Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Project- Individual Effort Project

Background

After several weeks of reading, discussing, and writing about a variety of issues related to cyber security I know that you have a better understanding of some of the things that constitute good security. And considering that so much of communication and interpersonal interaction in the business world is already digital and is becoming increasingly so, I thought that a more personal approach to delivering your research would serve you better overall. For many of you, this will be the first time that you've been asked to create a self-narrating presentation. This may at first seem at best daunting or at worst impossible. However, I contend that not only is it quite possible (I've done presentations this way myself) it will in fact be excellent training for the "real world" workplace in which you already are, or will become a part. For some of you, you may see this as an opportunity to pursue creating online tutorials or even creating a podcast. Ultimately, you will have fun doing this assignment while developing research skills, interpersonal skills - way more than just a research paper could do.

The Scenario

I am the Chief Information Security Officer of the organization for which you are working. You are one of my Cyber Security Managers. I need to know what companies are addressing some of the concerns we have regarding cyber security. I have tasked you with creating a self-narrating presentation that can be given to other members of our global security team for review.

Outcome

I want you to choose a company that focuses on addressing one or more problems related to information security. Be careful to not plagiarize material.

Your presentation should not exceed 10 minutes and must include the following topics (at a minimum) in your slides:

• Company Introduction.
• What information security problem does the company address?
• What information security products does the company have to solve the problem?
• is the information security problem that the company is focusing on important?
• Who is the customer for this information security solution?
• What other problems in information security can this company address?
• What competition does the company have?
• How does the company make money?
• Conclusion.

This is not a paper. It is an electronic presentation. It is also not (entirely) an opinion piece on security. Rather, it is an opportunity for you to demonstrate your mastery of course concepts by discussing them intelligently (cite your sources!), in a multi-media format (visual and audio), as you deliver your presentation.

Tutorials for creating a narrated, self-running PowerPoint file are readily available on the internet.

Your PowerPoint presentation must automatically advance slides and play audio once the PowerPoint presentation is started. The resources I have provided tell you how to do this. Your presentation must be between 8 and 11 minutes (failure to meet this requirement will affect your grade). The file size should be no more than 30MB in size. My example has music and video and the size is 21MB.

The presentation will be evaluated based on the (1) organization of information, (2) quality of the content, (3) ease of comprehension, and (4) professionalism of the presentation. It should form a complete package that is readily understandable by someone other than you.
Should meet all the following requirements

Company Approved by Prof?

Timing (At least 8min no more than 11min)
Audio w/ each slide 10 Visually appealing?
Sources cited?
Is the presentation presented in an organized way?
Overall quality of the presentation?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91888767

Have any Question?


Related Questions in Computer Network & Security

Fiona told her friend that she is very fortunate as the

Fiona told her friend that she is very fortunate as the slow-down in the economy has not decreased sales in her grocery store by much compared to sales of new cars in his car dealership. Explain what Fiona meant using th ...

1srin response to nmap -n -sn localhost what kind of

1. SR In response to "nmap -n -sn localhost": What kind of information did the nmap scan results show you, specifically? 2. FIB What does the "-sn" option do in nmap? ping scan -disable port scan 3. SR How does the "-sn" ...

Suppose that serendipity bank has excess reserves of 12000

Suppose that Serendipity Bank has excess reserves of $12,000 and check able deposits of $150,000. If the reserve ratio is 20 percent, what is the size of the bank's actual reserves?

Network requirement analysis and planpurpose of the

Network requirement analysis and plan Purpose of the assessment (with ULO Mapping) Main objective of this assignment is to enable student to understand networking devices, gather requirements for a given business case st ...

Question suppose public-key cryptography is used to encrypt

Question : Suppose public-key cryptography is used to encrypt the communications between Alice and Bob. Alice's public key is eA, private key is dA; Bob's public key is private key is de. Now Bob wants to send a message ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

It networking assignment - networking project areamajor lab

IT Networking Assignment - Networking Project Area Major Lab Scenario - Instructions This lab has a time limit of one term The lab must be completed by individual students, and the completed assessment returned to the as ...

Question what is active threat in terms of network security

Question: What is active threat in terms of network security? Provide an example. The response must be typed, single spaced, must be in times new roman font (size 12) and must follow the APA format. Note: minimum 300 wor ...

Rsa internet securitywhy is rsa believed to be hard to

RSA, Internet security Why is RSA believed to be hard to break? I. E. The complexity of what computational problem leads to the belief that it is secure? RSA can be used to authenticate messages by concatenateing to the ...

Overviewthis assignment has three major aims- to help

Overview This assignment has three major aims: - To help students gain good understanding of theoretical and practical material. - To encourage students to use content analysis summaries to prepare for tests, examination ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As