Online Learning Environment Security

Ace your studies with our custom writing services! We've got your back for top grades and timely submissions, so you can say goodbye to the stress. Trust us to get you there!


Order a Similar Paper Order a Different Paper

For Assignment 1 you will need to analyse an application scenario and develop a security plan. You must work in a group of 2 – 3 members.

This document includes the instructions and background information:

  • Page 2 describes the application scenario, ref. ‘Scenario: Online Learning Environment Security’.
  • Page 3 is the template for the Security Plan you need to develop, ref. ‘IT Security Plan Template’. You must use this template for your submission.
  • Pages 4-5 provide some ideas to guide you in developing your Security Plan, ref. ‘Security Plan Ideas’.

Submission Instructions:

Please read the following instructions carefully:

ONE student in each group must submit TWO PDF copies of the report (It does not matter which student of the group uploads the submission):

  • One copy with the Revision History (using the table below) submitted via the Assignment 1 Submission point on Learning@Griffith. This is for INSTRUCTORS to provide official marks and feedback. Enter the names and snumbers of the team members in the submission comments field.
  • One copy without the Revision History submitted via the Submission for Peer Review on Learning@Griffith. This is for your CLASSMATES to conduct a peer review, so please make sure your submission is ANONYMOUS (i.e., the names of the group members are not mentioned).

Revision History

Outline the development history of the plan, including the dates, contributors, and a summary of changes.

Date of Change Contributor Summary of Change

For 7623ICT Students: You will need to develop an IT Security Plan Review Report after the peer review process in Week 8. This is an individual task and worth 5%. Please submit your Review Report on Learning@Griffith using the Review Report Submission point. You will receive further instructions in the Week 8 lab.

Scenario: Online Learning Environment Security

Remarkable University is developing a new online learning platform. The platform integrates both existing and newly developed systems, and it needs to be developed to ensure that it is fit for purpose as well as secure from identified threats.

The online learning platform includes the following core components:

  • a learning management system (LMS) that support online classes and discussions for instructors and students;
  • front-end web/application servers which are used by students, academics and administrative staff;
  • databases which hold course data, student data, and the digital library;
  • network channels and facilities.

The platform will need to be built and managed to ensure that the servers are deployed securely and remain secured against common automated and simple manual attacks. Dedicated, targeted attacks are difficult to protect against, however simple measure can be taken to protect against most automated attacks. Identified threats against the platform include (but not limited to):

  • Data hacking/modification, e.g., unauthorised access to personal information.
  • Denial of Service (DoS) attacks
  • Malicious code such as worms
  • Automated scanning and exploit tools
  • Phishing attempts

The online learning environment needs to remain secured, use appropriate access controls, enforce least privilege, and ensure that information flowing to and from the platform is protected. New software needs to be developed in a secure manner and be protected against common attacks, and the databases need to be protected against common automated attacks and use appropriate access controls.

IT Security Plan Template

  1. Introduction

Outline the importance of the plan and its relationship with the organisation’s Security Policy. This section should also address the organisational risk profile.

  1. Key IT Assets

This section should establish relevant and key IT assets with justifications on the claims, and classify them as Hardware, Software, Data, or Communication Facilities and Networks.

  1. Risk Assessment

This provides a summary and analysis of the risk assessment.

Identify risks (i.e., threats and vulnerabilities) to key assets, by considering the confidentiality, integrity, and availability of those key assets. Classify and explain the identified risks according the four security areas: User Authentication and Access Control, Software Security, Web and Network Security, and System and Other Security.

Analyse each of those risks (likelihood, consequence, and level of risk), provide justifications for your ratings, and summarise your findings in a Risk Register in the following table:

Writerbay.net

Looking for top-notch essay writing services? We've got you covered! Connect with our writing experts today. Placing your order is easy, taking less than 5 minutes. Click below to get started.


Order a Similar Paper Order a Different Paper