Cyber Security Research

Fundamentals of Cybersecurity
Guidelines for Assignment No. 2 – Cybersecurity Environments

 OBJECTIVE & PURPOSE:

The purpose of this assignment is to help students be able to: Describe the hardware components of modern computing environments and their individual functions (ISC1); Describe the basic security implications of modern computing environments (ISC2); Understand the interaction between cybersecurity and system usability, along with the importance for minimizing the effects of security mechanisms (CSP5).

 DESCRIPTION OF ASSIGNMENT:

Your assignment will be to develop a written paper that will provide a summary of the following:

  • Hardware Components of Office Network:Describe the hardware components of an office network and their individual functions. Provide an image to illustrate your architecture (Use references to support your claims).
  • Office Network Security:In your own words (no quotes, but use references to support your claims) and in the context of the previous described office network, describe the security controles (physical & cyber) and their implications in the desire to balance cybersecurity vs. system usability.
  • Hardware Components of Cloud-based Hosting Services:Describe the hardware components of a cloud-based hosting services and their individual functions. Provide an image to illustrate your architecture (Use references to support your claims)
  • Cloud-based Hosting Services Security:In your own words (no quotes, but use references to support your claims) and in the context of the previous described cloud-based hosting services, describe the security controles (physical & cyber) and their implications in the desire to balance cybersecurity vs. system usability.
  • Conclusion:In your own words (no quotes!!!), provide a conclusion that summarises the whole paper.

In particular, you will need to develop a five-page document (not more!) that outlines each of the section above and provides the details to address the points above.

 FORMAT:

All text in the proposal should be word-processed (letter or correspondence-quality font), New Times Roman or Calibri, 12 point, double space and standard margins. The body of the proposal should be five-pages long (not including title page, Table of Contents, & Certificate of Authorship).

The following information should also be included:

Title page:

  • Project Title
  • Assignment Name and Number
  • Name and e-mail
  • Professor’s name
  • Class Name and Number (e.g. ISEC-615 Winter 2019)
  • Due date

The report should also be done professionally and should include:

  • Table of Contents (with sections & page numbers identified)
  • Page numbers on all pages
  • Clear and consistent headers of all sections
  • Reference List following APA closely
  • Certificate of Authorship – Use the certificate provided as the last page of the document!

Professional and appealing document is expected! As required by Code of Student Conduct and Academic Responsibility, please make sure to document appropriately your references and state it in your own words, or put in quotations.

 GRADING AND RUBRIC:

This case will be graded out of 100 points. This assignment will weight 5 points of your final grade.

Does not meet standard Nearly meets standard Meets standard Exceeds standard
Title page Total mess, nothing is there Few required items there Evidence of all items, but not in a professional appearance All required items there and look professional
TOC page Total mess, nothing is there Few required items there Evidence of all items, but not in a professional appearance All assignment sections noted, page numbers indicated, and look professional
Overall layout Total mess Few required items there Evidence of all items, but not in a professional appearance Assignment look highly professional
Hardware Components of Office Network Not found Few required items there Evidence of all items, but not in a professional appearance Section noted professionally and with proper APA citations
Office Network Security Not found Few required items there Evidence of all items, but not in a professional appearance Section noted highly professional with proper APA citations
Hardware Components of Cloud-based Hosting Services Not found Few required items there Evidence of all items, but not in a professional appearance Section noted highly professional with proper APA citations
Cloud-based Hosting Services Security Not found Few required items there Evidence of all items, but not in a professional appearance Section noted highly professional with proper APA citations
Conclusion Not found Few required items there Evidence of all items, but not in a professional appearance Section noted highly professional with proper APA citations
References Not found Some references appear, but not in APA All references appear, but not fully per APA All references appear and follow closely APA
Certificate of Authorship Not found Parts of required items there Evidence of all items, but not in a professional appearance All required items there and in the template provided

 

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s