logo

CyBER SECURITY LAWS AND REGULATIONS

   

Added on  2021-02-20

13 Pages3648 Words469 Views
CYBER SECURITY LAWSAND REGULATIONS

Table of ContentsINTRODUCTION...........................................................................................................................32)Admissions...................................................................................................................................42.1 Eligibility..........................................................................................................................42.2 Credit transfer...................................................................................................................42.3 Obligations.......................................................................................................................52.4 Consequences...................................................................................................................53) Privacy.........................................................................................................................................53.1 Right to information.........................................................................................................64) Fees..............................................................................................................................................84.1)Laws and regulations regarding fees:-.............................................................................84.2) Approaches of Fees Policies:-.........................................................................................84.3) Effects of breaching of fees.............................................................................................94.4) Breaching of duty and its consequences.........................................................................95) Evaluation and Inspection.........................................................................................................105.1) Evaluation.....................................................................................................................105.2) Rules regarding exams..................................................................................................105.3) Plagiarism......................................................................................................................105.4) Consequences................................................................................................................106)General Analysis.........................................................................................................................117) Recommendations.....................................................................................................................11CONCLUSION..............................................................................................................................12REFERENCES..............................................................................................................................13

INTRODUCTIONThis report is about the New Management System for the various students which aredeployed by the university. The purpose behind this is that university wants to change as well asdevelop a new management system for the higher studies. University wants to reduce the load onthe manual work as number of students are taking admissions(Axelrod, 2015). There is a highrate of enrollments from the international and domestic students and it has become vital todevelop a system which can help in improving their income(Porcedda and Wall, 2018). As perthe assignment, main focus is on the privacy and security of the university so, this is the mainpurpose of implementing the Student Management System in order to protect the information.Rate of cyber security threats has been increasing within the education sector and now it hasbecome really important for University A to protect from the cyber attacks(Kittichaisaree, 2017).The systems should not be such that it is weak and vulnerable to attacks or can be easilybreached(Zhang, 2018). For cyber criminal educational institution are prime focus because in itadministration, students as well as management data are stored. Current report includes a SaaSwhich is also known as Software as a Service which is software providing solution related tostudents management system. With the help of SaaS University A can make its managementsystem simple and more reliable and can be used by the students and administrative aswell(Guiora, 2017). This system also provides a proper privacy and security which help in maintaining theconfidentiality of data gathered. Confidentiality, Integrity and Availability which is also knownas CIA and there are referred as the fundamentals of the information security(Mittal and Sharma,2017). There are various features of SaaS which are mentioned below: SaaS is very easy to use and also easy to access.It is cheap as compared to other software available for the student management system. It also offers high level of security for the data stored on the cloud. This software can be used anywhere and any time which means it is easy friendly.SaaS has got high level of scalability and can be extended as per the requirement of theclient. There are also various principles, guidelines and ways for the various subsequent parts which canbe analyzed below:

2)AdmissionsIn order to admit student in the university students need to fulfill some requirements inorder toe get admission and by using SaaS for the management will make the admission processeasier for the students, and they can easily check their status of the admission, the eligibilitycriteria required to follow for getting admission in the university(Furfaro and et.al., 2016). Thiswill also provide a good experience and software can be easily updated with various strategies. 2.1 EligibilityFor the eligibility criteria every student need to follow some requirements in order to enter theuniversity which are as follows:1. Previous experience of study.Each and every individual are required to have related and relevant background for futurestudies. If student wish to secure admission at any level whether graduate or even post graduatethen having a specific background is the foremost thing.2. Proficient in English for overseas students:The students coming from overseas are required to clear some tests such as IELTS, TOFEL andmany more. Different level calls for different requirements like at graduate level in IELTS,student should have 6 bands rather than 6.5 which is for master level.3. Documentation authentication. In order to get admission, each student should have their authentication documentation which areneeded for verification like Educational transcript, passport or anything else4. ScholarshipOnce the student got selected for scholarship, Additional information would be required. Thisscholarship is usually on the basis of performance of previous academic year.5. Fund requirement.For securing the admission, students will be required to pay some amount such as admission fees.2.2 Credit transferIt is required in case of transferring of university by students which generally occur during two cases:1. Applying RPL

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud Services and Security
|7
|1539
|269

Cloud Privacy and Security
|18
|3664
|384

Cloud Privacy and Security: Risks and Mitigation Strategies
|14
|4006
|102

Cloud Privacy and Security: Risks and Solutions for Employee Data Protection
|19
|5918
|457

Security Plan and Training Program
|13
|3113
|315

ITC568 - Cloud Privacy and Security - Assignment
|15
|1619
|198