Assignment brief
Unit number and title Unit 48: I.T. Security Management
Qualification Pearson BTEC HND Diploma in Computing and Systems Development
Start date 3rd October 2018
Deadline/hand-in 21st October 2018
Assessor Phil Smith
Understand risks to IT security
Assignment title
Student name
In this assessment you will have the
Learning Learning Assessment Task Evidence
opportunity to present evidence that
Outcome Outcome Criteria no. (Page no)
shows you are able to:
Understand 1.1 identify and evaluate types of security risks to
1
LO 1 risks to IT organisations
security 1.2 evaluate organisational security procedures 2
Learner declaration
I certify that the work submitted for this assignment is my own and research sources are fully
acknowledged.
Student signature: Date:
Page 1 of 5
Assignment brief
Unit number and title Unit 48: I.T. Security Management
Qualification Pearson BTEC HND Diploma in Computing and Systems Development
Start date 3rd October 2018
Deadline/hand-in 21st October 2018
Assessor Phil Smith
Understand risks to IT security
Assignment title
In addition to the above PASS criteria, this assignment gives you the opportunity to submit
evidence in order to achieve the following MERIT and DISTINCTION grades
Grade Descriptor Indicative characteristic/s Contextualisation
M1 Identify and apply an effective approach to To achieve M1, you must identify a range of
strategies to find study and research has organisational security procedures, providing
appropriate solutions been applied. supporting evidence from reputable sources.
M2 Select/design and To achieve M2, you must show that you have used
A range of sources of
apply appropriate a range of reputable sources for your research
information has been used
methods/techniques (>5).
M3 Present and The communication is To achieve M3 you must produce documentation to
communicate appropriate for familiar the correct format for a report. The report should
appropriate findings and unfamiliar audiences be capable of being understood by non-specialists
and appropriate media
while including sufficient detail to inform those
have been used.
who are more familiar with the issues.
D1 Use critical
reflection to evaluate Not this assignment
own work and justify
valid conclusions
D2 Take responsibility
for managing and Not this assignment
organising activities
D3 Demonstrate To achieve D3, you must demonstrate that you
convergent/lateral/ Receptiveness to new have considered, and evaluated the merits of,
creative thinking ideas is evident recent advances in organisational security
procedures.
Page 2 of 5
Assignment brief
Unit number and title Unit 48: I.T. Security Management
Qualification Pearson BTEC HND Diploma in Computing and Systems Development
Start date 3rd October 2018
Deadline/hand-in 21st October 2018
Assessor Phil Smith
Understand risks to IT security
Assignment title
Purpose of this assignment
If you have to design the security plan for a company, then you will have to understand the aims and
objectives of that company and the information systems they are using. Without this initial research it
will not be possible to plan an effective solution.
Scenario
Two small businesses in Herefordshire have decided to embark on a new enterprise. Marches Special
Woods (MSW) have been supplying hardwoods to Marches Joinery (MJ) for a decade. Both companies
supply to local builders and do not trade online. MSW can supply a variety of hard woods, both locally
grown and imported. MJ have sophisticated CNC routers and laser cutters. Their joint company,
Marches WoodShell (MWS), is being formed to manufacture and sell wooden cases for mobile phones
direct to customers. This will be an internet only business.
Whereas both companies have been privately owned by families and run in a traditional manner, the
new, also privately owned, MWS is in the hands of two of the new generation of the families, recent
graduates, technically knowledgeable and enthusiastic about creating a vibrant product range. Their
aim is to provide cool designs with customisable features for any current smartphone from Apple,
Samsung, Sony, LG, HTC, Motorola and Nexus. Their unique selling point will be full customisation with
next day delivery.
Initial capital for the company is being provided equally by MSW and MJ. A separate production line has
been established at MJ’s factory.
The owners also want to encourage active customer participation in allowing them to create designs
and patterns for the cases and share them in a gallery. Other customers can order those designs and a
credit would be applied to the original designer’s account for future purchases.
The two directors have asked you, as an IT Security consultant, to report into various aspects of this
start-up company. They feel there may be constraints applied by their traditionalist backers, sharing
the facility and the demands made by their proposed customer set. They want you to prepare a report
which, coming from an external authority, will carry weight with their backers.
Task 1: (LO1 AC 1.1, M2 and M3)
Write a formal report (not more than 600 words) addressed to the directors of MWS.
In your report you need to:
identify types of security risks to organisations, you should include examples from a range of different
categories of threat
evaluate types of security risks to organisations, detailing which are more likely to occur and what the potential
consequences to an organisation are. You should support your description with accurate, up-to-date
information from reputable sources.
Page 3 of 5
Assignment brief
Unit number and title Unit 48: I.T. Security Management
Qualification Pearson BTEC HND Diploma in Computing and Systems Development
Start date 3rd October 2018
Deadline/hand-in 21st October 2018
Assessor Phil Smith
Understand risks to IT security
Assignment title
Task 2: (LO1 AC 1.2, M1 & D3)
Add an additional section to the report (no more than another 600 words)
In this second part of your report you need to:
describe a range of organisational security procedures
identify the strengths and weaknesses of the various procedures that you have identified.
Evidence Evidence
Summary of evidence required by student
checklist presented
Task 1 A formal report, correctly formatted, indexed and fully referenced of not
more than 600 words
Task 2 An addition to the above report, also correctly formatted, indexed and
referenced and of not more than 600 words.
Page 4 of 5
Assignment brief
Unit number and title Unit 48: I.T. Security Management
Qualification Pearson BTEC HND Diploma in Computing and Systems Development
Start date 3rd October 2018
Deadline/hand-in 21st October 2018
Assessor Phil Smith
Understand risks to IT security
Assignment title
Achievement Summary
Pearson BTEC HND Diploma in
Qualification Computing and Systems Assessor name Phil Smith
Development
Unit Number and Unit 48: I.T. Security Management Student name
title
Criteria To achieve the criteria the evidence must show that the Achieved?
Reference student is able to: (tick)
LO 1
1.1 identify and evaluate types of security risks to organisations
1.2 evaluate organisational security procedures
Higher Grade achievements (where applicable)
Grade descriptor Achieved? Grade descriptor Achieved?
(tick) (tick)
M1: Identify and apply strategies to D1: Use critical reflection to
find appropriate solutions evaluate own work and
justify valid conclusions
M2: Select / design and apply D2: Take responsibility for
appropriate methods / techniques managing and organising
activities
M3: Present and communicate D3: Demonstrate
appropriate findings convergent/lateral/creative
thinking
Assignment Feedback – see turnitin
Page 5 of 5