Information Security
Module Overview:
A computer forensics investigator needs to develop an understanding about security standards and formal procedures within an organisation. This module will provide knowledge in addressing issues around security in the organisational environment. This module aims to introduce the main concept areas around information security and assurance.
Learning Outcomes:
On successful completion of this module, you will be able to:
1. Evaluate the available techniques to secure and manage an information system in a corporate environment.
2. Understand the challenges and evaluate the risks in managing the security of an information system
3. Critically analyse using a threat and risk assessment.
Title: Security Issues
Assignment
• Evaluate the available techniques to secure and manage an information system in a corporate environment.
This will be a report-based assignment, where you will discuss and evaluate issues in information security. Specifically, you must attempt the following tasks...
(a) Describe and critically evaluate the information security techniques available to secure the hardware and operating system platform that supports higher-level applications.
(b) Describe and critically evaluate the information security techniques available to a database administrator, including the tools and technique available to examine historical user actions.
(c) Describe and critically evaluate the information security techniques available to a network engineer in configuring web and email communications, including the option of anonymous communication.
For each task you should be prepared to do your own further research to find additional explanations, diagrams or examples that support or extend the techniques covered in the unit or perhaps alternative techniques not raised in the unit. In either case, as well as describing the technique, you must clearly evaluate its strengths, weaknesses and suitability.