DATA AND DATABASE SECURITY MODULE
Individual Assignment – 40%
Due Date: LMS Submission – 1
st June 2018, 8:00 pm
Print copy submission – 2
nd June 2018, 1.00 pm
Part A – 25%
Data masking is a technology that prevents sensitive data being exposed to 3rd parties. It creates
made-up (yet realistic) data, which allows software testing and user training to proceed without
impacting the functionality of the system/application. Data masking takes the form of Static or
Dynamic.
Critically evaluate Technology offerings of Data masking by comparing and contrasting at least
three industry recognized vendor solutions.
Word limit – 2000 words
Part B – 15%
Encryption helps organizations in protecting sensitive data at various stages of the information
/ data flow.
• Identify methods of various cryptographic techniques and their business cases
• Explain how IRM (Information Rights Management) benefits from the usage of encryption
• Identify the differences between hardware and software encryption and provide an industry
example for each of these.
Word limit – 1500 words
Assessment criteria
The following criteria will be taken into account when awarding marks for Part A and B.
Application of theory into Practice 50%
Critical Analysis 30%
Referencing 10%
Documentation 10%
Plagiarism will not be entertained under any circumstance and please ensure that ONLY APA
Standard Referencing is used where applicable.


