Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Computer Science Question

Description

see

College of Computing and Informatics

Assignment 2
Deadline: Tuesday 10/11/2025 @ 23:59
[Total Mark for this Assignment is 8]
Student Details:
Name:

ID:

CRN:
Instructions:

• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.

• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).

• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.

• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.

• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.

Restricted – ‫مقيد‬

Question One

Pg. 01
Learning
Outcome(s):
CLO5: Apply the
most appropriate
solutions to
problems related
to the field of
Security and
Information
Assurance.

Restricted – ‫مقيد‬

Question One

3 Marks

Write a one-page confidentiality agreement tailored for a small tech startup. Your
agreement should include:
• The definition and scope of confidential information
• The obligations of the recipient in protecting this information
• Any exceptions to confidentiality obligations
• The duration of the agreement and handling of confidential materials after
termination.
Answer:

Question Two

Pg. 02
Learning
Outcome(s):

Question Two

2 Mark

CLO3: Develop

Why is using social media considered a type of background check, and what

security policies

implications does this practice have for privacy and employment decisions?

and put in place
an effective
security
architecture that
comprises
modern hardware
and software
technologies and
protocols

Restricted – ‫مقيد‬

Answer:

Question Three

Pg. 03
Learning
Outcome(s):
LO1: Apply
effective, proper,
and state-of-theart security tools
and technologies.

Question Three

3 Marks

The Saudi Electronic University (SEU) has recently established a new Data Centre at its
Riyadh campus to host critical systems, including Blackboard, Student Information
Records, and administrative services. During an internal security audit, several issues
were identified: unauthorized access by cleaning staff to the server room, unlocked
workstations in administrative offices after hours, power fluctuations caused by nearby
construction, disposal of old laptops and hard drives without secure data wiping, and
expired fire extinguishers with no automated suppression system.
Question:
Based on ISO 27002:2013 physical and environmental security controls, identify and
analyze at least four major physical and environmental security risks observed in this
scenario. Then, propose a layered security design for the SEU Data Center, addressing
perimeter defense, physical entry control, and internal monitoring mechanisms. Next,
describe the preventive and responsive measures SEU should implement to mitigate fire,
power failure, and device theft risks. Finally, discuss how the failure to comply with
these physical security controls could constitute a violation of SEU’s Acceptable Use
Policy and the National Cybersecurity Authority (NCA) Essential Cybersecurity
Controls (ECC) in Saudi Arabia.
Answer:

Restricted – ‫مقيد‬

Purchase answer to see full
attachment

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

505 CT 2-5

Description In research, you should select research articles that are peer-reviewed and, in most instances, are not more than five years old. When searching in the Saudi Digital Library, you can limit the results by publication date and peer-reviewed journals so that you get the most recent, credible research on

505 CT 2-6

Description In research, you should select research articles that are peer-reviewed and, in most instances, are not more than five years old. When searching in the Saudi Digital Library, you can limit the results by publication date and peer-reviewed journals so that you get the most recent, credible research on

505 CT 2-6

Description In research, you should select research articles that are peer-reviewed and, in most instances, are not more than five years old. When searching in the Saudi Digital Library, you can limit the results by publication date and peer-reviewed journals so that you get the most recent, credible research on

505 CT 2-6

Description In research, you should select research articles that are peer-reviewed and, in most instances, are not more than five years old. When searching in the Saudi Digital Library, you can limit the results by publication date and peer-reviewed journals so that you get the most recent, credible research on

505 CT 2-6

Description In research, you should select research articles that are peer-reviewed and, in most instances, are not more than five years old. When searching in the Saudi Digital Library, you can limit the results by publication date and peer-reviewed journals so that you get the most recent, credible research on

505 CT 2-7

Description In research, you should select research articles that are peer-reviewed and, in most instances, are not more than five years old. When searching in the Saudi Digital Library, you can limit the results by publication date and peer-reviewed journals so that you get the most recent, credible research on

505 CT 2-8

Description In research, you should select research articles that are peer-reviewed and, in most instances, are not more than five years old. When searching in the Saudi Digital Library, you can limit the results by publication date and peer-reviewed journals so that you get the most recent, credible research on

505 CT 2-9

Description In research, you should select research articles that are peer-reviewed and, in most instances, are not more than five years old. When searching in the Saudi Digital Library, you can limit the results by publication date and peer-reviewed journals so that you get the most recent, credible research on

505 CT 2-10

Description In research, you should select research articles that are peer-reviewed and, in most instances, are not more than five years old. When searching in the Saudi Digital Library, you can limit the results by publication date and peer-reviewed journals so that you get the most recent, credible research on

505 CT 2-11

Description In research, you should select research articles that are peer-reviewed and, in most instances, are not more than five years old. When searching in the Saudi Digital Library, you can limit the results by publication date and peer-reviewed journals so that you get the most recent, credible research on

505 CT 2-12

Description In research, you should select research articles that are peer-reviewed and, in most instances, are not more than five years old. When searching in the Saudi Digital Library, you can limit the results by publication date and peer-reviewed journals so that you get the most recent, credible research on

505 CT 2-13

Description In research, you should select research articles that are peer-reviewed and, in most instances, are not more than five years old. When searching in the Saudi Digital Library, you can limit the results by publication date and peer-reviewed journals so that you get the most recent, credible research on

505 CT 2-14

Description In research, you should select research articles that are peer-reviewed and, in most instances, are not more than five years old. When searching in the Saudi Digital Library, you can limit the results by publication date and peer-reviewed journals so that you get the most recent, credible research on

505 CT 2-15

Description In research, you should select research articles that are peer-reviewed and, in most instances, are not more than five years old. When searching in the Saudi Digital Library, you can limit the results by publication date and peer-reviewed journals so that you get the most recent, credible research on

506 m2 solve

Description Critical Thinking Assignment (110 points) This week we are learning about the various types of studies that can be used in researching a population for risk factors, controls versus experimental treatment, and the Framingham heart study is introduced. Please read the following study: Omer, F. M., Awadalla, N. J.,

506 m2 solve fa

Description Critical Thinking Assignment (110 points) This week we are learning about the various types of studies that can be used in researching a population for risk factors, controls versus experimental treatment, and the Framingham heart study is introduced. Please read the following study: Omer, F. M., Awadalla, N. J.,

answer 2 saeed

Description solve 0 plagrasim Assignment No. 2 Islamic Jurisprudential Perspectives on Health Insurance Objectives: 1. Identify and categorize the different types of health insurance. 2. Highlight the main characteristics of social (cooperative) health insurance. 3. Explain and clarify the Shariah ruling on social (cooperative) health insurance, including its types and

answer 3 saeed

Description solve0 plagrasim Assignment No. 3 Learning from Global Experiences in Health Insurance and Comparative Analysis Objectives: 1. Review and analyze health insurance systems and experiences from other countries. 2. Examine alternative models of social (cooperative) health insurance implemented internationally. 3. Compare the Saudi social (cooperative) health insurance system with