What information security problem does the company address

Assignment Help Computer Network Security
Reference no: EM131132243

Project- Individual Effort Project

Background

After several weeks of reading, discussing, and writing about a variety of issues related to cyber security I know that you have a better understanding of some of the things that constitute good security. And considering that so much of communication and interpersonal interaction in the business world is already digital and is becoming increasingly so, I thought that a more personal approach to delivering your research would serve you better overall. For many of you, this will be the first time that you've been asked to create a self-narrating presentation. This may at first seem at best daunting or at worst impossible. However, I contend that not only is it quite possible (I've done presentations this way myself) it will in fact be excellent training for the "real world" workplace in which you already are, or will become a part. For some of you, you may see this as an opportunity to pursue creating online tutorials or even creating a podcast. Ultimately, you will have fun doing this assignment while developing research skills, interpersonal skills - way more than just a research paper could do.

The Scenario

I am the Chief Information Security Officer of the organization for which you are working. You are one of my Cyber Security Managers. I need to know what companies are addressing some of the concerns we have regarding cyber security. I have tasked you with creating a self-narrating presentation that can be given to other members of our global security team for review.

Outcome

I want you to choose a company that focuses on addressing one or more problems related to information security. Be careful to not plagiarize material.

Your presentation should not exceed 10 minutes and must include the following topics (at a minimum) in your slides:

• Company Introduction.
• What information security problem does the company address?
• What information security products does the company have to solve the problem?
• is the information security problem that the company is focusing on important?
• Who is the customer for this information security solution?
• What other problems in information security can this company address?
• What competition does the company have?
• How does the company make money?
• Conclusion.

This is not a paper. It is an electronic presentation. It is also not (entirely) an opinion piece on security. Rather, it is an opportunity for you to demonstrate your mastery of course concepts by discussing them intelligently (cite your sources!), in a multi-media format (visual and audio), as you deliver your presentation.

Tutorials for creating a narrated, self-running PowerPoint file are readily available on the internet.

Your PowerPoint presentation must automatically advance slides and play audio once the PowerPoint presentation is started. The resources I have provided tell you how to do this. Your presentation must be between 8 and 11 minutes (failure to meet this requirement will affect your grade). The file size should be no more than 30MB in size. My example has music and video and the size is 21MB.

The presentation will be evaluated based on the (1) organization of information, (2) quality of the content, (3) ease of comprehension, and (4) professionalism of the presentation. It should form a complete package that is readily understandable by someone other than you.
Should meet all the following requirements

Company Approved by Prof?

Timing (At least 8min no more than 11min)
Audio w/ each slide 10 Visually appealing?
Sources cited?
Is the presentation presented in an organized way?
Overall quality of the presentation?

Reference no: EM131132243

Questions Cloud

What were reasons and the initial results of stalins policy : What were the reasons and the initial results of Stalin's policy as expressed in these speeches?
To what extent does game theory helps the societ : To what extent does game theory helps the society to explain financial markets, Your paper must be targeted topic perfectly and it must include following table of indexes.
What is the multiplier : So far in this chapter, we have assumed that the fiscal policy variables G and T are independent of the level of income. In the real world, however, this is not the case. Taxes typically depend on the level of income and so tend to be higher when ..
Resignations of communist regimes in europe : examine the fall of European communism by looking at the 2009 reflections of Mikhail Gorbachev on the resignations of Communist regimes in Europe in 1989-90
What information security problem does the company address : What information security problem does the company address? What information security products does the company have to solve the problem? is the information security problem that the company is focusing on important?
Examine the fall of european communism : What do these readings and the largely non-violent surrender of power by European Communists in most countries where they ruled indicate about the evolution of those societies by that time?
Provide the comparison and support your argument : In this week's readings you learned about the contributions of Newton, Galileo and Copernicus. For your discussion you must choose one of these scientists and argue that his contributions were more significant or had more impact than the other two
What is the probability of a natural : What is the population of interest for this study? Name the most likely type of error that could impact the findings in this study. Explain your choice. What was the sample size for individuals from the US for the current year?
3 qualities you want people to associate with your company : List at least 3 qualities that you want people to associate with your company and brand. TIP: These can be the same characteristics you listed in Assignment 7, or they can be different.

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  Describe the packet-filtering router firewall system

Describe the Packet-filtering router firewall system, Screened host firewall system and Screened-Subnet firewall system.

  Risk management and malicious attacks

With regards to risk-response planning, there are four (4) responses to negative risks that an organization may pursue: avoid, transfer, mitigate, and accept. Develop an original and unique scenario to describe and contrast each of these responses..

  Write a paper about mobile security

Write a paper about mobile security. FIRST: Search using the library search or google scholar for a peer reviewed article using statistical analysis for a topic about mobile security that show some data and details.

  How is the security of a firms information system affected

How is the security of a firm's information system and data affected by its people, organization, and technology

  Determine the category of computer crimes

Determine the category of computer crimes or cyber terrorism that presents the greatest overall threat at the present time. Provide a rationale to support your response.

  Analyze the means in which data moves within organization

Analyze the means in which data moves within the organization and identify techniques that may be used to provide transmission security safeguard

  Write a summary of learning team collaborative discussion

Write a 350-word summary of the Learning Team Collaborative Discussion including your own personal views on ethics and privacy as they relate to information security.

  Discuss the role they play in computer crime

Discussing the role they play in computer crime. Be sure to research and document cases to support each law and your discussion

  Potential physical vulnerabilities and threats

Identify and analyze any potential physical vulnerabilities and threats that require consideration.

  Develop the issp for the organisation

You are required to analyse the scenario on page 3 and develop the following ISSP for the organisation - You also need to include a section containing the justification of the contents of your policy as well as any assumptions that you have made.

  Outline the various security threats

Develop a strategy no more than 5-6 pages in length. The strategy should outline the various security threats that are specific to Web Security and explain how each effect the consumer, the business, and the potential applications in use.

  Logical and physical topographical layout of planned network

Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company. Present the rationale for the logical and physical topographical layout of the planned network

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd