Reference no: EM133741743 , Length: 8 minutes
Introduction to Cyber Security
Assessment - Malware Video Entry
Your Task
In this individual assessment, you will demonstrate your understanding of cyber security concepts as outlined in LO1 and LO2. You will create a video presentation focusing on a specific type of malware, exploring its characteristics, behavior, and potential impact on the IT infrastructure of organisations. Your video should contextualise the terminology associated with cyber security for diverse stakeholders in business (LO1) and identify vulnerabilities and threats relevant to the IT infrastructure of organisations (LO2). You have the freedom to choose two malware types discussed in class or conduct independent research to investigate a different variant. Through this assessment, you will not only showcase your knowledge of cyber security fundamentals but also showcase your ability to effectively communicate complex technical concepts to a diverse audience.
LO1: Contextualise the terminology associated with cyber security for diverse stakeholders in business.
LO2: Identify vulnerabilities and threats pertaining to the IT infrastructure of organisations.
Assessment Description
In this assessment, you will demonstrate your ability to research, discuss and present information on two malware types of your choice. Your research must be supported by at least five references. Your video recording must be supported by a visual aid (presentation), which must include the following slide headings:
Introduction
Malware Overview
Malware #1 Characteristics
Impact on IT Infrastructure
Malware #1 Prevention and Mitigation
Malware #2 Characteristics
Impact on IT Infrastructure
Malware #2 Prevention and Mitigation
Similarities of Malware #1 & #2
Conclusion
Note: "Malware #1" and "Malware #2" should be replaced by the name of the actual malware types you choose.
Your video entry must include both non-technical and technical elements of the type of malware you talk about.
Assessment instructions for this assessment:
Read the ‘your task' and ‘assessment instructions' section of this document to fully understand the requirements of this assessment.
Choose and finalise which types of malware you will be talking about.
Create the visual aid (presentation) that will be supporting your video entry submission.
Create the ten (10) slide headings which must be included and are listed above.
|
Analyse the current user experience of the social media
: Analyse the current user experience of the social media platform, identifying strengths, weaknesses, and areas for improvement. Utilise your understanding
|
|
What are all of lucias options if bob declines to do repairs
: Bob, the landlord, refuses to fix a small gap in a windowsill in the basement window. What are all of Lucia's options if Bob declines to do the repairs?
|
|
Knowledge of cyber security fundamentals
: Knowledge of cyber security fundamentals but also showcase your ability to effectively communicate complex technical concepts to a diverse audience
|
|
What causes postural instability in the patient
: MSN 570 United States University- What causes postural instability in this patient? Compare and contrast pyramidal vs. extrapyramidal.
|
|
Exploring cyber security characteristics & potential impact
: Understanding of cyber security concepts, Exploring its characteristics, behavior, and potential impact on the IT infrastructure of organisations
|
|
What is the experimental approach to testing the hypothesis
: What is the experimental approach to testing the hypothesis? What was measured? What were the important quantitative results?
|
|
Service transition - release and deployment management
: Service and Operations Management in IT - Service Transition - Release and Deployment Management Discuss, with specific recommendations -
|
|
Write about the disorder including causes and effect on body
: HIM 205 ashford university- Write about the disorder, including the causes and effects on the body. Make sure to discuss treatments and long-term issues.
|
|
Describe the procedures and methods of data collection
: Describe the procedures and methods of data collection, measures/instruments used, the participants and how they were selected and statistical techniques used.
|