Internal and external students should submit the two documents : 1. Power point presentation with voice embedded in it. No video links will be accepted. 2. One document explaining the steps you have done for the tasks selected including the references. Make sure you test the PPT file audio before submission. You could industry resources such as Gartner and Ovum. Go to http://libguides.cdu.edu.au/IT to access these sites. Please feel free to ask me if you have an issue related to the following tasks in the discussion forum. Part A 1. Describe the Australian Government’s ISM and PSPF with emphasis on information classification. Develop an organisational structure to implement the requirements of the standards. – 05 Marks Source : https://www.protectivesecurity.gov.au/Pages/default.aspx You can refer to the Video by guest lecture on Week 1. 2. Run “netstat -an” on your own computer. You can investigate the services running on your machine and explain it in detail. You could look for any malicious or fictitious connections. Note : netstat will work in Windows and Linux OS. 05 Marks
#Sales Offer!| Get upto 25% Off: