Вы находитесь на странице: 1из 2

Limkokwing University College of Creative Technology

Faculty of Information & Communication Technology

Network Security & Testing/Internet Security/


Information Security

Department : Information Communication Technology


Assignment
Semester : 4, 5 & 6 30%
Commence Date : Week 4
Deadline Date : Week 13
Unit Controller / Examiner : Abdulrahman
Contact Number : N/A
E-mail : ali.alodaini@limkokwing.edu.my

Overview:
A network security policy primarily helps in protecting a computer network from network
security threats – both internal and external – from the organization or network. It is
generally a broad document and varies based on the underlying environment,
organization and/or legal requirements. Typically a network security policy documents:

1. Rules and legal procedures to access the network and to modify its
characteristics.
2. Governance and management over Web/Internet access
3. Implementation of security procedures (access control) on network nodes and
devices
4. Role/Privilege based policies, such as identifying authorized and unauthorized
services/processes any user can perform on the network
A network security policy is usually part of a broader information security policy.

Task:
1. You are required to work individually.
2. Write a security policy to help an organization implement or maintain standards by
providing information on how to accomplish policies and maintain standards
3. Your report for each requirement shall have the following structure:

i. Scope and purpose


ii. Roles and responsibilities
iii. Guideline statements
iv. Operational considerations
SUBMISSION INFORMATION
• This assignment is an individual assignment.
• Submit the assignment via email. (ali.alodaini@limkokwing.edu.my)
• Student who submits this assignment after the deadline date stated above will be
penalized.

SPECIFIC INFORMATION

• This assignment is an individual work and it contributes 30% to your total marks.

RULES AND REGULATIONS

• You are NOT allowed to work with other students to get a detailed solution, to
copy a solution, or to give away a solution.
• Do NOT let other students see your solution.
• Do NOT e-mail your solution to anyone other than the lecturer.
• If someone cheats by using your work, you will be penalized.

Вам также может понравиться