Identify potential threats to operating systems

Assignment Help Computer Network Security
Reference no: EM131682530

Cyberspace and Cybersecurity Foundations

The Presentation Based on what you have learned in the previous steps and your SAR, you will also develop a presentation for your company's leadership. Your upper-level management team is not interested in the technical report you generated from your Workspace exercise.

They are more interested in the bottom line. You must help these non­technical leaders understand the very technical vulnerabilities you have discovered. They need to clearly see what actions they must either take or approve. The following are a few questions to consider when creating your non­technical presentation: How do you present your technical findings succinctly to a non­technical audience?

Your Workspace exercise report will span many pages, but you will probably not have more than 30 minutes for your presentation and follow-up discussion. How do you describe the most serious risks factually but without sounding too temperamental?

No one likes to hear that their entire network has been hacked, data has been stolen, and the attackers have won. You will need to describe the seriousness of your findings while also assuring upper-level management that these are not uncommon occurrences today. How do your Workspace exercise results affect business operations? Make sure you are presenting these very technical results in business terms that upper-level management will understand.

Be very clear on what you propose or recommend. Upper-level management will want to not only understand what you discovered; they will want to know what you propose as a solution. They will want to know what decisions they need to make based on your findings. Your goal for the presentation is to convince the leadership that adopting a security vulnerability assessment tool (such as MBSA) and providing an extra security layer is a must for the company.

The deliverables for this project are as follows: Security Assessment Report (SAR): This report should be a 7-8 page double-spaced Word document with citations in APA format.

The page count does not include figures, diagrams, tables, or citations. Nontechnical presentation: This is a set of 8-10 PowerPoint slides for upper management that summarizes your thoughts regarding the findings in your SAR.

In a Word document, share your lab experience and provide screen prints to demonstrate that you performed the lab. Submit your deliverables to the assignment folder.

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work.

1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.

2: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.

3: Identify potential threats to operating systems and the security features necessary to guard against them.

Verified Expert

This assignment is a Cyberspace and Cybersecurity Foundations Step 6: The Presentation Based on what we learned in the previous steps and our SAR, and I also develop a presentation for our company’s leadership. The presentation is for upper management that summarizes our thoughts regarding the findings in our SAR.

Reference no: EM131682530

Questions Cloud

Write a report recommending an off-shore country : Write a 1,050-word report recommending an off-shore country. How the country's financial system is related to key macroeconomic variables?
Describe the impact of substance abuse : Describe the impact of substance abuse and addiction on individual people and their families, communities, and nations.
Identify an environmental health issue : identify an environmental health issue and write your own environmental statement using a fictitious company
What are your upcoming weeks specific learning goals : What is your upcoming week's detailed schedule at your community practice experience placement?
Identify potential threats to operating systems : Evaluate the information in a logical and organized manner to determine its value and relevance to the problem - Identify potential threats to operating system
Explain how environmental justice plays : Defend your position based on scientific evidence and reasoning, Include in your proposal any ethical concerns with new technologies
What situations would not warrant the use of an array : What situations would not warrant the use of an array? Provide an example explaining why?
Explain the importance of doing business internationally : Explain the importance of doing business internationally for New Zealand's economic growth. How have they impacted New Zealand's economic trade.
What length of time between buses does he see : Fred visits Blotch ville again. He finds that the city has installed an electronic display at the bus stop, showing the time when the previous bus arrived.

Reviews

inf1682530

1/17/2018 5:19:05 AM

Greetings, I want to thank you guys for your talented, elevated requirements and secret administrations. Truly, it is the best dependable site and I will suggest it for everyone, simply your costs ought to take in thought the money related level of the understudies. Much obliged to you again and welcome it. Good fortunes mind

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd