Herefordshire College of Technology

Centre 24150

BTEC Nationals in Information Technology

Assessment Front Sheet

Student:
Candidate Number:
Assessor:Terry Prosser
Course: BTEC Level 3 Extended Diploma in Information Technology (QCF)
Unit: 7 - Organisational Systems Security
Title: ED7A2 – Secure Your Threats
Internal Verification of assignment: Len Shand
Date: 05/10/11
Outcome and Principal Objective(s):
P2: Describe how physical security measures can help keep systems secure.
P3: Describe how software and network security can keep systems and data secure.
M2:Explain the operation and use of an encryption technique in ensuring security of transmitted information.
D1: Discuss different ways of recovering from a disaster.
Overall Achievement (Fail/Pass/Merit/Distinction):
Task / 1 / 2 / 3 / 4 / 5
Outcome / P2 / P3 / M2 / D1
Grade
Hand out Date: 11/10/12
Due Date / Submitted date / Grade / Assessor / Verifier
1 09/11/12
2
3
Date assessment completed:

Task 1 (P2)

Prepare a presentation to describe the physical measures that can be used to keep systems secure. You should prepare at least one slide for each of the following:

  • Lock and key
  • Visitor passes
  • Sign-in/sign-out systems
  • Biometrics (a variety)
  • Cable shielding

Task 2 (P3)

You should add to your presentation to describe features for software and network security.

Hints:You should cover (as a minimum – with at least one slide for each):

ED7A2 Secure Your ThreatsPage 1 of 5

  • Call back
  • Handshaking
  • Diskless networks
  • Use of back-ups
  • Audit log
  • Firewall configurations
  • Virus checking software
  • VPNs
  • Intrusion detection systems
  • Passwords
  • Access controls
  • Software updating

ED7A2 Secure Your ThreatsPage 1 of 5

Task 3 (M2)

Task 3 requires an explanation of the operation and use of a selected encryption technique. You will be required to present this part of your assignment to the rest of your class. Your presentation should clearly explain both the encryption and decryption techniques.

Hint:You coulduse one of the following to show how both encryption and decryption work, your example should be either simple or related to the work of ‘Wisdom & Truth’:

ED7A2 Secure Your ThreatsPage 1 of 5

  • Caesar cipher
  • Vignere cipher
  • DES
  • RSA
  • Secure WAN
  • WEP

ED7A2 Secure Your ThreatsPage 1 of 5

Task 4 (D1)

You should prepare an investigation of disaster recovery options as a report to leave with the company. It should be at least two sides of A4 in length and make recommendations to the company of suitable options for their recovery plan.

Hint:The company must be able to use your plan to recover from a potential disaster. You do not need to describe the disaster in detail; you must describe the recovery!

You should investigate the following issues:

  • Back-up systems
  • Whole system replacement
  • Tiers of recovery

ED7A2 Secure Your ThreatsPage 1 of 5