Brief :
Use the template in respect to structure report and ensure correct information in the white box.
Risks identified in the scenario |
Guidance: List the assets which is required to protect and, using a table, show the risks of your given scenario, with good research and the supporting arguments. Define for each risk and impact and show how the risks are prioritised. All risks need to be linked to your specific scenario and justified with your arguments. |
Physical security solutions and limitations |
Guidance: Show physical security solutions for the assets and risks identified in 1. They need to be argued well across most types of threats, with disadvantage listed and supported by good research. Everything needs to be connected to the specific scenario and justified with your arguments. |
Software security solutions and limitations |
Guidance: Explain software security solutions for the assets and risks you identified in 1. They need to be argued well across types of threats, with limitations listed and supported by good research. Everything needs to be connected with specific scenario and justify your arguments. |
Business continuity and disaster recovery plan |
Guidance: Show business continuity and disaster recovery plan; if bad things do happen how will you recover and go on. This needs to be consistent with the previous sections, addressing the assets of your specific scenario and supported by good research. |
Each section must be supported by research.
Use Harvard referencing.
Students Also Like to Read About : Utilization of Information Technology in Business - M&S