Write security policies and put in place an effective security architecture

Physical and Environmental Security

01 Marks

Learning Outcome(s):

LO 4: Write security policies and put in place an effective security architecture that comprises modern hardware and software technologies and protocols.

Q1)

a) What control policy is required in order to prevent unauthorized access and damage to facilities?

b) Write 2 example controls that are required for securing Offices, Rooms, and Facilities.

Protecting equipment

01 Marks

Learning Outcome(s):

LO 4: Write security policies and put in place an effective security architecture that comprises modern hardware and software technologies and protocols.

Q2) Give two examples for protecting the equipment in an organization.

Secure messaging

01 Marks

Learning Outcome(s):

LO 5: Use effective, proper and state of the art security tools and technologies

Q3) Email is the most preferred way of communication in many sectors currently. Apart from its advantages in communication, emails are also prone to cause various threats to the information technology framework. Explain in the various threats (at least 2) of emails being sent over the internet or a network, and the techniques (at least 2) to protect the messages sent over emails.

Log management

01 Marks

Learning Outcome(s):

LO 5: Use effective, proper and state of the art security tools and technologies

Q4) Describe the activities involved in log management. How to select the appropriate data to log.