Professional Documents
Culture Documents
1 2
5 6
11 12
Supplementary Exams Assignments
The School does not normally offer a supplementary exam to a
student who has sat a scheduled exam. Detailed information will be published on Moodle in
Supplementary Exams will be dealt with in accordance with due course
student academic consideration policy
(http://www.uow.edu.au/about/policy/UOW060110.html) 9.2
Timing of Supplementary Exams.
While the School normally grants supplementary exams when
the student does not sit the standard exam for an acceptable
reason, each case will be assessed on its own merit and there
is no guarantee a supplementary exam will be granted.
If a supplementary exam is granted, you will normally be notified
via SOLS Mail the time and date of this supplementary exam.
You must follow the instructions given in the email message.
Please note that if this is your last session and you are granted
a supplementary exam, be aware that your results will not be
processed in time to meet the graduation deadline.
13 14
15 16
The Communication Channel Emergency Evacuation Procedure
Turnoffanyelectricalequipment
Your tutor is your first point of contact Leavethebuildingimmediatelyviathenearestexit
Dontuselifts
Takes your tutorial sessions and marks your Obeyalldirectionsfromwardens
assignments Donotreenterthebuildinguntiladvised
Any complaints should be presented to your tutor first
If the issue is not resolved to your satisfaction, then
come to see me
17
21 22
23 24
Key Concepts of Key Concepts of
Information Security Information Security (contd.)
Confidentiality Integrity
The characteristic of information whereby only those The quality or state of being whole, complete, and
with sufficient privileges may access certain uncorrupted
information
Information integrity is threatened
Measures used to protect confidentiality
If exposed to corruption, damage, destruction, or
Information classification
other disruption of its authentic state
Secure document storage
Corruption can occur while information is being
Application of general security policies
compiled, stored, or transmitted
Education of information custodians and end users
Cryptography
25 26
27 28
Key Concepts of Information Key Concepts of Information
Security (contd.) Security (contd.)
Identification Authorization
An information system possesses the Assures that the user has been specifically and
characteristic of identification when it is able to explicitly authorized by the proper authority to
recognize individual users access, update, or delete the contents of an
Identification and authentication are essential to information asset
establishing the level of access or authorization User may be a person or a computer
that an individual is granted Authorization occurs after authentication
Authentication
Occurs when a control proves that a user
possesses the identity that he or she claims
29 30
31 32