Posted: August 9th, 2013
Toulmin’s Argument Model
There are two parts in my assignment. The assignment consists of two parts. In Part A you are asked to answer a number of questions and you are expected to
provide fully researched and referenced answers. Furthermore, you are expected to use at least ten (10) academically acceptable reference sources as a minimum to support your answers to the questions. Part B of the assignment requires you to apply Toulmin’s Argument Model to analyse a case study to determine the validity or otherwise of the case study?s claim, again reference any
additional information sources that you may use. Part A: Answer the following questions: ? Question 1: Identify and discuss the factors that are contributing to the increasing vulnerability of
organizational information assets. (~250 Words) ? Question 2: Contrast unintentional and deliberate threats to an information resource. Provide two (2) examples of both. (~250 Words) ? Question 3: Explain each of the following types of remote attacks: virus, worm, phishing, and spear phishing. What approach could you use to mitigate these
information security risks within an organisation? Describe a scenario. (~250 Words) ? Question 4: Define and contrast ? risk acceptance, risk limitation, and risk transference. (~250 Words) Part B: Use the Toulmin?
s Model of Argument to analyse the case study and provide your opinion on the strength or weakness of the argument with relation to the Claim that we have provided. (~ 600 words). Also, please read the pdf"11MIS101_T2_2013_Assign_DETAIL-V2.pdf". I highlight all the important points. Please read it very carefully. "BIS.docx" and "week2 a final v2 pdf", have the TOULMIN?S ARGUMENT MODEL!! Very important for Part B
Click Here To Get More On This Paper!!!!