BTEC IT DATA MODELLING UNIT 5 ASSIGNMENT 2 EXCEL 2023
34 views 0 purchase
Course
BTEC
Institution
Other
BTEC IT DATA
MODELLING UNIT 5
ASSIGNMENT 2 EXCEL
2023
ASSIGNMENT FRONT SHEET
Qualification BTEC Level 5 HND Diploma in Computing
Unit number and title Unit 5: Security
Submission date Date Received 1st submission
Re-submission Date Date Received 2nd submission
Student Name Student ID
Cla...
btec it data modelling unit 5 assignment 2 excel 2
Written for
Other
Other
BTEC
3
All documents for this subject (1)
Seller
Follow
onlinetutor2023
Reviews received
Content preview
BTEC IT DATA
MODELLING UNIT 5
ASSIGNMENT 2 EXCEL
2023
, ASSIGNMENT FRONT SHEET
Qualification BTEC Level 5 HND Diploma in Computing
Unit number and title Unit 5: Security
Submission date Date Received 1st submission
Re-submission Date Date Received 2nd submission
Student Name Student ID
Class Assessor name
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of
making a false declaration is a form of malpractice.
TABLE OF CONTENTS ............................................................................................................................................................... 3
TABLE OF FIGURES .................................................................................................................................................................. 6
LIST OF TABLES........................................................................................................................................................................ 7
A. INTRODUCTION ............................................................................................................................................................. 8
B. (P1) DISCUSS RISK ASSESSMENT PROCEDURES. ............................................................................................................. 9
I. DEFINE RISK & RISK ASSESSMENT ........................................................................................................................................ 9
1. Define Risk: ........................................................................................................................................................... 9
2. Define risk assessment......................................................................................................................................... 11
II. EXPLAIN ASSET, THREAT AND THREAT IDENTIFICATION PROCEDURE , GIVE EXAMPLE ........................................................................ 12
1. Asset Identification .............................................................................................................................................. 12
2. Threat Identification ............................................................................................................................................ 13
3. Threat Identification Procedure ........................................................................................................................... 15
Example: ...................................................................................................................................................................... 17
III. EXPLAIN THE RISK ASSESSMENT PROCEDURE ........................................................................................................................ 18
IV. List risk identification steps .................................................................................................................................. 22
C. (P6) EXPLAIN DATA PROTECTION PROCESSES AND REGULATIONS AS APPLICABLE TO AN ORGANIZATION. ................ 22
I. DEFINE DATA PROTECTION .............................................................................................................................................. 22
II. DATA PROTECTION PROCESS WITH RELATIONS TO ORGANIZATION .............................................................................................. 24
III. WHY ARE DATA PROTECTION AND REGULATION IMPORTANT ? .................................................................................................. 24
1. Why is data protection important? ...................................................................................................................... 24
2. Why is data regulation important? ...................................................................................................................... 25
D. (P7) DESIGN AND IMPLEMENT A SECURITY POLICY FOR AN ORGANIZATION. .............................................................. 31
I. DEFINE AND DISCUSS WHAT IS SECURITY POLICY .................................................................................................................... 31
II. GIVE EXAMPLES OF POLICIES ............................................................................................................................................ 33
III. GIVE THE MOST & SHOULD THAT MUST EXIST WHILE CREATING POLICY . ...................................................................................... 37
IV. EXPLAIN AND WRITE DOWN THE ELEMENT OF SECURITY POLICY ................................................................................................. 39
1. Purpose ............................................................................................................................................................... 39
2. Information security objectives ............................................................................................................................ 39
3. Subjects............................................................................................................................................................... 40
4. Data classification ............................................................................................................................................... 40
5. Cognition and behavior ....................................................................................................................................... 40
3
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller onlinetutor2023. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.49. You're not tied to anything after your purchase.