MITS5004 MITS5004 IT Security - 2020S2 Assignment 1 Case Study and Presentation MITS5004 Assignment 1 Copyright © XXXXXXXXXXVIT, All Rights Reserved. 2 NOTE: This Document is used in conjunction with...

1 answer below »
need slides and keypoints that can be explained in a video presentation


MITS5004 MITS5004 IT Security - 2020S2 Assignment 1 Case Study and Presentation MITS5004 Assignment 1 Copyright © 2018-2020 VIT, All Rights Reserved. 2 NOTE: This Document is used in conjunction with Assessment 1 [Case Studies & Presentation] in the Unit Guide [MITS5004 IT Security-Unit Guide] Objective(s) This assessment item relates to the unit learning outcomes as in the unit descriptor. This assessment is designed to improve student presentation skills and to give students experience in researching a topic and writing a report relevant to the Unit of Study subject matter. INSTRUCTIONS These instructions apply to Assignment 1 – Case Studies & Presentation Assignment 1 - Case Studies & Presentation - 10% (Sessions 5) Individual Assignment For this component you are required to upload a 5-10-minute video presentation on the LMS, the video presentation should be on a recent academic paper on a topic related to IT Security. The video presentation should show the presenter, along with audio and the slides. The video presentation could be recorded in zoom, like the lectures we have. Some possible topic areas include but are not limited to: • Encryption Techniques • System and Network Security • Digital Forensics • Cloud and IoT Security • Application Security • Data Security • Threats, attacks and malware • Social Engineering and phishing attacks • Ethical Implications in Wireless Networks • Information Security Management and Risk Assessment The paper you select must be directly relevant to one of the above topics or another topic and be related to IT Security. The paper must be related to what we are studying this semester in IT Security. The paper can be from any academic conference or other relevant Journal and should be published in 2015 and later. Please note that popular magazine or web-site articles are not academic papers. MITS5004 Assignment 1 Copyright © 2018-2020 VIT, All Rights Reserved. 3 A grade of 10% of the Units mark will be awarded for your video presentation. What to Submit. You are allocated marks based on your video presentation, the video presentation must be uploaded on the LMS. Plagiarism and collusion All students are warned that VIT takes a serious stand on Plagiarism and collusion. VIT will apply heavy penalties if individuals and groups are caught in academic misconduct. VIT uses sophisticated TURNITIN software built-in the LMS Moodle system for detecting plagiarism and collusion. Late Penalty A penalty of 10% per day would be applied to late submission including weekends.
Answered Same DaySep 04, 2021MITS5004

Answer To: MITS5004 MITS5004 IT Security - 2020S2 Assignment 1 Case Study and Presentation MITS5004 Assignment...

Divya answered on Sep 05 2021
135 Votes
IT SECURITY
IT SECURITY
Cyber safety
System safety
Internet security
Statistics Safety
Request Safety
Analytical figures support preservation
Topic of presentation is IT security
1
TOPICS COVERED ARE:-
Information technology security
Types of it security
Need of it s
ecurity
Encryption techniques
Network security
Digital forensics
Application security
Internet of things
References
List of Topic included
2
INFORMATION TECHNOLOGY SECURITY
It is the security of PC frameworks & systems from the burglary of or harm to their equipment, programming or electronically information just as from the disturbance or confusion of the administrations they give.
It is getting more significant because of expanded dependence on PC frameworks, the web & remote system guidelines, for example Wi-Fi & Bluetooth, because of the development of "shrewd" gadgets, including cell phones, TVs & the different gadgets that comprise of the “things of web". Inferable from its intricacy, regarding legislative issues and innovation, computer’s safety is likewise one of the significant difficulties in the present society.
Computer security is also known as cyber security or information technology security. IT security is a set of cyber security strategies that prevents unauthorized access to organizational assets such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive information, blocking the access of sophisticated hackers.
3
TYPES OF IT SECURITY
System’s safety
Web safety
Endpoint safety
Cloud’s safety
Applications safety
System security is utilized to keep unapproved or pernicious clients from entering to your PC.
Web security includes the assurance of sent data and gotten in programs
Endpoint safety gives assurance at the gadget level. Gadgets that might be made sure about by endpoint security incorporate PDAs, tablets, workstations, and personal computers
Information, Applications and characters are going to cloud, which means clients are associating legitimately to the net & are not ensured by the customary safety load.
With this, applications are explicitly coded at the hour of their design to be as secure as could reasonably be expected, to guarantee they are not defenseless against assaults.
4
NEED OF IT SECURITY
Safeguard the association's capacity to work.
Entitle the sheltered activity of utilizations actualized on the association's Information Technology frameworks.
Safeguards the information the association gathers & employments.
Protects the innovation the association employments.
IT security is needs because it saves our gathered information. Information can be of any type financial, employment, wealth etc.
5
ENCRYPTION TECHNIQUES
It is the way toward encoding data. This cycle changes over the first portrayal...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here