What information security problem does the company address

Assignment Help Computer Network Security
Reference no: EM131132243

Project- Individual Effort Project

Background

After several weeks of reading, discussing, and writing about a variety of issues related to cyber security I know that you have a better understanding of some of the things that constitute good security. And considering that so much of communication and interpersonal interaction in the business world is already digital and is becoming increasingly so, I thought that a more personal approach to delivering your research would serve you better overall. For many of you, this will be the first time that you've been asked to create a self-narrating presentation. This may at first seem at best daunting or at worst impossible. However, I contend that not only is it quite possible (I've done presentations this way myself) it will in fact be excellent training for the "real world" workplace in which you already are, or will become a part. For some of you, you may see this as an opportunity to pursue creating online tutorials or even creating a podcast. Ultimately, you will have fun doing this assignment while developing research skills, interpersonal skills - way more than just a research paper could do.

The Scenario

I am the Chief Information Security Officer of the organization for which you are working. You are one of my Cyber Security Managers. I need to know what companies are addressing some of the concerns we have regarding cyber security. I have tasked you with creating a self-narrating presentation that can be given to other members of our global security team for review.

Outcome

I want you to choose a company that focuses on addressing one or more problems related to information security. Be careful to not plagiarize material.

Your presentation should not exceed 10 minutes and must include the following topics (at a minimum) in your slides:

• Company Introduction.
• What information security problem does the company address?
• What information security products does the company have to solve the problem?
• is the information security problem that the company is focusing on important?
• Who is the customer for this information security solution?
• What other problems in information security can this company address?
• What competition does the company have?
• How does the company make money?
• Conclusion.

This is not a paper. It is an electronic presentation. It is also not (entirely) an opinion piece on security. Rather, it is an opportunity for you to demonstrate your mastery of course concepts by discussing them intelligently (cite your sources!), in a multi-media format (visual and audio), as you deliver your presentation.

Tutorials for creating a narrated, self-running PowerPoint file are readily available on the internet.

Your PowerPoint presentation must automatically advance slides and play audio once the PowerPoint presentation is started. The resources I have provided tell you how to do this. Your presentation must be between 8 and 11 minutes (failure to meet this requirement will affect your grade). The file size should be no more than 30MB in size. My example has music and video and the size is 21MB.

The presentation will be evaluated based on the (1) organization of information, (2) quality of the content, (3) ease of comprehension, and (4) professionalism of the presentation. It should form a complete package that is readily understandable by someone other than you.
Should meet all the following requirements

Company Approved by Prof?

Timing (At least 8min no more than 11min)
Audio w/ each slide 10 Visually appealing?
Sources cited?
Is the presentation presented in an organized way?
Overall quality of the presentation?

Reference no: EM131132243

Questions Cloud

What were reasons and the initial results of stalins policy : What were the reasons and the initial results of Stalin's policy as expressed in these speeches?
To what extent does game theory helps the societ : To what extent does game theory helps the society to explain financial markets, Your paper must be targeted topic perfectly and it must include following table of indexes.
What is the multiplier : So far in this chapter, we have assumed that the fiscal policy variables G and T are independent of the level of income. In the real world, however, this is not the case. Taxes typically depend on the level of income and so tend to be higher when ..
Resignations of communist regimes in europe : examine the fall of European communism by looking at the 2009 reflections of Mikhail Gorbachev on the resignations of Communist regimes in Europe in 1989-90
What information security problem does the company address : What information security problem does the company address? What information security products does the company have to solve the problem? is the information security problem that the company is focusing on important?
Examine the fall of european communism : What do these readings and the largely non-violent surrender of power by European Communists in most countries where they ruled indicate about the evolution of those societies by that time?
Provide the comparison and support your argument : In this week's readings you learned about the contributions of Newton, Galileo and Copernicus. For your discussion you must choose one of these scientists and argue that his contributions were more significant or had more impact than the other two
What is the probability of a natural : What is the population of interest for this study? Name the most likely type of error that could impact the findings in this study. Explain your choice. What was the sample size for individuals from the US for the current year?
3 qualities you want people to associate with your company : List at least 3 qualities that you want people to associate with your company and brand. TIP: These can be the same characteristics you listed in Assignment 7, or they can be different.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Description of the task the pseudo-code

Create a Word document. The document should contain: a brief description of the task the pseudo-code associated with the task. Create a Visual Logic file to execute each of the tasks

  Discuss the requirements for remote administration

Discuss the requirements for remote administration, resource management, SLA management and billing management of your chosen provider. It may be useful to consider Morad and Dalbhanjan's operational checklists here.

  How many intermediate authorities do they employ

How many intermediate authorities do they employ? How many certificates have they signed? Do not limit yourself to these questions, but provide a thorough overview of how the CA is run.

  It infrastructure management what to do for task 2a

what to do for task 2a 15 ltbrgt ltbrgtsubmit your enterprise architect blog as a single page with the web address of

  Nmap application and how it can be used

Write a one papge paper APA FORMAT about NMAP application and how it can be used to find vulnerabilities

  Difference between a rainbow table and a hash lookup table

Explain the difference between a rainbow table and a hash lookup table in respect to trying to compromise a computer system's password? What is reduction function, what does it do, and what is its purpose?

  Research in the area of information security awareness

1-2 page APA style paper summarizing research in the area of Information security awareness

  Develop curiosity to generate significant and problematic

Hopefully, this semester your accompanying research helped you to become more critical consumers of the material you read, and to develop the curiosity to generate significant and problematic questions.

  Securing several desktop computers connected to network

Securing numerous desktop computers connected to the network. Explain the access control that you would put in place for each and explain why.

  Assignment on analyzing a social policy

Assignment on Analyzing a Social Policy

  Discuss how this and other information security

write a 1400- to 2100-word paper that describes the security authentication process.discuss how this and other

  Describe how use of equipment software and multiplexing

write a 4-7 page paper including the followingmiddot analyze the current options available for use of tcpip and

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd