Identify potential threats to operating systems

Assignment Help Computer Network Security
Reference no: EM131682530

Cyberspace and Cybersecurity Foundations

The Presentation Based on what you have learned in the previous steps and your SAR, you will also develop a presentation for your company's leadership. Your upper-level management team is not interested in the technical report you generated from your Workspace exercise.

They are more interested in the bottom line. You must help these non­technical leaders understand the very technical vulnerabilities you have discovered. They need to clearly see what actions they must either take or approve. The following are a few questions to consider when creating your non­technical presentation: How do you present your technical findings succinctly to a non­technical audience?

Your Workspace exercise report will span many pages, but you will probably not have more than 30 minutes for your presentation and follow-up discussion. How do you describe the most serious risks factually but without sounding too temperamental?

No one likes to hear that their entire network has been hacked, data has been stolen, and the attackers have won. You will need to describe the seriousness of your findings while also assuring upper-level management that these are not uncommon occurrences today. How do your Workspace exercise results affect business operations? Make sure you are presenting these very technical results in business terms that upper-level management will understand.

Be very clear on what you propose or recommend. Upper-level management will want to not only understand what you discovered; they will want to know what you propose as a solution. They will want to know what decisions they need to make based on your findings. Your goal for the presentation is to convince the leadership that adopting a security vulnerability assessment tool (such as MBSA) and providing an extra security layer is a must for the company.

The deliverables for this project are as follows: Security Assessment Report (SAR): This report should be a 7-8 page double-spaced Word document with citations in APA format.

The page count does not include figures, diagrams, tables, or citations. Nontechnical presentation: This is a set of 8-10 PowerPoint slides for upper management that summarizes your thoughts regarding the findings in your SAR.

In a Word document, share your lab experience and provide screen prints to demonstrate that you performed the lab. Submit your deliverables to the assignment folder.

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work.

1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.

2: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.

3: Identify potential threats to operating systems and the security features necessary to guard against them.

Verified Expert

This assignment is a Cyberspace and Cybersecurity Foundations Step 6: The Presentation Based on what we learned in the previous steps and our SAR, and I also develop a presentation for our company’s leadership. The presentation is for upper management that summarizes our thoughts regarding the findings in our SAR.

Reference no: EM131682530

Questions Cloud

Write a report recommending an off-shore country : Write a 1,050-word report recommending an off-shore country. How the country's financial system is related to key macroeconomic variables?
Describe the impact of substance abuse : Describe the impact of substance abuse and addiction on individual people and their families, communities, and nations.
Identify an environmental health issue : identify an environmental health issue and write your own environmental statement using a fictitious company
What are your upcoming weeks specific learning goals : What is your upcoming week's detailed schedule at your community practice experience placement?
Identify potential threats to operating systems : Evaluate the information in a logical and organized manner to determine its value and relevance to the problem - Identify potential threats to operating system
Explain how environmental justice plays : Defend your position based on scientific evidence and reasoning, Include in your proposal any ethical concerns with new technologies
What situations would not warrant the use of an array : What situations would not warrant the use of an array? Provide an example explaining why?
Explain the importance of doing business internationally : Explain the importance of doing business internationally for New Zealand's economic growth. How have they impacted New Zealand's economic trade.
What length of time between buses does he see : Fred visits Blotch ville again. He finds that the city has installed an electronic display at the bus stop, showing the time when the previous bus arrived.

Reviews

inf1682530

1/17/2018 5:19:05 AM

Greetings, I want to thank you guys for your talented, elevated requirements and secret administrations. Truly, it is the best dependable site and I will suggest it for everyone, simply your costs ought to take in thought the money related level of the understudies. Much obliged to you again and welcome it. Good fortunes mind

Write a Review

Computer Network Security Questions & Answers

  Topographical layout of the current and planned network

Design a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included..

  Protection of transmitted information-sensitive data stored

You must include in your investigation protection of both transmitted information also sensitive data stored locally in computer databases.

  Compare and contrast viruses and worms

Compare and contrast viruses, worms

  What the phases of penetration testing

What the phases of penetration testing? What is a component of most modern attacks? What is the difference between the phases of penetration testing and the attacker kill chain?

  Maintain an online reflective blog

Maintain an online reflective blog/journal and write blog posts/entries based on academic articles and conduct a research of the Internet on the topics as listed at the top of this assessment detail.

  Write a precis of construction engineering v hexyl pvt ltd

Write a precis of Construction Engineering (Aust) Pty Limited v Hexyl Pty Limited [1985] HCA 13; (1985) 155 CLR 541 and discuss how this case contributed to the law of partnership.

  Discuss the advantages and disadvantages of star

Discuss the advantages and disadvantages of star, bus, and mesh physical topologies. Provide real examples of each type and explain why the OSI model is better than the TCP/IP model. Why hasn't it taken over from the TCP/IP model?

  What are guest-hopping attacks

Identify the security advantages of cloud-based solutions.

  Digital forensic investigation

computer security incident, Trojan Defence, anti-forensics technique, chain of custody, FAT file system, SQLOracleHacks.txt, SQLOracleAttacks.txt, SQLInjection.html

  Details of the attack on the playstation network

Briefly summarize the details of the attack on the PlayStation Network, including the dates of when the attack started and was eventually uncovered.

  Develop the issp for the organisation

Assessment Task - You are required to analyse the scenario on page 3 and develop the following ISSP for the organisation described in the scenario: Access and use of sensitive information of the organisation

  Treats to a companies intellectual property

Day by day threats to a company's intellectual property have grown to an alarming rate over the years. After looking at your network security, structure there are three specific threats that we will focus on that could have a Hughimpact on your bu..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd