We're Open
+44 7340 9595 39
+44 20 3239 6980

[Solved]You have recently been appointed by Cyber Intelligence. One of the key functions of the business is to explore the vulnera

  100% Pass and No Plagiarism Guaranteed

[Solved]You have recently been appointed by Cyber Intelligence. One of the key functions of the business is to explore the vulnerabilities in organisations’ specific web-based or database systems. Cyber Intelligence provide specific cyber consultancy to a range

Unit 5.39  Cyber Security

Related Qualifications

ATHE Level 5 Diploma in Computing (QCF)

Sample Assignment

You have recently been appointed by Cyber Intelligence. One of the key functions of the business is to explore the vulnerabilities in organisations’ specific web-based or database systems. Cyber Intelligence provide specific cyber consultancy to a range of small business clients.

Your specific role will be to test their systems for vulnerabilities and to recommend improvements to secure the client’s network. At present you are participating in the induction programme at Cyber Intelligence and you need to create a file which will include all the information listed below. At the end of the induction you will need to present the file to your line manager.

Some parts of the file require you to apply information to a particular organisation and you should discuss and agree the choice of the organisation with your tutor who will act as your line manager.

File Contents

Section 1

  • An analysis of current cyber security risks to organisations
  • An evaluation of the different controls that can be used to manage cyber security risks

LO1, LO2 Assessment Criteria 1.1, 2.1

Section 2

  • A critical assessment of the vulnerabilities of the computer network security of your chosen organisation
  • An evaluation of the impact of cyber security on your chosen organisation
  • A critical evaluation of the cyber security strategies that are used within your chosen organisation, mapping these to industry standards

LO1, LO2 Assessment criteria: 1.2, 1.3, 2.2, 2.3

Section 3

Based on your analysis and evaluation of the vulnerabilities within the chosen system

  • Produce a presentation which you would use with a client. The presentation materials must identify possible improvements to make the system secure. 
  • Produce a training plan for improving network security including user awareness and prevention mechanisms.

LO3 Assessment criteria: 3.1, 3.2

Guidelines for assessors

The assignments submitted by learners must achieve the learning outcomes and meet the standards specified by the assessment criteria for the unit. The suggested evidence below is how learners can demonstrate that they have met the required standard. 

Activity number

Assessment criteria

Suggested evidence

1

LO1, LO2

AC 1.1, 2.1

The work in this section of the file can be done from a theoretical standpoint. The learner will produce a comprehensive analysis of current cyber security risks to organisations. The learner will need to carry out research to identify what is “current” and examples should be used to illustrate the points made and to help demonstrate understanding.

 

The learner will evaluate the different controls that organisations may use to control cyber security risks. The evaluation should be balanced identifying strengths as well as areas for development. This could include reviewing strategies, policies, identifying gaps or misaligned resources.

2

LO1, LO2,

AC 1.2, 1.3, 2.2, 2.3

 

For work in this section of the file the learner will need access to an organisation and to their network which has vulnerabilities. This must be agreed with the tutor as the learner will need permission to test the system to reveal these vulnerabilities.  The learner may need to be provided with help here to make this choice.

 

The learner will test the system and analyse the benefits and drawbacks to identify security vulnerabilities. The learner needs to assess each of the vulnerabilities and report on their findings.  The learner will evaluate the impact that cyber security has on their chosen organisation, outlining any current threats and attacks that have been evidenced recently.

 

The learner will produce a critical evaluation of the cyber security strategies that the organisation uses and will research best practice and map these strategies, again identifying strengths and weaknesses for the organisation. 

2

LO3

AC 3.1, 3.2

 

Following testing and analysis of the current system, the learner will make recommendations for improvements to the client’s current system to secure their network. These should be directly related to the analyses which have been carried out for the organisation and recent good practice and industry standards.  The presentation materials produced should be appropriate for the intended audience.

 

The learner will then produce a training plan which outlines what the staff within the organisation need to know about network security to ensure the improvements are understood and retained. The training plan will cover user awareness, security training and prevention mechanisms as a minimum. The plan should be an outline of the training to be conducted but it will need to provide some detail so that the training plan can be carried out within the organisation. 

 


100% Plagiarism Free & Custom Written,
Tailored to your instructions


International House, 12 Constance Street, London, United Kingdom,
E16 2DQ

UK Registered Company # 11483120


100% Pass Guarantee

STILL NOT CONVINCED?

View our samples written by our professional writers to let you comprehend how your work is going to look like. We have categorised this into 3 categories with a few different subject domains

View Our Samples

We offer a £ 2999

If your assignment is plagiarised, we will give you £ 2999 in compensation

Recent Updates

Details

  • Title: [Solved]You have recently been appointed by Cyber Intelligence. One of the key functions of the business is to explore the vulnerabilities in organisations’ specific web-based or database systems. Cyber Intelligence provide specific cyber consultancy to a range
  • Price: £ 139
  • Post Date: 2021-10-15T12:41:34+00:00
  • Category: Assignment Requirements
  • No Plagiarism Guarantee
  • 100% Custom Written

Customer Reviews

[Solved]You have recently been appointed by Cyber Intelligence. One of the key functions of the business is to explore the vulnerabilities in organisations’ specific web-based or database systems. Cyber Intelligence provide specific cyber consultancy to a range [Solved]You have recently been appointed by Cyber Intelligence. One of the key functions of the business is to explore the vulnerabilities in organisations’ specific web-based or database systems. Cyber Intelligence provide specific cyber consultancy to a range
Reviews: 5

A masterpiece of assignment by , written on 2020-03-12

I received my order last night and now I’m writing my reviews. My assignment has all the points I needed along with a good style. The citations used are relatable and professional. The best thing is the discount I got because I recommended my friend too to use their service. I am so pleased to use this effective service. The features are also amazing, everything is good. Will come again soon!
Reviews: 5

A masterpiece of assignment by , written on 2020-03-12

I have been taking help from Insta Research since 2015 and believe me, this place is incredible in giving the best help in assignments and essays. I also ask them to run plagiarism in my essays that I have written, and they always gave me accurate results. I am literally blessed to have a strong bonding with this site so that in any need of urgency, I contact them and find them always beside me. Thank you!