Write security policies and put in place an effective security architecture
Physical and Environmental Security
01 Marks
Learning Outcome(s):
LO 4: Write security policies and put in place an effective security architecture that comprises modern hardware and software technologies and protocols.
Q1)
a) What control policy is required in order to prevent unauthorized access and damage to facilities?
b) Write 2 example controls that are required for securing Offices, Rooms, and Facilities.
Protecting equipment
01 Marks
Learning Outcome(s):
LO 4: Write security policies and put in place an effective security architecture that comprises modern hardware and software technologies and protocols.
Q2) Give two examples for protecting the equipment in an organization.
Secure messaging
01 Marks
Learning Outcome(s):
LO 5: Use effective, proper and state of the art security tools and technologies
Q3) Email is the most preferred way of communication in many sectors currently. Apart from its advantages in communication, emails are also prone to cause various threats to the information technology framework. Explain in the various threats (at least 2) of emails being sent over the internet or a network, and the techniques (at least 2) to protect the messages sent over emails.
Log management
01 Marks
Learning Outcome(s):
LO 5: Use effective, proper and state of the art security tools and technologies
Q4) Describe the activities involved in log management. How to select the appropriate data to log.