Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

IT-474: Introduction to Cyber Security 12091

Description

1- Question one

Explain the importance of maintaining the chain of evidence during a digital forensic investigation.
In your answer, describe the role of the evidence custody officer and explain what could happen if evidence is not handled correctly.

2-Question Two

Provide an example to explain the importance of managing disgruntled employees in safeguarding organizational security and stability. What specific measures, policies, or procedures should be implemented to reduce potential risks and protect the organization’s assets, data, and reputation?

3- Question Three

Imagine a financial institution experiences a major power failure that disrupts online banking services for several hours.
Discuss how a well-designed Business Continuity Plan (BCP) and Disaster Recovery (DR) strategy could have minimized this disruption. Explain the specific steps that should be taken before, during, and after such an event.

4-Question Four

A healthcare provider wants to protect patient records stored on cloud servers and transmitted between clinics. Propose an encryption strategy combining symmetric and asymmetric cryptography to ensure confidentiality, integrity, and authentication. Explain why this hybrid approach is effective

College of Computing and Informatics

Assignment 2
Deadline: Monday 11/11/2025 @ 23:59
[Total Mark for this Assignment is 8]
Student Details:
Name: ###

ID: ###

CRN: ###
Instructions:

• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.

• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).

• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.

• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.

• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.

Restricted – ‫مقيد‬

Question Two

Pg. 03

Learning
Outcome(s):
CLO3: Apply
proper security
countermeasures.

Restricted – ‫مقيد‬

Question One

1.5 Marks

Explain the importance of maintaining the chain of evidence during a digital forensic
investigation.
In your answer, describe the role of the evidence custody officer and explain what
could happen if evidence is not handled correctly.

Question Two

Pg. 03

Learning
Outcome(s):
CLO5: Examine
the implemented
security controls.

Restricted – ‫مقيد‬

Question Two

1.5 Marks

Provide an example to explain the importance of managing disgruntled employees in
safeguarding organizational security and stability. What specific measures, policies, or
procedures should be implemented to reduce potential risks and protect the
organization’s assets, data, and reputation?

Question Two

Pg. 03

Learning
Outcome(s):
CLO6:
Demonstrate the
process of
investigating
computer crimes.

Restricted – ‫مقيد‬

Question Three

2.5 Marks

Imagine a financial institution experiences a major power failure that disrupts online
banking services for several hours.
Discuss how a well-designed Business Continuity Plan (BCP) and Disaster Recovery
(DR) strategy could have minimized this disruption. Explain the specific steps that
should be taken before, during, and after such an event.

Pg. 04

Learning
Outcome(s):

Question Four

2.5 Marks

A healthcare provider wants to protect patient records stored on cloud servers and

CLO5: Examine

transmitted between clinics. Propose an encryption strategy combining symmetric and

the implemented

asymmetric cryptography to ensure confidentiality, integrity, and authentication.

security controls.

Explain why this hybrid approach is effective

Restricted – ‫مقيد‬

Purchase answer to see full
attachment

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

515 ct 2-2

Description Return and Risk (110 points) You are the patient safety director for a medium-sized hospital. Your radiology manager identified that the current image viewing software has a technical problem that may skip important images when the radiologists are interpreting CT exams. The skipping of images could lead to misinterpretations.

515 ct 2-3

Description Return and Risk (110 points) You are the patient safety director for a medium-sized hospital. Your radiology manager identified that the current image viewing software has a technical problem that may skip important images when the radiologists are interpreting CT exams. The skipping of images could lead to misinterpretations.

515 ct 2-4

Description Return and Risk (110 points) You are the patient safety director for a medium-sized hospital. Your radiology manager identified that the current image viewing software has a technical problem that may skip important images when the radiologists are interpreting CT exams. The skipping of images could lead to misinterpretations.

515 ct 2-5

Description Return and Risk (110 points) You are the patient safety director for a medium-sized hospital. Your radiology manager identified that the current image viewing software has a technical problem that may skip important images when the radiologists are interpreting CT exams. The skipping of images could lead to misinterpretations.

515 ct 2-6

Description Return and Risk (110 points) You are the patient safety director for a medium-sized hospital. Your radiology manager identified that the current image viewing software has a technical problem that may skip important images when the radiologists are interpreting CT exams. The skipping of images could lead to misinterpretations.

515 ct 2-7

Description Return and Risk (110 points) You are the patient safety director for a medium-sized hospital. Your radiology manager identified that the current image viewing software has a technical problem that may skip important images when the radiologists are interpreting CT exams. The skipping of images could lead to misinterpretations.