$20 Bonus + 25% OFF
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!
Add File

Error goes here

ZLX05 HND In Computing

tag 0 Download19 Pages / 4,611 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT



The purpose of the assignment is to assess the learners in various security areas including IT security risk, policy, security control, audit, relevant laws necessary for an organisational security. Therefore, it is necessary for the learners to understand the security risks, various IT security policy, risk assessment methods, security audit, security control and tools, laws and its alignment towards organisational strategy.

It is expected that learners will utilise a professionally delivered format to present the report with appropriate referencing. The guideline is given end of the assignment brief.

This coursework is designed in the form of set questions and design scenario. The tasks are divided into four sections, with section compromising several questions.

Assignment Scenario:

A retail organisation based in London operates on food distribution across many towns. The company has an established online platform whereby customers place orders. The delivery is done using the company own vehicles.

• The company IT platform and order processing software is 3 years and since then no upgradation was made. It already has security processes in place, such as access controls, backup, encryption, and disaster recovery.

• Recent incident whereby the company suffered server downtime for 6 hours due to a Distributed Denial of Service (DoS) attacks.

• Furthermore, the network is very slow and there are unwanted accounts created to the network. In several occasions the system was automatically reboot and malware infections was detected. Not all employees have adequate information security awareness trainings that might impact ensuring overall security.

The management considers protection of information and other assets as the top priority for business continuity and reputation. As a security specialist, you are to carry out investigation about the IT security risks, existing organisational security procedure and controls to mitigate the risks. You also need to consider IT security policies, data protection laws, risk assessment methods, and security audit necessary for improving the overall security.
You should follow the assignment brief scenario and produce the followings:

Part 1: Produce a report that contains the followings:

Risk assessment procedure
Data protection regulation and risk management standard ISO 31000 applicability to the IT
IT security audit impact on organisational security
The responsibilities of employees and stakeholders in relation to implementation of security audit recommendations.

Part 2: Develop and implement an IT security policy based on the scenario context within the main components of disaster recovery plan with justification for their inclusion.

Part 3: You will evaluate your security policy and proposed tools used within the policy and how they align with IT security.
Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

Unique Document

Under Evaluation

Get Money
into Your Wallet

Total 19 pages, 1 USD Per Page

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2020). HND In Computing. Retrieved from https://myassignmenthelp.com/free-samples/zlx05-hnd-in-computing.

"HND In Computing." My Assignment Help, 2020, https://myassignmenthelp.com/free-samples/zlx05-hnd-in-computing.

My Assignment Help (2020) HND In Computing [Online]. Available from: https://myassignmenthelp.com/free-samples/zlx05-hnd-in-computing
[Accessed 19 September 2021].

My Assignment Help. 'HND In Computing' (My Assignment Help, 2020) <https://myassignmenthelp.com/free-samples/zlx05-hnd-in-computing> accessed 19 September 2021.

My Assignment Help. HND In Computing [Internet]. My Assignment Help. 2020 [cited 19 September 2021]. Available from: https://myassignmenthelp.com/free-samples/zlx05-hnd-in-computing.

Frequency tables are applicable in almost every subject from economics to physics, mathematics etc. Thus, you need to have a strong foundation on the subject matter. However, if you find it to be challenging, then do not hesitate to avail our assistance at MyAssigmenthelp.com. We provide help with frequency distribution tables in mathematics to frequency tables in economics. Interestingly, we offer a wide array of writing services at an affordable price. Our math solvers play a huge role in assisting students who require statistics help. Furthermore, we offer proofreading to check for any inconsistencies in the answers.

Latest It Write Up Samples

ITC508 Object Modelling

Download : 0 | Pages : 8

Answer: A prototype is the previous approximation of any resulting system or product. The prototyping model has been the SDM or “System Development Method”, where a prototype is created (Karstens et al., 2014). It has been needed to validate system design of “XYZ car parking system” using the interaction diagrams like sequence diagrams or communication diagrams. It should be done for at least two sub-system of this dev...

Read More arrow

1803ICT Information Systems Foundations

Download : 0 | Pages : 11

Answer: Paper 1: Key Design Characteristics for Developing Usable E-Commerce Websites in the Arab World Part 1: A. The Context of the Paper  Research community: In this section of the paper, discussions would be made on the research article entitled “Key Design Characteristics for Developing Usable E-Commerce Websites in the Arab World”.  The paper essentially addresses the Information Technology and Communication...

Read More arrow Tags: Australia Sunnybank Management University of Melbourne Masters in Business Administration 

HI5019 Strategic Information Systems For Business And Enterprise

Download : 0 | Pages : 11

Answers: Introduction Accounting software packages are used by the companies to manage the records related to the customers, financial, investment and etc. These software packages facilitate the organization to manage the entire business activities in the context of financial activities with any flaw (Albrecht, etal, 2010). In this context, the research paper describes, the use of accounting software packages in accounting information systems...

Read More arrow Tags: Australia Emu Plains Management managerial policy University of New South Wales Masters in Business Administration 

ITC561 Cloud Computing

Download : 0 | Pages : 13

Answers: Introduction  The report is presenting description about the migration of web services within the concerned organization named SoftArc Engineering Ltd that operated their business over throughout Australia, Sydney as well as Papua New Guinea. This report is elaborating important benefits ad issues involved within this migration process with respect to their fictional objectives and goals within their selected target market. The...

Read More arrow

INFO6030 Systems Analysis And Design

Download : 0 | Pages : 9

Answer: 1.1 Introduction (System qualities) Serving as the overall system factors, system qualities are the factors that affect the system design in order to influence user experiences and run-time behaviours. In essence, they will represent the concerns that will provide a wider impact on different application platforms and users. For the project at hand, ‘My Health Record’, the system aims to enhance the efficiency of the health...

Read More arrow Tags: Australia Melbourne Management c# programm University of New South Wales 

5% Cashback

On APP - grab it while it lasts!

Download app now

*Offer eligible for first 3 orders ordered through app!

callback request mobile
Have any Query?