We write, we don’t plagiarise! Every answer is different no matter how many orders we get for the same assignment. Your answer will be 100% plagiarism-free, custom written, unique and different from every other student.
I agree to receive phone calls from you at night in case of emergency
Please share your assignment brief and supporting material (if any) via email here at: [email protected] after completing this order process.
603/4793/4
Qualification
Level 5 Diploma in IT-Web Design
Qualification No (RQF)
Unit Name
Network Security
Unit Reference
5IT02
No of Credits
20 Credits
Assignment Question
Task 1 – 1000 wordsUnderstand computer network security1.1: Describe 6 common network security threats along with their nature, how will they affect the network and computer (1.1, 1.2)1.2: Select one of the above threats and elaborate how Artificial Intelligence has already been used in security software to detect and defend against it (1.3)
Assessment Criteria1.1 Analyse the factors that affect network and computer security1.2 Identify common security issues in a networked environment1.3 Analyse the role that artificial intelligence AI) could have in defending networks
Task 2 – 1000 wordsUnderstand methods of maintaining computer securityAssuming you have been assigned to ensure the security of your computer network in your organization and answer the following2.1: Define the nature of your network and justify the security tool that you will select to implement (2.3)2.2: Define the types of users in your organization and justify which authentication you would provide for each user role describing their strengths and weaknesses (2.1)2.3: What are the common attacks that your network can encounter and what are the best practices that you can introduce to each role to minimize risks from them (2.2, 2.4)2.4: Compare and contrast Host- vs. Network-Based Intrusion Detection Systems (2.5)
Assessment Criteria2.1 Analyse the strengths and weaknesses of different methods of authentication2.2 Analyse the nature of different types of attack and malicious codes2.3 Select the security tool that is appropriate to the nature of the security issue2.4 Evaluate practices that prevent common attacks from intruders (networks, remote access, email, web security, wireless and instant messaging)2.5 Analyse the differences between network and host intrusion detection systems
Directions:
Distinguished
Excellent
Good
Proficient
Basic
Marginal
Unacceptable
Range
80-100
70-79
60-69
50-59
40-49
35-39
0-34
The quoted price covers up to 3000 words. For custom requirements Live Chat or Whatsapp ← Click Here
Email: [email protected]
Plagiarism Report
Formatting
Title page
Bibliography
Outline
Limitless Amendments
Get all these features for د.إ195.00 FREE
Check Out Our Original Reviews