Insider attack , cryptogrraphy, password policy


Write minimum 600 words for each of the three questions given below. All questions are of equal value (25 marks each). You should provide credible references for each question according to the Faculty guidelines. Although there is no rigid maximum word limit, around 850 words maximum, per question will be appropriate.

Topic 1 – Introduction to Information Security

Question 1

Insider attacks are launched by malicious users who are entrusted with authorized access of a system.

Research the issue of Insider Attack in the context of cybersecurity and report your findings. Your report should include the following details: what Insider Attackmeans; motivation; types of insider attacks; and detection mechanisms. Incorporate appropriate diagrams and examples in your answer.

Topic 2 – Cryptography

Question 2

Compare and contrast the concepts of hashing and encryption.  You may use the following criteria for comparison: Description, popular algorithms, applications, strengths, limitations (if any) and also recent research trends. Incorporate appropriate diagrams and examples in your answer.

Topics 3 & 4 – Network Security fundamentals 1 & 2

Question 3

The following link presents a guide for Windows 10 hardening from the Australian Signals Directorate (ASD):

Present an analysis of the Password Policy given in this document. Also justify the priority level used for the Password Policy.


back to top

This assessment task will assess the following learning outcome/s:

  • be able to explain fundamental information security concepts.
  • be able to discuss and debate some of the security implications of computer networks, including cryptography.

Marking criteria and standards

back to top


100% – 85%
84% – 75%
74% – 65%
64% – 50%
49% – 0

Able to apply theories and concepts to analyse IT security implications

Demonstrates comprehensive understanding of the relevant IT security perspectives. Correct application of the theories and concepts through indepth discussion, providing highly relevant real world examples.

Demonstrated clear understanding of the relevant IT security perspectives. Correct application of the theories and mostly comprehensive analysis with suitable examples.

Correct application of the IT Security perspective and  mostly comprehensive analysis with suitable examples.

Mostly correct application of the IT security perspective; includes reasonable level of analysis. Some omission.

Major omissions in the application of the IT security concepts and the analysis.

Demonstrates application of research skills through the critical analysis and evaluation of relevant literature

Literature and sources presented is evidence of high level application of research skills; with comprehensive and critical appraisal of the literature and discussion of theory supported by sources in addition to those recommended in the course content. Referencing style has no mistakes.

 Clear evidence of research relevant to the subject; able to critically appraise the literature and theory gained from a variety of sources.  Referencing style correctly used.

Clear evidence of research relevant to the subject; uses indicative texts identified.  Referencing style correctly used. Minor omissions only.

 Some evidence of research.  Some mistake in referencing style.

Either no evidence of literature being consulted or cited references irrelevant to the assignment set.

Written communication is scholarly in tone and purpose, and conforms to scholarly writing requirements.

The tone and style is exemplary, and is appropriate to the content of the scholarly review.

Mostly Fluent writing style appropriate for the assignment with accurate grammar and spelling.

Mostly fluent writing style appropriate for the assignment with mostly accurate grammar and spelling. Minor omissions only.


back to top

All sources of information must be appropriately referenced using the APA style ( )

there are slides available in the files section to get fromm those as well

NOTE it has to be submit on the turnitin so do the work that is not going to catch for plagiarism.

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 10% with the coupon code: best10