Discuss preventing cyberbullying and harassment

Assignment Help Computer Network Security
Reference no: EM131850890

Assignment: Preventing Cyber Crime Presentation

For this assignment, you will review a brief scenario and develop an 8- to 10-slide Microsoft PowerPoint presentation along with a 2- to 3-page document.

Scenario

Seaward Community Recreation Center is a medium-sized public recreation facility for children and adults. In addition to a large offering of sports, child-care, and recreation programs, it also offers daylong seminars to the public on various computer-related topics. Seminars run daily with a new topic offered each month. For the coming month, the topic, "Preventing Cyber Crime and Cyberbullying" has been selected as it aligns well with the National Cyber Security Awareness month. As a member of the center's information security staff, you have been approached to prepare material for this seminar.

Tasks:

Part I-Presentation

• Prepare an 8- to 10-slide Microsoft PowerPoint presentation. Ensure that each slide includes speaker notes pertaining to the contents of the slide. The presentation should address the seven topics listed below:

o Occurrence of malware, spyware, and botnet
o Prevention of spam and phishing
o Securing your home network
o Prevention of identity theft and Internet fraud
o Creating and maintaining secure passwords
o Combating social-engineering techniques
o Preventing cyberbullying and harassment

Part II-Handout

• Create a 2- to 3-page handout that can be distributed to the attendees at the seminar. The handout should highlight the key aspects of your presentation's topics. It should include enough detail so that the attendees can reference the document at a later time. Be sure to cover all the topics listed in Part I of this assignment.

Note: In preparing your presentation and handout, keep in mind that your target audience will be nontechnical. As such, you should ensure that all acronyms are defined and that explanations and/or analogies should be used to help the audience relate to more difficult or complex concepts.

Your final product will be a Microsoft PowerPoint presentation approximately 8-10 slides in length and utilize at least 4-5 scholarly/professional sources (beyond your textbook) in your research. You will also create a 2- to 3-page handout summarizing the highlights of your presentation. Your presentation and handout should be written in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources; and display accurate spelling, grammar, and punctuation.

Reference no: EM131850890

Questions Cloud

Analyze observation experience from a personal point of view : Analyze your observation experience from a personal point of view. This portion of your assignment should be 1-2 pages in length
Present the pros and cons or benefit analysis for insourcing : Present the pros and cons or benefit analysis for each of the 3 proposals. Recommend 1 of these proposals and your reason for selection of that proposal.
Calculate the capital budgeting for the project : Calculate the Capital Budgeting Analysis: Cash Flows and Expected NPV of the BioScan Project-Discount rate for project etc.
Compare and contrast licensing and investment in general : Suppose you are five (5) years into exporting shoes to your chosen country, and have decided to try a new global strategy.
Discuss preventing cyberbullying and harassment : Discuss Preventing cyberbullying and harassment. Create a 2- to 3-page handout that can be distributed to the attendees at the seminar.
What share price would you expect after announcement : With the new expansion, Cooperton's dividends are expected to grow at a 5% rate. What share price would you expect after the announcement?
Identify the risk and reasoning provide a brief description : Describe the business environment and identify the risk and reasoning Provide a brief description of all the important areas of the business environment.
Evaluate key elements of the marketing communications mix : Select a brand from those listed and critically evaluate the key elements of the marketing communications mix.
Calculate the firms wacc : Calculate the firm's WACC. Prepare and analyze each planned capital expenditure.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd