Information Technology

ICTTEN622 – PRODUCE ICT NETWORK ARCHITECTURE DESIGNS

15 May 2023 13:22 PM | UPDATED 11 months ago

ICTTEN622 – PRODUCE ICT NETWORK ARCHITECTURE DESIGNS :

ICTTEN622 - PRODUCE ICT NETWORK ARCHITECTURE DESIGNS
ICTTEN622 – PRODUCE ICT NETWORK ARCHITECTURE DESIGNS

ICTTEN622 – PRODUCING ICT NETWORK ARCHITECTURE DESIGNS INTRODUCTION

This resource is copyright. Apart from any fair dealing for the purposes of private study, research, criticism or review as permitted under the Copyright Act 1968, no part may be reproduced by any process without written permission as expressed in the RTO Works License Agreement.

The information contained in this resource is, to the best of the project team’s and publisher’s knowledge true and correct. Every effort has been made to ensure its accuracy, but the project team and publisher do not accept responsibility for any loss, injury or damage arising from such information.

While every effort has been made to achieve strict accuracy in this resource, the publisher would welcome notification of any errors and any suggestions for improvement. Readers are invited to write to us at [email protected].

IT Works is a series of training and assessment resources developed for qualifications within the Information and Communications Technology Training Package.

CONTENTS

Section 1: Cyber security awareness and practices. 5

Section 2: Cyber security awareness and practices maintenance. 7

Student name: 
Assessor: 
Date: 
Business this assessment is based on: 
Team members: 
ICTTEN622 – PRODUCING ICT NETWORK ARCHITECTURE DESIGNS

Section 1: Cyber security awareness and practices

Survey Check each of the following boxes to confirm your survey addresses each item: ☐ include at least 10 questions ☒ include questions that seek opinions about potential gaps in cyber security and practices ☐ be based on best practice survey design ☐ is electronic ☐ is secure so as to ensure cyber security. Explain how you have ensured the survey is secure.Computer security, cybersecurity, or information technology security refers to the protection of computer systems and networks against information disclosure, theft, or damage to their hardware, software, or electronic data, as well as disruption or misdirection of the services they provide. What is the significance of cybersecurity?How does cybersecurity work?What are cybersecurity threats?how to know your computer is safe?Did you use any antivirus into your device?Did you ever find any virus or malware in your computer?Can you use your personal device to transfer the data?How do you install any software?Did you use the same password for multiple accounts in office?Did you use public computers to log into work account?Can you share your office account credentials to other?How cautious are you while opening an attachment in email?
Survey feedback Include the name of each person that provided the feedback. Summarise your key findings about cyber security awareness and practices based on your survey.Survey feedback we received are: People have little knowledge about cybersecurity but are aware of cyber-crimes and its consequences.People think that the cybersecurity is not their job. These are the work of cybersecurity specialists. Such things have separate department to handle cyber-crime.Most of them have not install antivirus into their computers. They seem to use a strong password for the work account. Some of them have used the public device to work when they are in rush.  
Cyber security awareness program As per the assessment instructions you are to create a cyber security awareness program. You do not need to include any information here except for the title of your presentation. Remember to attach your presentation below. 
Policy and procedure As per the assessment instructions you are to develop one set of policy and procedures focussing on a particular aspect of cyber security of your choice. You do not need to include any information here except for the title of your policy and procedure. Remember to attach your policy and procedure below. 
Paperclip Attach:Survey
Completed surveys
Cyber security program presentation
 Policy and procedures
ICTTEN622 – PRODUCING ICT NETWORK ARCHITECTURE DESIGNS

Section 2: Cyber security awareness and practices maintenance

Discussion summary As per the assessment instructions you are to document the key points from the discussion you had after the training and information session including: Any gaps that you still think there are in your awareness about cyber security awareness and practices and the impact these gaps might have on a workplace.Feedback regarding the program that you delivered.Improvements that should be made to cyber security practices based on your learnings from your own research and analysis as well as others’ programs.Cyber security, also known as electronic data security, safeguards computers, cell phones, businesses, employees, and data against external dangers. It acts as a security gateway to guarantee that your data and what you keep on your devices are not available to outside dangers as a result of the discussion you had after the breach. Cloud security is the protection of information stored in your awareness about online processing stages such as robbery, cyber security awareness and leakage, and erasure. Methods for providing cloud security procedures and the impact these, which include firewalls, entry testing, obscurity, and gaps, may have on a workplace. Tokenization, virtual private networks (VPN), and avoiding public web associations Cloud security is a type Feedback on the cyber security program.
Information update As per the assessment instructions you are to develop information update focussing on a particular aspect of cyber security as per the discussion following the training and information session. You do not need to include any information here except for the title of your Information update. Remember to attach your Information update below.Cloud computing refers to the distribution of various administrations and enhancements over the Internet. Based on your system administration and programming knowledge, these assets comprise devices and cyber security practices applications such as information storage, workers, data sets, and programming. Perhaps you should save records of your own research and analysis, as well as programs from others, on a separate hard drive. Local storage device, cloud-based capacity allows them to be saved to a distant data collection. When an electronic gadget connects to the internet, it connects to the information and product projects that it needs to function.
Paperclip Attach:Information update
  
ICTTEN622 – PRODUCING ICT NETWORK ARCHITECTURE DESIGNS

Visit:https://auspali.info/

Also visit:https://www.notesnepal.com/archives/767