Description
SEE
Assignment 2
Deadline: Day 1/08/2025 @ 23:59
[Total Mark for this Assignment is 2]
Student Details:
Name: ###
ID: ###
CRN: ###
Instructions:
• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).
• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.
• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.
• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.
Restricted – مقيد
Question One
Pg. 01
3 Marks
Learning
Outcome(s):
Question One
CLO3 Develop
Discuss the principles of least privilege and need-to-know in access control
management. How do these principles enhance the security posture of an organization?
security policies
and put in place
an effective
security
architecture that
comprises
modern hardware
and software
technologies and
protocols
Restricted – مقيد
Question Two
Pg. 02
Learning
Outcome(s):
CLO6
Demonstrate
processes to
implement and
enforce policy
Restricted – مقيد
Question Two
2 Marks
What is the purpose of Standard Operating Procedures (SOPs) in security operations,
and how can organizations ensure their effective protection and use?
Question Three
Pg. 03
Learning
Outcome(s):
CLO2: Apply
effective, proper,
and state-of-theart security tools
and technologies.
Restricted – مقيد
Question Three
2 Marks
Discuss the importance of incorporating security measures at every phase of the
Systems Development Life Cycle (SDLC). Use examples to illustrate how security
failures in different SDLC phases can lead to vulnerabilities
Question Four
Pg. 04
Learning
Outcome(s):
CLO4: Analyze
problems related
to the field of
Security and
Information
Assurance
Restricted – مقيد
Question Four
3 Marks
In what ways can a business continuity plan be tailored to address the unique needs of
different industries?
Question Five
Pg. 05
Learning
Outcome(s):
CLO3: Develop
security policies
and put in place
an effective
security
architecture that
comprises
modern hardware
and software
technologies and
protocols
Restricted – مقيد
Question Five
5 Marks
What strategies can financial institutions adopt to foster a culture of cybersecurity
awareness among employees and stakeholders?
Purchase answer to see full
attachment