working in a company and your company’s assets have been attacked by hybrid malware. What is hybrid malware?
b) How can malware be controlled? List two examples for each control.
Question four
Learning Outcome(s):
Chapter 10
LO 5: Analyze and apply the most appropriate solutions to problems related to the field of Security and Information Assurance
.
1.5 Marks
Company A and company B need to communicate in a secure way.
For each of the following scenarios, you need to identify and justify which of the following four states has been achieved:
1- Confidentiality. 2- Integrity. 3- Authenticity. 4- Non-repudiation.
A. Scenario A:
Company A sends an encrypted message to Company B using a shared key. (Assumption: Both companies maintain the secrecy of the shared key.)
B. Scenario B:
Company A encrypts a hashed message using its own private key.
C. Scenario C:
Company A hashes a message and sends the hash and the message through two channels. Company B receives the message and hashes it using the same hash function. After comparing the received hash to the generated hash, they find an exact match.
[meteor_slideshow slideshow="slide3"]Are you looking for a similar paper or any other quality academic essay? Then look no further. Our research paper writing service is what you require. Our team of experienced writers is on standby to deliver to you an original paper as per your specified instructions with zero plagiarism guaranteed. This is the perfect way you can prepare your own unique academic paper and score the grades you deserve.
[meteor_slideshow slideshow="slide2"]Use the order calculator below and get ordering with idealtermpapers.com now! Contact our live support team for any assistance or inquiry.
[order_calculator]