POLYTECHNIC SULTAN MIZAN ZAINAL ABIDIN
DEPARTMENT OF INFORMATION AND COMMUNICATION TECHNOLOGY
DFP50123
SECURE MOBILE
COMPUTING
TOPIC CHAPTER 1
ASSESMENT PRACTICAL EXERCISE 1
1) MUHAMAD SYAFIQ IKRAM BIN MOHAMAD TARMIZI
2) AHMAD YUSUF FARHAN BIN AWANG
3) MUHAMMAD HIDAYAT BIN AB AZIZ
NAME
1) 13DDT20F2056
2) 13DDT20F2008
3) 13DDT20F2036
REG NO
PROGRAMME DDT4S1
INSTRUCTIONS :
1. Answer ALL the questions
2. Submit the assessment on _______________
MARKING SCHEME
CLO 1 PLO 3
TOTAL /20
THE ENTIRE QUESTION IS BASED ON JTMK’S QUESTION BANK APPROVED BY
PROGRAMME LEADER. SIGNATURE IS NOT REQUIRED.
CHAPTER 1 : INFORMATION SECURITY OVERVIEW
Duration: 2 hour
Learning Outcomes
At the end of this activity session, you should be able to:
1. Identify the need for information security.
2. Explain the potential risks to information security.
The smart mobile devices, such as smartphones and tablets, are becoming an essential
tool in people's personal and business activities. A large amount of personal data and even more
sensitive important company data are stored in these devices, which also exposes a severe risk to
device users when their devices are lost or stolen. If no defence mechanisms were enforced a
prior, the lost or stolen devices would leak user information: your passwords can be broken,
your emails could be seen, m-commence data such as online purchasing or banking transaction
might be viewed; The situation would be worse when a device has the access right to Enterprise
networks, e.g., via VPN, in which company networks will be exposed to malware or could be
hacked.
Questions :
In groups of 3 people download, install and configure tools to protect information in your
mobile device related to the CIA triad. Use the appropriate platform to discuss with your group
members. Builds the outcome to your lecturer at the end of the class and submit the report.
Format Practical Exercise report:
P1. Introduction: Describe the need for information security and identify the
characteristic of information security goal (CIA Triad).
P1 Answer :
1) The CIA triad is vital to information security since it enhances security posture, helps
organizations stay compliant with complex regulations and ensures business continuity.
2) The purpose of the CIA triad is to prevent loss of availability, loss of integrity, and loss of
confidentiality for systems and data.
P2. Tools: State and explain the tools.
P2 Answer :
To protect important data is by using cloud storage called Google Drive. Google drive is
suitable because, the application has Confidentiality that is it can protect personal data and
maintain data privacy. In addition, this application has Integrity, which is able to protect
information from being modified by unauthorized parties. Finally, this application is Availability
that means we can access data anywhere regardless of device.
P3. Steps: Construct step by step you download, install and configure the tools.
P3 Answer :
Step 1 : First of all, open playstore.
Step 2 : After that, search in the search section, then press install, because I have installed
it, so just open the application.
Step 3: Press the files button below, then press the + button
Step 4 : Click upload .
Step 5 : Select picture.
Step 6 : Wait until the upload process is complete.
P3. Outcome: Display the outcome.
Result =
Google drive is very good and safe for users. This Google drive can store a lot of data without
having to worry if the data is lost.
PERFORMANCE LEVEL Weightag
Criteria e Standar Score
(%) d
Excellent Good Moderate Poor
4 3 2 1
PRACTICAL
SKILLS
1. Introduction Able to identify the Able to identify Able to identify some of Unable to
requirements with very some of the the requirements with identify the
clear descriptions requirements with descriptions but need requirement or 20 /4*20
a clear description improvement with poor
descriptions
2. Tools Able to state the Able to state the Able to state the Unable to state the
appropriate tools and appropriate tools appropriate tools and appropriate tools or 20 /4*20
explain very well and explain quite explain but need without explanation
well improvement
3. Steps / Able to construct tools Able to construct Able to construct Unable to construct
Configuration very clear with tools clearly with tools with some tools or without 20 /4*20
appropriate labels some appropriate appropriate labels but labels
labels need improvement
4. Outcome Able to display Able to display Able to display Unable to
20 /4*20
appropriately very clear appropriately clear appropriately clear display the
outcome outcome outcome but need outcome
improvement
5. Punctuality Able to builds the Able to builds the Able to builds the outcome Unable to builds
outcome in the given outcome in the given in the given time but need the outcome in
time appropriately time appropriately improvement the given time 20 /4*20
very well well
Total Score /100
Total Score * 20/100 /20