CTEC5808 Legal, Ethical and Professional Practice

Assignment Help Management Information Sys
Reference no: EM132593706 , Length: word count:2500

CTEC5808 Legal, Ethical and Professional Practice and Research Methods - De Montfort University

Learning outcome 1: Explain, evaluate and apply the legal, social and organisational context of digital engineering, systems management, cyber security and digital forensics.

Learning outcome 2: State, select, apply and evaluate a range of security management theories and strategies in the planning, management and auditing of a cyber security provision.

Learning outcome 3: Explain, evaluate and apply a range of research methods, theories, tools and procedures.

Learning outcome 4: Critically evaluate organisational theory within the cyber security domain.

Learning outcome 5: Synthesis, analyse and evaluation literature relating to a given topic in verbal and written format.

Business Proposal

Word limit: 2500 words

You are required to develop a business proposal in the fields of Cyber Security or Digital Forensics; the business proposal must demonstrate novelty, cost effectiveness and knowledge generation. You must clearly articulate the impact of the proposal, how it would satisfy customer demand based upon your market research findings and fit within your organizational context.

The objective of this coursework is to demonstrate your ability to synthesize and critically analyze ethical, regulatory, legal and technological phenomena in development of an operational business proposal in the field of Cyber Security or Digital Forensics. Technical and non-technical risks and related contingency plans should be addressed through consideration of risk management and secure systems architecture. The development of the business proposal will be informed by an appropriate research methodology with justification for the choice of methodology. One of the methodologies selected should be critical.

In addition, you will create a research plan, usually in the form of a chart that clearly identifies development stages of your business proposal. You should give clear indication of the required time envisaged to complete each stage and short argumentation why this time is suitable for the specific tasks.

The Viva
You should demonstrate oratorical, synthesis and analytical ability through development and delivery of a power point presentation explaining your business case underpinning your business proposal, its rationale and impact in the fields of Cyber Security or Digital Forensics. The viva will take 15 minutes for presentation and 5 minutes for questions posed by your examiner. The date of the viva will be soon after submission of the Business Plan; dates of individual vivas will be advised.

Attachment:- Ethical and Professional Practice.rar

Reference no: EM132593706

Questions Cloud

Prepare budgets for the month of january and february : You as an assistant of management accountant is required to prepare budgets for the month of January, February and March 2015 for
How natural disasters affect the health of community : Discuss with your classmates how natural disasters affect the health of a community.
Compute what do the metrics tell about company performance : If you were considering investing in a company, what other questions would you ask to gain further insight into its performance?
Calculate the m value of jane doe financial holdings : Calculate the M1 value of Jane Doe's financial holdings. $800 in her checking account. $1,000 in her savings account.A $300 outstanding credit card bill.
CTEC5808 Legal, Ethical and Professional Practice : CTEC5808 Legal, Ethical and Professional Practice and Research Methods Assignment Help and Solution, De Montfort University - Assessment Writing Service
Specific threats and opportunities that deserve attention : Describe guidelines that can be used for recognizing specific threats and opportunities that deserve attention
Calculate the value of jane doe financial holdings : Calculate the M2 value of Jane Doe's financial holdings. A $20 traveler's check from her last business trip to China.$800 in her checking account
Segments into which hospital overall market : Consider the most prominent variables that define a population and compile a list of the segments into which the hospital's overall market
Find if cost behavior patterns remain unchanged in february : At this level of activity, The company planned to manufacture 4,500 units. If cost behavior patterns remain unchanged in February?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Develop plans for alternate site relocation

Develop plans for alternate site relocation, and develop an estimated monthly budget for the alternate site operations. Detail out the Site Resumption Strategy and the time needed to become fully operational. Provide summary level budget informatio..

  Determine the fundamental challenges of an organization

Determine the fundamental challenges that organizations face in general in regard to protecting organizational assets and information.Specify the red flag(s) that Target overlooked or ignored before the retail attack and give your opinion as to w..

  Describe the four components of an information system

Describe the four components of an information system. Why is it important to consider each of them when designing and installing an information system?

  Search web for the leading providers of rfid technologies

Search the Web for the leading providers of RFID technologies. What companies did you find? Does one seem to stand out above the rest? If so, which is it?

  What are the benefits and risks of outsourcing it services

What are the advantages of agile methods over waterfall development methods, such as the traditional SDLC? What are the risks?

  Simulate the free sharing of ideas among peers

The primary goal for the discussion forum assignment is to simulate the free sharing of ideas among peers that is typically experienced.

  How you would increase the probability of success

Include in your critique how you would increase the probability of success with new technology implementations.

  Explain kerchoffs six principles and make a case

Explain Kerchoff's six principles and make a case for both following them and not following them. Please use sources to support your positions.

  Explain the protection of human subjects

Explain the protection of human subjects and cultural considerations of the journal article. Identify strengths and limitations of the study.

  What critical tasks does it facilitate in purchasing process

Briefly describe the steps of a pure prototyping methodology as an alternative to an SDLC approach. Which disadvantages of an SDLC methodology are addressed by a prototyping approach?

  Communicate about the security design of their systems

Application designers should be aware that their applications may be subject to a denial of service attack.

  Discuss the cable type for a business network infrastructure

Compare and contrast cat. 6 unshielded twisted pair (UTP), coaxial, and single mode fiber optic cabling types. Describe one or two of the advantages and/or disadvantages associated with using each cable type for a business's network infrastructure..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd