attachment_1 (16)

docx

School

Kenya Institute of Management (KIM) *

*We aren’t endorsed by this school

Course

409

Subject

Computer Science

Date

Nov 24, 2024

Type

docx

Pages

5

Uploaded by sammypeter304

Report
College of Computing and Informatics Instructions: You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format . It is your responsibility to check and make sure that you have uploaded both the correct files. Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets, convert text into image or languages other than English or any kind of manipulation). Email submission will not be accepted. You are advised to make your work clear and well-presented. This includes filling your information on the cover page. You must use this template, failing which will result in zero mark. You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question. Late submission will result in ZERO mark. The work should be your own, copying from students or other resources will result in ZERO mark. Use Times New Roman font for all your answers. Assignment 2 Deadline: Thursday 30/11/2023 @ 23:59 [Total Mark for this Assignment is 8] IT Security and Policies IT409 Student Details: Name: CRN: ID:
Pg. 1 Question FourQuestion Four Question One Discuss the employee lifecycle stages, and give example for each? 3 Marks Learning Outcome(s): Analyze problems related to the field of Security and Information Assurance
Pg. 2 Question FourQuestion Four Question Two What is the best, when the company Posting Job, is to have one versions of a job description or two versions of a job description? And why? 1.5 Marks Learning Outcome(s): Analyze problems related to the field of Security and Information Assurance
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Pg. 3 Question FourQuestion Four Question Three Explain, how layered defense model is helping securing facility? 1.5 Marks Learning Outcome(s): Apply effective, proper, and state-of-the-art security tools and technologies.
Pg. 4 Question FourQuestion Four Question Four What is Data Destruction? And what is the benefit of physical destruction? Give two examples of using physical destruction? 2 Marks Learning Outcome(s): Demonstrate processes to implement and enforce policy Develop security