Skip to main content

Access control is a critical

CMP71001: Cybersecurity S2/2018
Student:

Criteria Marks Mark break
down
Mark
Received
Feedback Note to the student Note to the marker
Task1 12 partial marks of 0.5(s) can be given to
incomplete but correct answers
Identify the most critical components of
the university’s information system – the
critical information assets
3 Access control is a critical component of any
information system. WFA can help to identify the
most critical component. If you don’t use WFA,
provide arguments to justify your choice of the
critical components.
Identify what threats the BYOD policy may
bring to the identified critical assets
3 Do not bring in any threats. Think about BYOD policy.
Identify potential vulnerabilities of each
asset against the identified threats
3 Use TVA worksheet to document this process.
Assess the risk to the university’s
information system.
3 You can use either quantitative or qualitative risk
assessment method.
Task 2 10
Clearly explains the working principle of
the certificate-based authentication.
3
Compare and contrast the certificate
based authentication and password-based
authentication.
3
Correctly identify and highlight the useful
features of the certificate-based
authentication for BYOD policy.
3
Quality of references 1 Reference from reputable sources e.g. textbook,
research papers, technical reports.
Task 3 8
Correctly identify the characteristics of a
Spam and Spamming act.
2
Provide three representative examples of
Spams
3
Spam handling instruction 3
Total 30 0
General feedback:

Assignment-2 Marking Guide

The post Access control is a critical appeared first on My Assignment Tutor.



Logo GET THIS PAPER COMPLETED FOR YOU FROM THE WRITING EXPERTS  CLICK HERE TO ORDER 100% ORIGINAL PAPERS AT PrimeWritersBay.com

Comments