security and policies IT409

College of Computing and InformaticsAssignment 1
Deadline: Tuesday 11/04/2023 @ 23:59
[Total Mark for this Assignment is 8]
Student Details:
Name: ###
ID: ###
CRN: ###
Instructions:
• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).
• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.
• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.
• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.
Question One
Pg. 01
Learning
Outcome(s):
Explain
networking and
security, security
issues, trends, and
security resource.
Apply effective,
proper, and state-
Question One
3 Marks
On this link: https://nca.gov.sa/legislation?item=182&slug=guidelines-list you can find
different policy templates on the cyber security field presented by the Saudi national
cyber security authority. We picked on one document on the link:
https://nca.gov.sa/ccc-en.pdf with the topic Cloud Cybersecurity Controls Policy.
Based Cloud Cybersecurity Controls Policy, answer the following Questions:
a. What is the Policy Format Type and justify the use of the format with the
example from the link.
of-the-art security
tools and
b. Who are the policy audiences with the example from the link?
technologies.
c. Determine one of the policies’ enforcement clauses or controls.
d. Explain the CCC file Identification Notation and Controls Unique Identifier
Structure.
Ans:
a.
b.
c.
d.
Question Two
Pg. 02
Learning
Outcome(s):
Explain
Question Two
ISO 27002 Supplier Relationships (Section 15) was added in the 2013 version. Discuss
your opinion with a real example of why this section was added?
networking and
security, security
issues, trends, and
security resource
2 Marks
Ans:
Question Three
Pg. 03
Learning
Outcome(s):
Question Three
1.5 Marks
Suggest and discuss a short awareness program to protect kids from scammers.
Apply the most
appropriate
solutions to
problems related
to the field of
Security and
Information
Assurance
Ans:
Question Four
Pg. 04
Learning
Outcome(s):
Question Four
1.5 Marks
Discuss the importance of assets’ inventory from a security perspective.
Analyze problems
related to the field
of Security and
Information
Assurance
Ans:

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
Still stressed from student homework?
Get quality assistance from academic writers!

Order your essay today and save 25% with the discount code LAVENDER