Introduction to Security Management
Directions: Be sure to make an electronic copy of your answer before submitting. Unless otherwise stated, answer in complete sentences, and be sure to use correct English spelling and grammar. Sources must be cited in APA format. Your response should be two (2) to four (4) pages in length; refer to the "Assignment Format" page for specific format requirements.
1. Identify and describe each of the four (4) types of shoplifters.
With security comes three distinct categories; physical, personnel, and information. In addition, there are four basic categories of any security organization. These include contract, in-house/proprietary security, virtual, and hybrid security.
2. Describe one (1) action you would take to protect your retail business from each type of shoplifter.
Grading Rubric
Please refer to the rubric below for the grading criteria for this assignment.
35 points 25 points 15 points 5 points
Student provides a clear,
logical description of the 4
types of shoplifters.
Student provides a mostly
clear, logical description of at
least 3 types of shoplifters.
Student provides a mostly
clear, logical description of at
least 2 types of shoplifters.
Student provides a weak or
unclear description of at
least 1 type of shoplifter.
40 points 30 points 20 points 10 points
Student provides a clear,
logical description of at least
1 action he/she would take
to protect his/her business
from each of the 4 types of
shoplifters.
Student provides a mostly
clear, logical description of at
least 1 action he/she would
take to protect his/her
business from at least 3 types
of shoplifters.
Student provides a mostly
clear, logical description of at
least 1 action he/she would
take to protect his/her
business from at least 2 types
of shoplifters.
Student provides a weak or
unclear description of at
least 1 action he/she would
take to protect his/her
business from at least 1 type
of shoplifter.
10 points 8 points 5 points 2 points
Student makes no errors in
grammar or spelling that
distract the reader from the
content.
Student makes 1-2 errors in
grammar or spelling that
distract the reader from the
content.
Student makes 3-4 errors in
grammar or spelling that
distract the reader from the
content.
Student makes more than 4
errors in grammar or spelling
that distract the reader from
the content.
15 points 12 points 8 points 5 points
The paper is written in
proper format. All sources
used for quotes and facts are
credible and cited correctly.
Excellent organization,
including a variety of
thoughtful transitions.
The paper is written in
proper format with only 1-2
errors. All sources used for
quotes and facts are credible
and most are cited correctly.
Adequate organization
includes a variety of
appropriate transitions.
The paper is written in
proper format with only 3-5
errors. Most sources used for
quotes and facts are credible
and cited correctly. Es.
Introduction to Security ManagementDirections Be sure to make .docx
1. Introduction to Security Management
Directions: Be sure to make an electronic copy of your answer
before submitting. Unless otherwise stated, answer in complete
sentences, and be sure to use correct English spelling and
grammar. Sources must be cited in APA format. Your response
should be two (2) to four (4) pages in length; refer to the
"Assignment Format" page for specific format requirements.
1. Identify and describe each of the four (4) types of shoplifters.
With security comes three distinct categories; physical,
personnel, and information. In addition, there are four basic
categories of any security organization. These include contract,
in-house/proprietary security, virtual, and hybrid security.
2. Describe one (1) action you would take to protect your retail
business from each type of shoplifter.
Grading Rubric
Please refer to the rubric below for the grading criteria for this
assignment.
35 points 25 points 15 points 5 points
Student provides a clear,
logical description of the 4
types of shoplifters.
Student provides a mostly
clear, logical description of at
least 3 types of shoplifters.
Student provides a mostly
2. clear, logical description of at
least 2 types of shoplifters.
Student provides a weak or
unclear description of at
least 1 type of shoplifter.
40 points 30 points 20 points 10 points
Student provides a clear,
logical description of at least
1 action he/she would take
to protect his/her business
from each of the 4 types of
shoplifters.
Student provides a mostly
clear, logical description of at
least 1 action he/she would
take to protect his/her
business from at least 3 types
of shoplifters.
Student provides a mostly
clear, logical description of at
least 1 action he/she would
take to protect his/her
business from at least 2 types
of shoplifters.
Student provides a weak or
unclear description of at
least 1 action he/she would
take to protect his/her
business from at least 1 type
of shoplifter.
10 points 8 points 5 points 2 points
Student makes no errors in
grammar or spelling that
distract the reader from the
content.
Student makes 1-2 errors in
3. grammar or spelling that
distract the reader from the
content.
Student makes 3-4 errors in
grammar or spelling that
distract the reader from the
content.
Student makes more than 4
errors in grammar or spelling
that distract the reader from
the content.
15 points 12 points 8 points 5 points
The paper is written in
proper format. All sources
used for quotes and facts are
credible and cited correctly.
Excellent organization,
including a variety of
thoughtful transitions.
The paper is written in
proper format with only 1-2
errors. All sources used for
quotes and facts are credible
and most are cited correctly.
Adequate organization
includes a variety of
appropriate transitions.
The paper is written in
proper format with only 3-5
errors. Most sources used for
quotes and facts are credible
and cited correctly. Essay is
poorly organized, but may
include a few effective
transitions.
The paper is not written in
4. proper format. Many sources
used for quotes and facts are
less than credible (suspect)
and/or are not cited
correctly. Essay is
disorganized and does not
include effective transitions.
Format - APA Format,
Citations,
Organization,
Transitions (15 Points)
Types of Shoplifters
(35 Points)
Protecting Your
Business (40 Points)
Mechanics -Grammar,
Punctuation, Spelling
(10 Points)
Assessment Details and Submission Guidelines
Unit Code BN208
Unit Title Networked Applications
Assessment
Type
Individual Assignment #01 (T3_2017)
Assessment
Title
5. Network Management and Services
Purpose of the
assessment
(with ULO
Mapping)
This assignment assesses the following Unit Learning
Outcomes; students should
be able to demonstrate their achievements in them.
b. Apply socio-technical contexts in modern network
applications and
management;
c. Utilise common and emerging types of middleware to design
and
manage networked applications;
Weight 15%
Total Marks 50
Word limit 1000 - 1200
Due Date 5 January, 2018 (23:55)
PowerPoint demonstration during the lab time.
Submission
Guidelines
6. with a title
Page.
nt must be in MS Word format, 1.5 spacing, 11-
pt Calibri (Body)
font and 2.54 cm margins on all four sides of your page with
appropriate
section headings.
listed
appropriately at the end in a reference list using IEEE
referencing style.
a Special Consideration
Application must be submitted directly to the School's
Administration Officer,
in Melbourne on Level 6 or in Sydney on Level 7. You must
submit this
application three working days prior to the due date of the
assessment.
Further information is available at:
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/specialconsiderationdeferment
7. Academic
Misconduct
seriousness of
the case, penalties can vary from a written warning or zero
marks to exclusion
from the course or rescinding the degree. Students should make
themselves
familiar with the full policy and procedure available at:
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/Plagiarism-Academic-Misconduct-
Policy-
Procedure. For further information, please refer to the
Academic Integrity
Section in your Unit Description.
http://www.mit.edu.au/about
http://www.mit.edu.au/about
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-
9. Table-2). Read four or more articles about
each topic. These articles can be from the web, books or
journals. There are numerous web sites
available that discuss Network Management and Services. You
are expected to list your sources of
information at the end of your report.
- Task 1
From Table -1, select ONE topic and write a report covering and
detailing the areas to be explored
including deployment and performance issues of an application,
configuration issues, network
growth, centralized management etc.
- Task 2
From Table -2, select ONE topic and prepare a Power Point
presentation. The presentation should
have at least 10 slides and students should present for 8 -10
minutes.
Further instructions:
- Do not copy and paste, all slides and the report materials
have to be written in your own words.
- Do not use Wikipedia as neither source nor reference.
10. - Read 2 or 3 articles from the web, books, journals, etc for
each topic then rewrite it using
your own words.
- Use IEEE style referencing, and be sure and properly
reference any diagrams/ graphics.
- Build on the topics that we discuss in lecture and labs in
BN208.
Submissions:
Students has to submit only one word document on Moodle
which includes task 1 and task 2.
At the end of task 1, copy the slides from task 2 and paste it
into the same document then upload it
on Moodle.
Table -1 Choose any ONE Topic.
S.no Topic Areas to be explored for a topic
1 IP Phone for IT
Organisations
11. ilability of an application, Security issues
applications.
problems
and limitations
-technical aspects of such applications
2 IP Surveillance
Cameras
3 H.323 Signalling
Protocol
4 Cisco Discovery
Protocol (CDP)
BN208 Networked Applications Page 3 of 4
Table -2 Choose any ONE Topic.
12. S.no Topic Areas to be explored for a topic
1 Platform as a Service
(PaaS)
Explore Cloud Computing resources, Application Development,
Cloud
Architecture for PaaS, Service availability, Scalability,
Deployment and
performance issues, Centralized Management, Provide examples
related
to Networked Application Management (NAM).
2 Software as a Service
(SaaS)
Explore Cloud Computing resources, Application Development,
Cloud
Architecture for SaaS, Service availability, Scalability,
Deployment and
performance issues, Centralized Management, Provide examples
related
to Networked Application Management (NAM).
2 Infrastructure as a
Service (IaaS)
13. Explore Cloud Computing resources, Application Development,
Cloud
Architecture for IaaS, Service availability, Scalability,
Deployment and
performance issues, Centralized Management, Provide examples
related
to Networked Application Management (NAM).
Marking criteria:
Example of marking criteria is shown in following table. Marks
are allocated as follows:
Note: The marking criteria varies for each Assessment
Sections to be included in
the report
Description of the section Marks
Introduction Outline of the report (in 3-4 sentences) 5
Identification Areas to be explored for the topic 10
Reporting The quality of the report (style), images and
diagrams
Grammar and Syntax check
5
14. Conclusion Write summary of the report 5
Reference style Follow IEEE reference style for both report and
presentation 5
PowerPoint presentation The presentation evaluation will be
based on:
- Quality of materials
- Presenters knowledge of the topic
- Time management
- Level of clarity
- Level of organization
4
4
4
4
4
Total 50
15. BN208 Networked Applications Page 4 of 4
Marking Rubric for Assignment #01: Total Marks 50
Grade
Mark
HD
40-50
DI
35-44
CR
30-34
P
25-29
Fail
<25
Excellent Very Good Good Satisfactory Unsatisfactory
Introduction
/5
All topics are
pertinent and
16. covered in depth.
Ability to think
critically and
source material is
demonstrated
Topics are
relevant and
soundly
analysed.
Generally
relevant and
analysed.
Some relevance
and briefly
presented.
This is not
relevant to the
assessment
topic.
Identification
/10
Demonstrated
excellent ability
to think critically
and sourced
reference
material
appropriately.
17. Clarity and
supported
materials for the
technical content
Demonstrated
excellent
ability to think
critically but
did not source
reference
material
appropriately
Demonstrated
ability to think
critically and
sourced
reference
material
appropriately
Demonstrated
ability to think
critically and did
not source
reference
material
appropriately
Did not
demonstrate
ability to think
critically and
did not source
reference
18. material
appropriately
Reporting
/5
Logic is clear and
easy to follow
with strong
arguments
Consistency
logical and
convincing
Mostly
consistent
logical and
convincing
Adequate
cohesion and
conviction
Argument is
confused and
disjointed
Conclusion
/5
An opinion which
19. can stand for
scientific strong
arguments
Consistency
logical and
convincing
Mostly
consistent
logical and
convincing
Adequate
cohesion and
conviction
Argument is
confused and
disjointed
Reference
style
/5
Clear styles with
excellent source
of references.
Clear
referencing
style
Generally good