IT409- IT Security and Policies
Assignment No. 3 includes chapter 7,8 and 9
Due Date: 6thApril, 2016 (Wednesday, 11:59 pm)
Total Marks: 10
1. This is an individual work, so make sure it is your own: express yourself in your own
words in a precise and concise manner
2. Search the book or other resources to have a better understanding of the questions.
3. Use ‘Word Processor’ to answer the questions.
4. Submission must be through the submission folder set by your instructor on Blackboard,
no email submissions will be accepted.
5. Late submission or plagiarism will result in ZERO mark.
6. This assignment worth 5 marks of the total course mark.
Question No. 1
Explain how clear desk and clear screen policy is important to protect the confidentiality of
Question No. 2
What is the difference between Data Replication and Data Backup? Where Backed-up or
replicated data should be stored?
Question No. 3
What is the advantages and disadvantages of default deny model and default allow model? Cite
at least 3 properties of each model.
Question No. 4
Firewall rule sets use source IP addresses, destination addresses, ports, and protocols.
1. Describe the function of each.
2. What is the purpose of the following rule?
Allow Src=10.1.23.54 dest=220.127.116.11 Proto=tcp 21
3. What is the purpose of the following rule?
Deny Src=ANY dest=ANY Proto=tcp 23