Systems Development 2B (HSYD202-1) Summative Assessment 2 (PDF)
Document Details
Boston City Campus
2024
BOSTON City Campus
Tags
Related
- Chapter 10 - 03 - Discuss the Insights of Cloud Security and Best Practices - 07_ocred.pdf
- Chapter 10 - 03 - Discuss the Insights of Cloud Security and Best Practices - 07_ocred_fax_ocred.pdf
- Cloud___Network_Security_MCQs.pdf
- Cloud___Network_Security_MCQs.pdf
- Network Security Cheatsheet PDF
- Networking Reviewer Module 1-3 PDF
Summary
This Boston City Campus higher education document details Summative Assessment 2 for Systems Development 2B (HSYD202-1) in the 2024 academic year. The assessment involves writing a research essay on the challenges and strategies related to cloud migration for network security. The document provides detailed instructions, compulsory sources, and referencing guidelines using the Harvard method for the essay.
Full Transcript
HIGHER EDUCATION PROGRAMMES Academic Year 2024: July - December Summative Assessment 2: Systems Development 2B (HSYD202-1) NQF Level, Credit: 6, 20 Weighting: 10...
HIGHER EDUCATION PROGRAMMES Academic Year 2024: July - December Summative Assessment 2: Systems Development 2B (HSYD202-1) NQF Level, Credit: 6, 20 Weighting: 10% Assessment Type: Research Essay Educator: O. Dyantyi Examiner: T. Samusodza Due Date 25 November 2024 Total 20 Marks Instructions 1. Summative Assessment 2 (SA 2) must be uploaded on ColCampus before or on the day of the Summative Assessment 1 (SA 1) sitting. 2. The essay must be a minimum of 600 (six hundred) words and should not exceed 750 (seven hundred and fifty) words. 3. The essay structure must be as follows: Cover Page: o Name o Surname o Student Number o Name of your Support Centre (i.e., Boston, Braamfontein) Introduction: Tells the reader what the essay is about. Body / Main Content: Is based on research and relates to the essay question or topic that has been set. 1 HSYD202-1-Jul-Dec2024-SA2-TSS-V2-24062024 Conclusion: Is a summary of what has been covered in the essay. It may also include suggestions/recommendations. Reference list: (not included in the word count): the Harvard Referencing Method must be adhered to with regards to in-text citations and the reference list. Please make sure you have read and adhere to the NWU Referencing Guide, available in the HE Library module on ColCampus, as well as The Beginners Guide to Plagiarism, available in the HE Student Information module, also on ColCampus. 4. The essay must be typed using the following type settings only: Font: Arial Font Size: 12 Line Spacing: 1.5 5. The following must be adhered to: You have been provided with two (2) academic sources (see below), these sources are compulsory and must be consulted and referenced when answering the research question. It is imperative to note that the compulsory sources must be accessed using the library module on ColCampus. Compulsory sources to peruse: Anas, B., Asmae, B., Nour el houdo, M., and Mohammed, G. 2012. Cloud computing: Security challenges. Retrieved from https://www.researchgate.net/publication/261447405_Cloud_computing_Security_ch allenges. [Accessed 19 March 2024] Ertaul, L., Singhal, S., and Saldamli, G. 2013. Security Challenges in Cloud Computing. Retrieved from https://www.researchgate.net/publication/267697749_Security_Challenges_in_Cloud _Computing. [Accessed 19 March 2024] 6. You must make use of the Harvard Method of Referencing. Refer to the examples of referencing below: 2 HSYD202-1-Jul-Dec2024-SA2-TSS-V2-24062024 Book, single author: Holt, D.H. 2017. Management principles and practices. Sydney: Prentice-Hall. Book, 2 or 3 authors: McCarthey, E.J., William, D.P. & Pascale, G.Q. 2017. Basic marketing, Cape Town: Juta. Book, more than 3 authors: Bond, W.R., Smith, J.T., Brown, K.L. & George, M. 2016. Management of small firms, Sydney: McGraw-Hill. Book, no author: Anon. 2009. A history of Greece 1994-now. Sydney: Irwin. eBook: Harris, C.A. 1917. How to write music: musical orthography, edited by M. Randall. New York, NY: H. W. Grey. http://gutenbert.org/files/37281/37281-h/37281-h.htm. Date of access: 31 August 2017. Academic Journal article with one author: Allan, J. 2017. Nurturing supportive learning environment in higher education through the teaching of study skills: to embed or not to embed? International Journal of Teaching and Learning in Higher Education, 19(2):64-76. Academic Journal with 2 or more authors: Glatt, M.M., Grindstone, C.H & Hult, C.J. 2019. The geographic expansion of Mexican immigration in the United States and its implications for local law enforcement. Law Enforcement Executive Forum Journal, 8(1):73-82. Webpage, no author: (Use first few words of the page title) Improve indigenous housing now, government told. 2007. Available from:. Date of Access, 8 February 2016. Website: 3 HSYD202-1-Jul-Dec2024-SA2-TSS-V2-24062024 Australian Securities Exchange. 2019. Market Information. Available from: Accessed on 5 July 2019. Web based image / table / figure: The Lunar Interior. 2000. Available from: http://www.planetscapes.com/solar/browse/moon/moonint.jpg 2 Accessed on 8 November 2016. Blog: Newton, A. 2007. Newcastle toolkit. 16 January 2007. Angela Newton: Blog. Available from: Accessed on 23 February 2014. Facebook and Twitter: Smith, P. 2012. Social networking group, (Facebook), 6 October. Available from: http://facebook.com Accessed on 29 October 2012. Newspaper, print: Wolhuter, T. 2011. How to read food labels. Star. 26, 2 March 2011. Newspaper, electronic database: Hans, B. 2011. Cosatu slams Swazi loan. The mercury, 15 August http://www.iol.co.za/mercury/cosatu-slams-swazi-loan-1.1117816 Date of access: 1 September. 2012. 7. Plagiarism occurs when a writer duplicates another writer's language or ideas, and then calls the work his or her own. Simply put, plagiarism is theft. This includes the 'copy and paste' of work from textbooks, study guides, journal articles. The Plagiarism Declaration, included in this brief, must be signed, and attached to the front of your essay. Refer to the Plagiarism Information Sheet in your Course Outline for further information. 8. Academic sources: Not all sources can be classified as an academic source. To judge whether a source is an academic source, take the following criteria into account: The author should be identifiable. 4 HSYD202-1-Jul-Dec2024-SA2-TSS-V2-24062024 The source should be published by a credible publisher (In an Academic Textbook or Academic Journal) A list of references should be provided. Wikipedia is not a credible academic source. There is no one author identifiable, and editing an article on this site is very easy. Also, blog posts often provide valuable information, but this is not academically sound. 9. To obtain maximum results, please consult the rubric included in this brief to ensure that you adhere to and meet all the given criteria. 10. A Copyleaks Report will be issued via ColCampus once the assignment is submitted. Please ensure that you follow the correct steps when uploading your assignment, to ensure that the Copyleaks Report is correctly issued. If the incorrect document is uploaded, or if no Copyleaks Report is issued, or if the Copyleaks Report indicates that a 30% similarity/plagiarism score has been exceeded, a mark of zero (0) will be awarded. 5 HSYD202-1-Jul-Dec2024-SA2-TSS-V2-24062024 Question 1 (20 Marks) The rise of cloud computing has revolutionized data storage and accessibility. However, this shift also introduces new vulnerabilities to network security. Discuss two key challenges posed by cloud migration for network security. Analyse specific strategies organizations can implement to mitigate these challenges and ensure secure data access in the cloud environment. Please note: The compulsory sources provided are not exhaustive. You will have to do further research to come up with a masterpiece. Compulsory sources to peruse: Anas, B., Asmae, B., Nour el houdo, M., and Mohammed, G. 2012. Cloud computing: Security challenges. Retrieved from https://www.researchgate.net/publication/261447405_Cloud_computing_Security_challeng es. [Accessed 19 March 2024] Ertaul, L., Singhal, S., and Saldamli, G. 2013. Security Challenges in Cloud Computing. Retrieved from https://www.researchgate.net/publication/267697749_Security_Challenges_in_Cloud_Com puting. [Accessed 19 March 2024] The following Learning Outcomes are assessed in this assessment: - Understanding of Cloud Computing and Network Security - Analysis of Key Challenges in Cloud Migration for Network Security 6 HSYD202-1-Jul-Dec2024-SA2-TSS-V2-24062024 Criteria Exceptional Satisfactory Developing Unsatisfactory Total Challenge Identification Clearly identifies and explains two Identifies two challenges, Identifies some challenges, Fails to identify or explain significant challenges to network but explanations may lack but explanations may be challenges to network security in security posed by cloud migration. detail or technical unclear or incomplete. the cloud. accuracy. Demonstrates a good understanding of the technical aspects of each challenge and its impact on cloud security. 6-7 5-6 4-5 1-3 Strategies to mitigate Provides some strategies, but Provides some strategies, Offers limited or vague Fails to propose any strategies the challenges details or justifications may be but details or suggestions for mitigating for mitigating network security missing. May focus on generic justifications may be challenges. challenges in the cloud. security practices without missing. May focus on considering cloud-specific solutions. generic security practices without considering cloud-specific solutions. 8-10 5-8 1-4 0 Bibliography and Exceeds the number of relevant A minimum of two Sources were quoted but None References sources (3+). relevant sources met. were irrelevant. Compulsory source consulted. Correct Harvard Incorrect referencing Correct Harvard referencing referencing 3 2 1 0 /20 7 HSYD202-1-Jul-Dec2024-SA2-TSS-V2-24062024