Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

ASSIGNMENT 1 Frontsheet

Qualification BTEC HND Diploma in Computing and Systems Development

Unit number and title Unit 5: Security

Assignment due November 28, 2018 Assignment submitted

Learner’s name Assessor name Phan Minh Tam

Learner declaration:
I certify that the work submitted for this assignment is my own and research sources are fully acknowledged.

Learner signature Date November 28, 2018

Grading grid

P1 P2 P3 P4 M1 M2 D1

Assignment title Assignment 1: Security introduction

In this assignment, you will have opportunities to provide evidence against the following criteria.
Indicate the page numbers where the evidence can be found.
Assessment criteria Expected evidence Task Assessor’s Feedback
no.

LO1: Assess risks to IT security

P1 Identify types of security Explains what IT security is and why it is important


1
risks to organisations today. Also include who is responsible for attacks and
attack techniques

P2 Describe organisational Outlines general principles that can be used to protect 2


security procedures valuable assets.

LO2: Describe IT security solutions

Use the Internet to research some of the different


P3 Identify the potential impact ransomware attacks that have occurred recently.
to IT security of incorrect Identify at least three attacks that are current. What 3
configuration of firewall policies do they do? Why are they so successful? How are they
and third-party VPNs being spread? What can users do to protect
themselves? How can ransomware be removed from a
computer?

P4 Show, using an example for Attacks that exploit previously unknown vulnerabilities
each, how implementing a DMZ, are considered some of the most dangerous attacks. 4
static IP and NAT in a network Use the Internet to research these attacks. How are
the vulnerabilities discovered? What are some of the
can improve Network Security. most recent zero-day attacks? What defenses are
there against them?

Assessment criteria Expected Evidence Feedback

Merit descriptor No. (M1)


Propose a method to assess and treat IT
security risks

Merit descriptor No. (M2)


Discuss three benefits to implement network
monitoring systems with supporting reasons.

Distinction descriptor No. (D1)

Summative feedbacks:
Assessor’s Signature: Date: December 12, 2018

You might also like