(a.) Research, formulate, develop and document a strategic security policy for your

chosen organisation based on the nature of the organisation and the stakeholders

in the organisation.

(b.) Based on the security policy you have researched, formulated, developed and documented

in the item (a.) above, identify and assess the potential threats and vulnerabilities of the

company’s network and discuss how such threats and vulnerabilities can be mitigated

based on your research.

Referencing and Plagiarism

All information in the report should be in your own words and not copied from other sources. Any idea used

should be referenced appropriately according to AIH policies and procedures. The report will be submitted

through Turnitin and similarities may attract large penalties according to AIH policies and procedures.

Please refer to the AIH Academic Misconduct Policy: http://www.aih.nsw.edu.au/content/1-home/8-


It is essential to use IN TEXT referencing. If you are using the exact words from a reference then

you must use quotation marks.

You can use Harvard Style referencing with numbers, with a listing at the end of the report. Microsoft

Word has an EndNote plugin that makes this style very easy and clear to follow.


Source link

Leave a Reply

Your email address will not be published. Required fields are marked *