Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

solve: begin{tabular}{|c|c|c|c|} hline Scenario & multicolumn{3}{|c|}{begin{tabular}{l} You have recently started work for an engineering design company. They have a small network of computers in

solve:
image text in transcribed
\begin{tabular}{|c|c|c|c|} \hline Scenario & \multicolumn{3}{|c|}{\begin{tabular}{l} You have recently started work for an engineering design \\ company. They have a small network of computers in the office \\ which are connected to the internet. The computers have \\ engineering design software on them plus office applications and \\ all the company computers share files a shared folder on one of \\ the computers. The owner of the company has recently become \\ concerned about the cyber security threats to the company \\ systems and information. \end{tabular}} \\ \hline Task 1 & \multicolumn{3}{|c|}{\begin{tabular}{l} Having found your presentation of Cyber Security very \\ interesting the senior managers of the company have now asked \\ you to set up a test system on a computer which includes all of \\ the relevant protection methods you have suggested. They also \\ want to restrict access to the shared folder so only managers \\ and senior engineers can save files on it while junior staff can \\ only read the files. You should select and apply protection \\ methods (P4) which are appropriate for the company (P5/M3) \\ including: \\ - Anti-virus protection \\ - Firewall configuration \\ - Wireless network security \\ - An example of how access control can allow and deny \\ file/folder access to different groups of users \\ - The creation and running of a scheduled back-up \\ The system should be tested to ensure it functions as intended \\ and optimised (D2) to help avoid degrading normal use (for \\ example by scheduling scans and backup out of working hours). \end{tabular}} \\ \hline \begin{tabular}{l} Evidence \\ you must \\ produce for \\ this task \\ \end{tabular} & \multicolumn{3}{|c|}{\begin{tabular}{l} A logbook with annotated screenshots and/or photographs of \\ the installation, configuration, optimisation and testing of the \\ protection methods on the system. \end{tabular}} \\ \hline \multicolumn{4}{|l|}{} \\ \hline \multicolumn{2}{|c|}{\begin{tabular}{l} To achieve the assessment criteria you must show that you \\ are able to: \end{tabular}} & Unit & \\ \hline \multicolumn{2}{|c|}{\begin{tabular}{l} Select routine methods to protect an engineering IT \\ system from cyber security threats. \end{tabular}} & 29 & C.P4 \\ \hline \multicolumn{2}{|c|}{\begin{tabular}{l} Apply routine methods to protect an engineering IT system \\ from cyber security threats appropriately. \end{tabular}} & 29 & C.PS \\ \hline \multicolumn{2}{|c|}{\begin{tabular}{l} Apply appropriate methods to protect an engineering IT \\ system from cyber security threats, testing the system \\ functions as intended \end{tabular}} & 29 & C.M3 \\ \hline \multicolumn{2}{|c|}{\begin{tabular}{l} Optimise an appropriate range of methods to protect an \\ engineering IT system from cyber security threats, testing \\ the system functions as intended. \end{tabular}} & 29 & C.D2 \\ \hline \end{tabular}

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Vector Mechanics for Engineers Statics and Dynamics

Authors: Ferdinand Beer, E. Russell Johnston, Jr., Elliot Eisenberg, William Clausen, David Mazurek, Phillip Cornwell

8th Edition

73212229, 978-0073212227

More Books

Students also viewed these Mechanical Engineering questions