ICTNWK502 Task 2 Answer Part A
ICTNWK502 Task 2 Answer Part A
Privacy
“I give my permission for my assessment material to be used in the
Release
auditing, assessment validation & moderation Process”.
Clause:
“I declare that:
Authenticity The material I have submitted is my own work;
Declaration: I have given references for all sources of information that are
not my own, including the words, ideas and images of others”.
If a student is not happy with his/ her results, that student may appeal against their grade via a written letter, clearly
stating the grounds of appeal to the Chief Executive Officer. This should be submitted after completion of the subject
and within fourteen days of commencement of the new term.
Re-assessment Process:
An appeal in writing is made to the Director of Studies (DOS) providing reasons for re-assessment
/appeal.
DOS will delegate another faculty member to review the assessment.
The student will be advised of the review result done by another assessor.
If the student is still not satisfied and further challenges the decision, then a review panel is formed
comprising the lecturer/trainer in charge and the DOS OR if need be an external assessor.
The Institute will advise the student within 14 days from the submission date of the appeal. The decision of
the panel will be deemed to be final.
If the student is still not satisfied with the result, the he / she has the right to seek independent advice or
follow external mediation option with nominated mediation agency.
Any student who fails a compulsory subject or appeals unsuccessfully will be required to re-enrol in that
subject.
The cost of reassessment will be borne by the Institute. The external assessor will base his/her judgement based on
principles of assessment. These principles require assessment to be reliable, fair, practical and valid.
Academic Appeals:
If you are dissatisfied with the outcome of the re-evaluation process, you have a right to appeal through
academic appeals handling protocol.
To appeal a decision, the person is required to complete the WSC- Request for Appeal of a Decision form
with all other supporting documents, if any. This form is available via our website. The completed Request
for Appeal form is to be submitted to the Student Support Officer either in hard copy or electronically via the
following contact details:
Student Support Officer, Western Sydney College (WSC), 55 High St, Parramatta NSW 2150, Email:
[email protected]
The notice of appeal should be in writing addressed to the Chief Executive Officer and submitted within
seven days of notification of the outcome of the re-evaluation process.
If the appeal is not lodged in the specified time, the result will stand and you must re-enrol in the unit.
In emergency circumstances, such as in cases of serious illness or injury, you must forward a medical
certificate in support of a deferred appeal. The notice of appeal must be made within three working days of
the concluding date shown on the medical certificate.
The decision of Chief Executive Officer will be final.
Student would then have the right to pursue the claim through an independent external body as detailed in
the students’ complaint / grievance policy.
Assessor Name
Assessment Date/s
Outcomes
Satisfactory
Did the student submit the following? Yes No
Completed written questionnaire.
Performance indicators
Satisfactory
Did the student submit evidences for the following? Yes No
Question 1
Question 2
Question 3
Question 4
Question 5
Question 6
Question 7
Question 8
Question 9
Question 10
Comments/Feedback to Student
Assessor Name:
Assessor Signature:
Student Signature:
Assessor Name:
Assessor Signature:
WSC has asked you to implement secure encryption technologies. This will involve
completing the following tasks:
3. Monitoring encryption
Review the WSC Information Technology Security Policy, Procedures and Plan, and the
WSC Authentication Policy in Appendix 1 for further relevant information.
You should also review the complete WSC IT policies and procedures document, the WSC
ICT Inventory and WSC strategic plan (available in the student shared folder on the H drive)
for further information and details about WSC and its network.
Based on the above and additional information that may be provided by your
assessor complete the following tasks:
1. Review WSC Information Technology Security Policy, Procedures and Plan, and the
WSC Authentication Policy in Appendix 1 of this task to analyse enterprise data security
requirements. Write a notification to the IT manager, informing them of the security
requirements. Upload the notification with your assessment submission.
Subject: WSC Security requirements
You will have to write an email to me (IT manager) discussing different data security
requirements. For example, you can have a list of different requirements and for each you
have to explain the requirement in detail:
What does this mean in terms of GDPR? Only those who need access to personal
information to perform their job have access. In this situation, privacy training should be
available to those individuals to ensure that the intended purpose for the collection of
personal data is maintained.
Technical safeguards, such as a DLP tool, are critical in preventing a breach and
becoming the next headline. According to GDPR, organizations, whether they are the
controller or processor of personal information, are held liable for the loss of any
personal data they collect. Incorporating DLP controls adds a layer of protection by
restricting the transmission of personal data outside the network.
3. Encryption & Pseudonymization
There are GDPR technical requirements for your organization’s incident response.
Breach notification requirements are among the most notable in the legislation. Under
GDPR, “In the event of a potential data breach that involves personal information, an
organization must notify the Data Protection Authority without undue delay, within 72
hours if feasible, after becoming aware of the breach; and Communicate high-risk
breaches to affected data subjects without undue delay” (GDPREU.org).
As you can see, GDPR cybersecurity compliance is just as important for third-party
relationships as it is internally for an organization as long as those third parties process,
store, or transmit personal data of EU data subjects.
6. Policy Management
While this is the last concept covered in this post, it’s my personal favorite.
Policy is the teeth, the hammer, and an “accountability partner” for the previously
discussed data security controls.
Put it all together and, if managed and followed accordingly, policy management is a
foundation for compliance toward GDPR readiness.
It’s no secret that data protection and security has become a hot topic with the
impending General Data Protection Regulation (GDPR) effective on May 25 th.
Thank you.
Regards,
IPsec (Internet Protocol Security) IPsec, also known as the Internet Protocol Security
or IP Security protocol, defines the architecture for security services for IP network traffic.
IPsec describes the framework for providing security at the IP layer, as well as the suite of
protocols designed to provide that security, through authentication and encryption of IP
network packets.
The Kerberos protocol uses a unique ticketing system that provides faster authentication:
Every authenticated domain entity can request tickets from its local Kerberos
KDC to access other domain resources.
The ticket can be used more then once and can be cached on the client side.
3. Review a range of encryption technologies and rank the most appropriate options.
Data encryption involves the translation of data into a format such that only the intend
persons who have a decryption key, also referred to as a secret key will be able to read it.
Before encryption, the data is referred to as plaintext while after encryption the data is
termed as ciphertext.
Data encryption is purposely executed to secure confidential information during storage or
when being transferred from one computer system to another.
There are several data encryption algorithms available:
TripleDES:
This form of data encryption algorithm applies block cipher algorithms thrice to all
the data blocks individually.
The magnitude of the key is enlarged to provide extra protection by increasing the
encryption ability.
Every individual block constitutes of 64-bit data. In this encryption algorithm, three
keys are used where each key constitutes of 56 bits.
A total of three key permutations are provided under this standard:
o Option #1: the three keys are independent
o Option #2: keys 1 and 2 are independent
o Option #3: the three keys are similar
Most importantly, we call #3 triple DES whose key length consists of (3*56 bits =
168 bits) whereas key security consists of (2*56 bits = 112 bits).
The substantially longer key length of this type of encryption algorithms
overpowers other encryption techniques.
Nevertheless, after the development of the advanced encryption standard (AES),
TripleDES has been rendered old-fashioned.
AES is the most popular and broadly used symmetric encryption standard today.
Due to the DES’s small key size and low computing capability, a replacement was
required which led to the development of AES.
Compared with Triple DES, it has been proved to be more than six times
faster. Concerning cybersecurity, the AES acronym, in particular, keeps popping
up on all computer screens as it is the world’s most accepted encryption standard.
It is seen while using messaging applications such as Signal and Whatsapp,
computer platforms such as VeraCrypt and other technologies commonly used.
The AES standard constitutes 3 block ciphers where each block cipher uses
cryptographic keys to perform data encryption and decryption in a 128-bit block.
A single key is used for encryption and decryption thus both the sender and
receiver have the same key.
The sizes of the keys are considered adequate to secure the classified data to a
satisfactory secret level.
This protocol was purposely developed to offer data security as it can take inputs
of arbitrary size to generate a 128-bit hash value output.
Under this protocol, the encryption technique follows 5 phases where every phase
features a predefined task.
RSA security:
File Key
Full Disk Enterpri Deploymen
Product Encrypti Feature Price
Encryption se t
on s
er drag-and- for a
drop UI custom
- quote
Encrypted
files can
be viewed
through
app
without
encrypting
- Quantum
secured
stored data
5. Document encryption options and costs (as determined from activities 2 – 4), and
forward to the IT manager (your assessor) for decision. Upload the documentation with
your assessment submissions.
In the following I have given Document encryption options and cost list. Please lookout
these options and decide an option for our institute. Thank you.
File Key
Full Disk Enterpri Deploymen
Product Encrypti Feature Price
Encryption se t
on s
- Secure
file
deletion
- Secure
online
password
storage
capture