Referencing style correctly used.Ĭlear evidence of research relevant to the subject uses indicative texts identified. Referencing style has no mistakes.Ĭlear evidence of research relevant to the subject able to critically appraise the literature and theory gained from a variety of sources. Literature and sources presented is evidence of high-level application of research skills with comprehensive and critical appraisal of the literature and discussion of theory supported by sources in addition to those recommended in the course content. Major omissions in the application of the IT security concepts and the analysis.ĭemonstrates application of research skills through the critical analysis and evaluation of relevant literature (3 marks) Mostly correct application of the IT security perspective includes reasonable level of analysis. Correct application of the theories and mostly comprehensive analysis with suitable examples.Ĭorrect application of the IT Security perspective and mostly comprehensive analysis with suitable examples. Correct application of the theories and concepts through in-depth discussion, providing highly relevant real-world examples.ĭemonstrated clear understanding of the relevant IT security perspectives. MARKING CRITERIA AND STANDARDS back to topĪble to apply theories and concepts to analyse IT security implications (3 marks)ĭemonstrates comprehensive understanding of the relevant IT security perspectives. be able to analyse the security threats to a network.be able to explain fundamental network security concepts.This assessment task will assess the following learning outcome/s: However, around 1000 words will be appropriate. Note: There is not rigid word limit for this report. Based on the information available about these products, which one would you recommend for a small business and why? Make assumptions about the type, settings, requirements of the business. Finally, search the internet for five (5) other wireless network analysers. Do you think, attackers could also benefit from such Wi-Fi network analysers? Justify your response in detail. Explain in detail, how a network administrator could use the information generated by the inSSIDer Wi-Fi network analyser.4. What are your most important observations? Why do you consider them to be important? 3. For every piece of information, include a screenshot from your ‘run’. Now, state and explain the information that you obtained from your ‘run’ of the application. Briefly explain what each one of them mean. List every piece of information that the inSSIDer scanner normally produces. Now, write a report including the following information. Run the application to scan Wi-Fi network. Follow the instructions to use it as explained in MetaGeek’s website. Download the free version of this application from. Hands-on Project inSSIDeris a popular wireless network scanner. Supply Chain Management / Operations Managementī.Computer Graphics and Multimedia Applications.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |