0% found this document useful (0 votes)
68 views8 pages

Practical Exercise 1 SMC (Syafiq F2056, Hidayat F2036, Ahmad F2008)

1) The document discusses securing information on mobile devices using the CIA triad model of information security - confidentiality, integrity, and availability. 2) Students are instructed to work in groups of 3 to download, install, and configure tools to protect information related to the CIA triad on their mobile devices. 3) The report outlines the format for reporting on the practical exercise, including an introduction on information security needs, the tools used, step-by-step instructions, and the outcome.

Uploaded by

F2056 Syafiq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views8 pages

Practical Exercise 1 SMC (Syafiq F2056, Hidayat F2036, Ahmad F2008)

1) The document discusses securing information on mobile devices using the CIA triad model of information security - confidentiality, integrity, and availability. 2) Students are instructed to work in groups of 3 to download, install, and configure tools to protect information related to the CIA triad on their mobile devices. 3) The report outlines the format for reporting on the practical exercise, including an introduction on information security needs, the tools used, step-by-step instructions, and the outcome.

Uploaded by

F2056 Syafiq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

POLYTECHNIC SULTAN MIZAN ZAINAL ABIDIN

DEPARTMENT OF INFORMATION AND COMMUNICATION TECHNOLOGY

DFP50123
SECURE MOBILE
COMPUTING

TOPIC CHAPTER 1
ASSESMENT PRACTICAL EXERCISE 1
1) MUHAMAD SYAFIQ IKRAM BIN MOHAMAD TARMIZI
2) AHMAD YUSUF FARHAN BIN AWANG
3) MUHAMMAD HIDAYAT BIN AB AZIZ
NAME

1) 13DDT20F2056
2) 13DDT20F2008
3) 13DDT20F2036
REG NO

PROGRAMME DDT4S1

INSTRUCTIONS :
1. Answer ALL the questions
2. Submit the assessment on _______________

MARKING SCHEME
CLO 1 PLO 3
TOTAL /20
THE ENTIRE QUESTION IS BASED ON JTMK’S QUESTION BANK APPROVED BY
PROGRAMME LEADER. SIGNATURE IS NOT REQUIRED.
CHAPTER 1 : INFORMATION SECURITY OVERVIEW
Duration: 2 hour

Learning Outcomes
At the end of this activity session, you should be able to:

1. Identify the need for information security.


2. Explain the potential risks to information security.

The smart mobile devices, such as smartphones and tablets, are becoming an essential
tool in people's personal and business activities. A large amount of personal data and even more
sensitive important company data are stored in these devices, which also exposes a severe risk to
device users when their devices are lost or stolen. If no defence mechanisms were enforced a
prior, the lost or stolen devices would leak user information: your  passwords can be broken,
your emails could be seen,  m-commence data such as online purchasing or banking transaction
might be viewed;  The situation would be worse when a device has the access right to Enterprise
networks, e.g., via VPN, in which company networks will be exposed to malware or could be
hacked.

Questions :
In groups of 3 people download, install and configure tools to protect information in your
mobile device related to the CIA triad. Use the appropriate platform to discuss with your group
members. Builds the outcome to your lecturer at the end of the class and submit the report.

Format Practical Exercise report:


P1. Introduction: Describe the need for information security and identify the
characteristic of information security goal (CIA Triad).
P1 Answer :
1) The CIA triad is vital to information security since it enhances security posture, helps
organizations stay compliant with complex regulations and ensures business continuity.

2) The purpose of the CIA triad is to prevent loss of availability, loss of integrity, and loss of
confidentiality for systems and data.

P2. Tools: State and explain the tools.

P2 Answer :
To protect important data is by using cloud storage called Google Drive. Google drive is
suitable because, the application has Confidentiality that is it can protect personal data and
maintain data privacy. In addition, this application has Integrity, which is able to protect
information from being modified by unauthorized parties. Finally, this application is Availability
that means we can access data anywhere regardless of device.

P3. Steps: Construct step by step you download, install and configure the tools.
P3 Answer :
Step 1 : First of all, open playstore.

Step 2 : After that, search in the search section, then press install, because I have installed
it, so just open the application.
Step 3: Press the files button below, then press the + button

Step 4 : Click upload .


Step 5 : Select picture.

Step 6 : Wait until the upload process is complete.

P3. Outcome: Display the outcome.


Result =

Google drive is very good and safe for users. This Google drive can store a lot of data without
having to worry if the data is lost.
PERFORMANCE LEVEL Weightag
Criteria e Standar Score
(%) d
Excellent Good Moderate Poor
4 3 2 1
PRACTICAL
SKILLS
1. Introduction Able to identify the Able to identify Able to identify some of Unable to
requirements with very some of the the requirements with identify the
clear descriptions requirements with descriptions but need requirement or 20 /4*20
a clear description improvement with poor
descriptions

2. Tools Able to state the Able to state the Able to state the Unable to state the
appropriate tools and appropriate tools appropriate tools and appropriate tools or 20 /4*20
explain very well  and explain quite explain but need without explanation
well  improvement
3. Steps / Able to construct tools Able to construct Able to construct Unable to construct
Configuration very clear with tools clearly with tools with some tools or without 20 /4*20
appropriate labels some appropriate appropriate labels but labels
labels need improvement
4. Outcome Able to display Able to display Able to display Unable to
20 /4*20
appropriately very clear appropriately clear appropriately clear display the
outcome outcome outcome but need outcome
improvement
5. Punctuality Able to builds the Able to builds the Able to builds the outcome Unable to builds
outcome in the given outcome in the given in the given time but need the outcome in
time appropriately time appropriately improvement the given time 20 /4*20
very well well

Total Score /100

Total Score * 20/100 /20

You might also like