What information security problem does the company address

Assignment Help Computer Network Security
Reference no: EM131132243

Project- Individual Effort Project

Background

After several weeks of reading, discussing, and writing about a variety of issues related to cyber security I know that you have a better understanding of some of the things that constitute good security. And considering that so much of communication and interpersonal interaction in the business world is already digital and is becoming increasingly so, I thought that a more personal approach to delivering your research would serve you better overall. For many of you, this will be the first time that you've been asked to create a self-narrating presentation. This may at first seem at best daunting or at worst impossible. However, I contend that not only is it quite possible (I've done presentations this way myself) it will in fact be excellent training for the "real world" workplace in which you already are, or will become a part. For some of you, you may see this as an opportunity to pursue creating online tutorials or even creating a podcast. Ultimately, you will have fun doing this assignment while developing research skills, interpersonal skills - way more than just a research paper could do.

The Scenario

I am the Chief Information Security Officer of the organization for which you are working. You are one of my Cyber Security Managers. I need to know what companies are addressing some of the concerns we have regarding cyber security. I have tasked you with creating a self-narrating presentation that can be given to other members of our global security team for review.

Outcome

I want you to choose a company that focuses on addressing one or more problems related to information security. Be careful to not plagiarize material.

Your presentation should not exceed 10 minutes and must include the following topics (at a minimum) in your slides:

• Company Introduction.
• What information security problem does the company address?
• What information security products does the company have to solve the problem?
• is the information security problem that the company is focusing on important?
• Who is the customer for this information security solution?
• What other problems in information security can this company address?
• What competition does the company have?
• How does the company make money?
• Conclusion.

This is not a paper. It is an electronic presentation. It is also not (entirely) an opinion piece on security. Rather, it is an opportunity for you to demonstrate your mastery of course concepts by discussing them intelligently (cite your sources!), in a multi-media format (visual and audio), as you deliver your presentation.

Tutorials for creating a narrated, self-running PowerPoint file are readily available on the internet.

Your PowerPoint presentation must automatically advance slides and play audio once the PowerPoint presentation is started. The resources I have provided tell you how to do this. Your presentation must be between 8 and 11 minutes (failure to meet this requirement will affect your grade). The file size should be no more than 30MB in size. My example has music and video and the size is 21MB.

The presentation will be evaluated based on the (1) organization of information, (2) quality of the content, (3) ease of comprehension, and (4) professionalism of the presentation. It should form a complete package that is readily understandable by someone other than you.
Should meet all the following requirements

Company Approved by Prof?

Timing (At least 8min no more than 11min)
Audio w/ each slide 10 Visually appealing?
Sources cited?
Is the presentation presented in an organized way?
Overall quality of the presentation?

Reference no: EM131132243

Questions Cloud

What were reasons and the initial results of stalins policy : What were the reasons and the initial results of Stalin's policy as expressed in these speeches?
To what extent does game theory helps the societ : To what extent does game theory helps the society to explain financial markets, Your paper must be targeted topic perfectly and it must include following table of indexes.
What is the multiplier : So far in this chapter, we have assumed that the fiscal policy variables G and T are independent of the level of income. In the real world, however, this is not the case. Taxes typically depend on the level of income and so tend to be higher when ..
Resignations of communist regimes in europe : examine the fall of European communism by looking at the 2009 reflections of Mikhail Gorbachev on the resignations of Communist regimes in Europe in 1989-90
What information security problem does the company address : What information security problem does the company address? What information security products does the company have to solve the problem? is the information security problem that the company is focusing on important?
Examine the fall of european communism : What do these readings and the largely non-violent surrender of power by European Communists in most countries where they ruled indicate about the evolution of those societies by that time?
Provide the comparison and support your argument : In this week's readings you learned about the contributions of Newton, Galileo and Copernicus. For your discussion you must choose one of these scientists and argue that his contributions were more significant or had more impact than the other two
What is the probability of a natural : What is the population of interest for this study? Name the most likely type of error that could impact the findings in this study. Explain your choice. What was the sample size for individuals from the US for the current year?
3 qualities you want people to associate with your company : List at least 3 qualities that you want people to associate with your company and brand. TIP: These can be the same characteristics you listed in Assignment 7, or they can be different.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd