College of Computing and Informatics
Assignment 2
Deadline: Thursday 3/8/2023 @ 23:59
[Total Mark for this Assignment is 15]
Student Details:
Name: ###
ID: ###
CRN: ###
Instructions:
• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).
• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.
• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.
• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.
Sensitivity: This content has been classified as Petro Rabigh: General Use
Question One
Pg. 01
Learning
Outcome(s):
CLO1
Question One
4 Marks
What the different between Intrusion Detection Systems and Intrusion prevention
Systems?
Explain
networking and
security, security
issues, trends,
and security
resource.
Sensitivity: This content has been classified as Petro Rabigh: General Use
Question Two
Pg. 02
Learning
Outcome(s):
CLO3
Question Two
3 Marks
According to NIST, explain is what the systems development lifecycle (SDLC)? List
with brief explanation each phase of the SDLC?
Develop security
policies and put in
place an effective
security
architecture that
comprises
modern hardware
and software
technologies and
protocols.
Sensitivity: This content has been classified as Petro Rabigh: General Use
Question Three
Pg. 03
Learning
Outcome(s):
CLO 4
Analyze problems
related to the field
of Security and
Information
Assurance.
Question Three
4.5 Marks
What is the difference between a Denial of Service (DoS) attack, malware, and an
information security incident, and how can these threats potentially harm a business or
its operations?
Sensitivity: This content has been classified as Petro Rabigh: General Use
Question Four
Pg. 04
Learning
Outcome(s):
CLO 5
Question Four
3.50 Marks
Describe the core elements of a resilient organization and explain how they contribute
to its ability to adapt and recover from known or unknown environmental changes.
Apply the most
appropriate
solutions to
problems related
to the field of
Security and
Information
Assurance.
Sensitivity: This content has been classified as Petro Rabigh: General Use