Information Security Policy Management and Career Planning Assignment

Verified

Added on  2022/08/01

|5
|704
|50
Homework Assignment
AI Summary
This assignment, focusing on Information Security Policy Management, guides students through IT career planning. The student analyzes job advertisements, comparing educational and certification requirements for both immediate post-graduation and a 10-year plan. The assignment involves creating tables to compare these requirements. Furthermore, the student identifies and describes information security tools, including log analyzers, platform security validation, and wireless vulnerability assessment, along with a discussion of their applications. The student also explores vulnerability assessment, identifies a website supporting hackers, and identifies network scanning tools like Nmap. The assignment demonstrates the student's ability to analyze job requirements, plan a career path, and understand information security tools.
Document Page
Running head: INFORMATION SECURITY POLICY MANAGEMENT
Information Security Policy Management
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1INFORMATION SECURITY POLICY MANAGEMENT
Task 1:
Question 1:
In the current aspect I am currently looking for some information technology jobs.
Here, I have found some of the jobs that I am looking for. In following section, I am
comparing these jobs.
Job Title Education Qualification
Information Technology Intern in Haldeman
Homme, Inc
A graduation degree on the computer
science, information technology or
information system management.
Additional qualification includes strong
verbal and written skills.
Information Technology Intern in PepsiCo A completed or persuasion degree in
software engineering, information systems,
MIS, or business engineering. Also,
additional requirements include strong
communication skills and ability of learning
new types of technologies.
IT Service Desk Agent in Percona Minimum qualification degree of this job is
a full-time graduate degree computer
science or information technology.
Question 2:
Job Title Education Qualification
Senior Technical Program Manager - Self Certifications in distributed systems, data
Document Page
2INFORMATION SECURITY POLICY MANAGEMENT
Service Advertising in Amazon analytics, RDBMS, Java, C++, Python.
Additional qualification requires
certification in OO modelling, Agile, UNIX
and data mining systems.
Software Development Engineer - Amazon
Music Ads Tech
Cortication in professional software
development, programming certification in
C#, C++ and Java.
Information Technology Specialist in US
Department of the Treasury
Graduation degree or some equivalent
degree in computer science, information
science, engineering, information system
management or technology management.
Question 3:
From the above it can be seen that in the initials I have mainly targeted the easy jobs
and mainly the internship jobs. My main aim through this intern job position is improving
myself so that in future I can find some better jobs as described in the 10-year plan.
Task 2:
Exercise 3:
The other tools that fits the current description are the log analysers, platform security
validation and the wireless vulnerability assessment.
Tools Description
Log analysers Log analysers can be used for analysis of
the system logs and comparative analysis
Document Page
3INFORMATION SECURITY POLICY MANAGEMENT
can be performed (Cranmer et al. 2017).
Platform security validation The platform security validation is the
process of documenting the vulnerabilities
which can remain in the system due to the
misconfiguration in the system (Sapountzi
and Psannis 2018).
Wireless vulnerability assessment The wireless vulnerability assessment
process is also quite similar which is used
for documenting the vulnerabilities that can
remain in the local area network (Akhtar
and Ahamad 2018).
Risk assessment’s identification It is used for identifying the latent
vulnerabilities.
Modem vulnerability assessment It is used for identifying and documenting
vulnerabilities in dial-up modems (Oancea,
Florez Petour and Atkinson 2017).
Exercise 3:
From the web one website has been found that support the hackers is the
https://www.hackerone.com/. In this case only one similar type of tool has been founded
which is the Nmap or the Network Mapper. The Nmap is actually a free and open source
software that is used for network scanning.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4INFORMATION SECURITY POLICY MANAGEMENT
References:
Akhtar, N. and Ahamad, M.V., 2018. Graph tools for social network analysis. In Graph
Theoretic Approaches for Analyzing Large-Scale Social Networks (pp. 18-33). IGI Global.
Cranmer, S.J., Leifeld, P., McClurg, S.D. and Rolfe, M., 2017. Navigating the range of
statistical tools for inferential network analysis. American Journal of Political Science, 61(1),
pp.237-251.
Oancea, A., Florez Petour, T. and Atkinson, J., 2017. Qualitative network analysis tools for
the configurative articulation of cultural value and impact from research. Research
Evaluation, 26(4), pp.302-315.
Sapountzi, A. and Psannis, K.E., 2018. Social networking data analysis tools &
challenges. Future Generation Computer Systems, 86, pp.893-913.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]