Professional Documents
Culture Documents
NguyenHaiAnh - Security - Assignment 2
NguyenHaiAnh - Security - Assignment 2
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Grading grid
P5 P6 P7 P8 M3 M4 M5 D2 D3
Table of contents
List of Figures
List of Tables
Introduction
Introduce the project and explain what the project is all about
Explain the problems that requires address and give solutions to the problems
Talk about what the important parts of the assignment you will address
Conclusion
The summary of the entire assignment that brings the report to a satisfying and
logical end.
Evaluation
you must provide your opinion or verdict on whether an argument, or set of
research findings, is accurate.
You can provide a SWOT about the course.
References
Inline text citations are required (Sources of information)
You must use Harvard referencing style for this report.
Criteria to pass
P5 Discuss risk assessment procedures.
Define Risk & risk assessment.
Explain Asset, threat and threat identification procedure, give example
Explain the risk assessment procedure
List risk identification steps
P8 List the main components of an organisational disaster recovery plan, justifying the reasons for
inclusion.
M3 Summarise the ISO 31000 risk management methodology and its application in IT
security.
How does ISO 31000 a family of standards relating to risk management methods apply in IT Security
summarize your discussion.
D2 Consider how IT security can be aligned with organisational policy, detailing the security impact
of any misalignment.
D3 Evaluate the suitability of the tools used in an organisational policy.