Description
see
Assignment 1
Deadline: Day 10/7/2025 @ 23:59
[Total Mark for this Assignment is 15]
Student Details:
Name: ###
ID: ###
CRN: ###
Instructions:
• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).
• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.
• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.
• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.
Restricted – مقيد
Question One
Pg. 01
Learning
Outcome(s):
CLO3: Develop
security policies
and put in place
an effective
security
architecture that
comprises
modern hardware
and software
technologies and
protocols.
Restricted – مقيد
Question One
2 Marks
Define and discuss how the policy lifecycle phases (development, publication,
adoption, review) contribute to building an effective security program within an
organization.
Question Two
Pg. 02
Learning
Outcome(s):
CLO4: Analyze
problems related
to the field of
Security and
Information
Assurance
Restricted – مقيد
Question Two
2 Marks
Explain the distributed governance model and describe how it supports risk
management and policy effectiveness in modern organizations.
Question Three
Pg. 03
Learning
Outcome(s):
CLO2: Apply
effective, proper,
and state-of-theart security tools
and technologies.
Restricted – مقيد
Question Three
5 Marks
Your organization has no formal inventory of its information systems. Create a
sample asset inventory sheet that includes at least 5 hardware and 5 software
assets, including their classification level, owner, and potential impact (CIAbased). Use FIPS-199 as a guide.
Question Four
Pg. 04
Learning
Outcome(s):
CLO4: Analyze
problems related
to the field of
Security and
Information
Assurance
Restricted – مقيد
Question Four
6 Marks
Design a basic SETA (Security Education, Training, and Awareness) program
for non-technical staff in a company. Include specific training or awareness
activities tailored to each component.
Purchase answer to see full
attachment