Define the difference between ‘unintentional’ and ‘deliberate’ threats to information systems. Provide 4 examples of deliberate threats and explain how they work.

Assignment – Part A
DO NOT FORGET TO USE INTEXT CITATIONS IN EVERY QUESTION (do not remove this instruction)————USE THE REFERENCES AFTER YEAR 2010 ONLY !!!!

• Question 1: Describe ‘social engineering’ from an I.S. security perspective. Provide two examples of social engineering and two safeguards to prevent these examples. (~250 Words)

• Insert your answer here and remove this comment.

• Question 2: Define ‘alien software’. Explain how it differs from viruses, worms and trojan horses. Give 4 examples of alien software and explain how they work. (~250 Words)

• Insert your answer here and remove this comment.

• Question 3: Define the difference between ‘unintentional’ and ‘deliberate’ threats to information systems. Provide 4 examples of deliberate threats and explain how they work. (~250 Words)

• Insert your answer here and remove this comment.

• Question 4: Define ‘asymmetric encryption’ from an I.S. perspective. Discuss the relationship between encryption, certificate authorities and digital certificates. (~250 Words)

• Insert your answer here and remove this comment.

Reference List: (DO NOT MOVE THIS LIST TO THE END OF THE ASSIGNMENT)———–ALL REFERENCES MUST BE AFTER YEAR 2010
List full references used (only) in alphabetical order by Author Surname.
Please read ‘Assignment Details’ document to find the explanation of the sources that can be used. Failure to use the correct sources or reference them correctly will result in your answers not being marked.

Assignment – Part B
A case study analysis using Toulmin’s Model of Argument (~600 WORDS)
Use the following Table provided for your answers as instructed.
1. You must use the case study provided in the Assignment Details Document.
2. You must analyse every sentence individually in the case study to establish whether it is a Toulmin element and each identified sentence should be individually included in the table below.
3. Not all sentences in the case study will be used in the table below
4. Sentences must be copied from case study and pasted into the appropriate Toulmin element section. You cannot abbreviate or paraphrase the sentences. Abbreviated or paraphrased sentences will not be marked.
5. Sentences can only be used in one element section of the Toulmin table.

Part B of the assignment requires you to apply Toulmin’s Argument Model to analyse a case study to determine the validity or otherwise of the case study’s claim, again reference any additional information sources that you may use.

You MUST use these instructions to complete the ‘Your Opinion’ section of Part B:
Toapplythemodeltotestthevalidity/strengthofaCLAIMthereadermustexamineeach sentenceinthe article and categorise them as a Toulmin element or as an unnecessary extra
e.g.‘opinion’,‘hearsay’,‘definitions’etc.Onceallsentenceshavebeencategorisedthenthe elements should be examined in sequence.
1. What is the CLAIM?
2. Is there any EVIDENCE to support the CLAIM? If so how much and how does it affect the strength of the
CLAIM.
3. Is there a WARRANT (Explicit or Implicit)? Explicit WARRANTS are often stronger because the author can
direct the reader to accept the CLAIM. Implicit WARRANTS leave the reader’s opinion open to
interpretation and this may go against the author’s intended purpose.
4. Is there BACKING? If so how much? If so how much and how does it affect the strength of the CLAIM. 5. Is there a REBUTTAL? The quantity and scope of the REBUTTAL may reduce the strength of the CLAIM
and thus dissuade the reader’s acceptance of the CLAIM.
6. Is there a QUALIFIER? If so, to what


 

PLACE THIS ORDER OR A SIMILAR ORDER WITH NURSING TERM PAPERS TODAY AND GET AN AMAZING DISCOUNT

get-your-custom-paper

For order inquiries     +1 (408) 800 3377

Open chat
You can now contact our live agent via Whatsapp! via +1 408 800-3377

You will get plagiarism free custom written paper ready for submission to your Blackboard.