Presentation on an information security topic

Assignment Help Other Subject
Reference no: EM133682284

Information Security Management

Assessment: Presentation

Task Description:

For this assessment, you are required to work in a group to develop and deliver a presentation on an information security topic. You have to choose a topic from the following list for your presentation.

  • Common Web Application Vulnerabilities, Consequences, and Remedies
  • Common Software Vulnerabilities, Consequences, and Remedies
  • Common Network Vulnerabilities, Consequences, and Remedies
  • Common Access Control Attacks and Remedies
  • A comprehensive Review of Vulnerability Assessment Methods and Tools
  • A comprehensive Review of Configuration and Change Management
  • Security and Privacy Controls in Information Systems and Organizations (NIST SP 800-53 Rev 5)
  • Australian Signals Directorate Strategies to Mitigate Cybersecurity Incidents - Mitigation Details
  • (February 2017)
  • Cloud Security Alliance Security Guidance for Critical Areas of Focus in Cloud Computing V3.0
  • Payment Card Industry Data Security Standard (PCI DSS)
  • Supply Chain Risk Management
  • Threat Modelling: Significance, Methods and Advantages

Choose a topic for presentation. You will also have to prepare PowerPoint slides for your presentation and submit the presentation file.

To prepare your presentation, you have to do some significant research on your chosen topic. Your presentation should illustrate contemporary information and analysis beyond what is covered in the lecture slides. You can use information provided in scholarly articles as well as online resources. You can present figures and diagrams where appropriate. The presentation should be organised and maintain a continuous and logical flow of information.

The presentations will be conducted during the tutorials in Week 9 and Week 10. Your presentation should not take more than 15 minutes. There will be a brief Q&A session after each presentation. Each of you in the group must take part in the presentation. Students are highly encouraged to ask questions after each presentation.

Reference no: EM133682284

Questions Cloud

What are the research questions that you have : What are the research questions that you have? Organize this section based on the topics your topic explores. Include academic references using our library.
Early termination of community supervision : In relation to the early termination of community supervision, do you feel that it should be granted primarily based on good behavior,
Corruption in law enforcement communities : What techniques could be effective at minimizing corruption in law enforcement communities?
US Criminal justice system : Which of the five justifications for punishment do you think should guide the US Criminal justice system? Explain.
Presentation on an information security topic : COIT20263 Information Security Management, CQ University - Presentation on an information security topic, prepare your presentation, you have to do research
Research a brand that you feel is doing a great job of imc : Research a brand that you feel is doing a great job of IMC. Write a post in which you summarize what they are doing and how they are doing it.
Analyze specific ethical and moral issue in policing : Analyze a specific ethical/moral issue in policing or within the criminal justice system (CRJ), describing the issue
What can marketing pros learn from the best practice example : Present some good examples. Provide an analysis of why they are effective. What can marketing pros learn from these "best practice" examples?
Describe the different types of formal and informal groups : Describe the different types of formal and informal groups. Which groups do you think are most productive?

Reviews

Write a Review

Other Subject Questions & Answers

  Please carefully read martin ridges article the life of an

please carefully read martin ridges article the life of an idea the significance of frederick jackson turners frontier

  Analyze an emerging queerness in one or more media forms

You could analyze an emerging queerness in one or more media forms. How one type of queerness changes in one or more media form over time.

  Discussing Predatory organized Crime

Discussing Predatory organized Crime. What was the primary purpose of predatory organized crime and is it still relevant in our society?

  What are the characteristics of the normal curve

What are the characteristics of the normal curve? Name a human trait that you think is normally distributed and why. Why can standard scores (z-scores) be used.

  Fast food franchises and examine facility layouts

Choose two fast food franchises and examine their facility layouts. Compare and discuss the differences in their layouts.

  Develop at least two different initial concept designs

Develop at least two different initial concept designs that would meet the requirements of the Local Restaurant. These designs will be wireframe only designs

  To be deemed sufficient-consideration of contract

To be deemed sufficient, the consideration of a contract must

  Contrast the organizational transformation process

Compare and contrast the organizational transformation process presented in the previous lessons with the process of individual recruitment and radicalization outlined here. What are the primary synergies between the two?

  What are some of the key issues raised in the settlement

What are some of the key issues raised in the settlement and what lessons may be learned from the settlement?

  Grouping strategies for social interactions

List instructional strategies and tools that could be used to address each contextual factor. grouping strategies for social interactions.

  What is the the sociological imagination

What is the the Sociological Imagination, why is it useful in looking at social problems? Demonstrate how it can be explained sociologically.

  What security breaches at work can you easily anticipate

Look around your office, home, etc. and consider your own practices regarding the Internet, Facebook, etc. What security breaches at work or at home can you easily anticipate? What will you do to make everything more secure?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd