SlideShare a Scribd company logo
1 of 2
Assignment 2: Cybersecurity
We use computers and electronic systems to run and store just
about everything. Personal computers and the Internet are now
included as part of the Department of Homeland Security's
cybersecurity issues.
Cybersecurity involves protecting the information by
preventing, detecting, and responding to attacks on information
that is housed in technology.
There are many levels of risks in cybersecurity, some more
serious and damaging than others. Among these dangers are:
Viruses erasing the entire system.
Individuals breaking into personal computer systems and
altering the systems' files.
Individuals using personal computers to attack others' computer
systems.
Individuals stealing credit card information and making
unauthorized purchases.
Unfortunately, there is no 100% guarantee that even with the
best precautions some of these things won't happen. Risk
reduction steps exist to minimize vulnerability to information.
Tasks:
Create a PowerPoint Presentation containing 6–8 slides to
address the following:
Analyze and discuss the vulnerabilities and recommend what
security management can do to minimize the potential of a
government or private organization being at risk for
cybersecurity damage.
Outline the steps you recommend and identify any impediments
to successfully implementing the suggested cybersecurity
program.
Support your presentation with at least three outside scholarly
resources using APA in-text citations. Add detailed speaker
notes for each of the slides.
Submission Details:
Save the presentation as M4_A2_Lastname_Firstname.ppt.
By
Wednesday, November 5, 2014
, submit your presentation to the
M4: Assignment 2 Dropbox
.
Assignment 2 Grading Criteria
Maximum Points
Analyzed and discussed the vulnerabilities and recommended
what security management can do to minimize the potential of a
government or private organization being at risk for
cybersecurity damage.
40
Outlined the steps recommended and identified any
impediments to successfully implementing the suggested
cybersecurity program.
40
Wrote in a clear, concise, and organized manner; demonstrated
ethical scholarship in accurate representation and attribution of
sources; displayed accurate spelling, grammar, and punctuation.
20
Total:
100

More Related Content

Similar to Assignment 2 CybersecurityWe use computers and electronic systems.docx

QuestionsPrepare a 13 slides presentation base on the below questi.pdf
QuestionsPrepare a 13 slides presentation base on the below questi.pdfQuestionsPrepare a 13 slides presentation base on the below questi.pdf
QuestionsPrepare a 13 slides presentation base on the below questi.pdfzakirrmohammadmtr
 
CYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptxCYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptxmalik298381
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overviewdr_edw777
 
Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Deepa Devadas
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxasharshaikh8
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...robbiesamuel
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AWard Pyles
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Essay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxEssay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxjenkinsmandie
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxSkippedltd
 
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docxalinainglis
 

Similar to Assignment 2 CybersecurityWe use computers and electronic systems.docx (19)

QuestionsPrepare a 13 slides presentation base on the below questi.pdf
QuestionsPrepare a 13 slides presentation base on the below questi.pdfQuestionsPrepare a 13 slides presentation base on the below questi.pdf
QuestionsPrepare a 13 slides presentation base on the below questi.pdf
 
ENSA_Module_3.pptx
ENSA_Module_3.pptxENSA_Module_3.pptx
ENSA_Module_3.pptx
 
CYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptxCYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptx
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
185
185185
185
 
Presentación AMIB Los Cabos
Presentación AMIB Los CabosPresentación AMIB Los Cabos
Presentación AMIB Los Cabos
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
 
Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Essay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxEssay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
 

More from annrodgerson

Assignment 2 Explain the difference between the following 1. A .docx
Assignment 2 Explain the difference between the following 1. A .docxAssignment 2 Explain the difference between the following 1. A .docx
Assignment 2 Explain the difference between the following 1. A .docxannrodgerson
 
Assignment 2 Exploring the Art of Indigenous Cultures Part 1All .docx
Assignment 2 Exploring the Art of Indigenous Cultures Part 1All .docxAssignment 2 Exploring the Art of Indigenous Cultures Part 1All .docx
Assignment 2 Exploring the Art of Indigenous Cultures Part 1All .docxannrodgerson
 
Assignment 2 Ethical (Moral) RelativismIn America, many are comfo.docx
Assignment 2 Ethical (Moral) RelativismIn America, many are comfo.docxAssignment 2 Ethical (Moral) RelativismIn America, many are comfo.docx
Assignment 2 Ethical (Moral) RelativismIn America, many are comfo.docxannrodgerson
 
Assignment 2 Discussion—Risk Factors and Protective FactorsResear.docx
Assignment 2 Discussion—Risk Factors and Protective FactorsResear.docxAssignment 2 Discussion—Risk Factors and Protective FactorsResear.docx
Assignment 2 Discussion—Risk Factors and Protective FactorsResear.docxannrodgerson
 
Assignment 2 Discussion—The Impact of CommunicationRemember a tim.docx
Assignment 2 Discussion—The Impact of CommunicationRemember a tim.docxAssignment 2 Discussion—The Impact of CommunicationRemember a tim.docx
Assignment 2 Discussion—The Impact of CommunicationRemember a tim.docxannrodgerson
 
Assignment 2 Discussion—Migration and ImmigrationGlobalization .docx
Assignment 2 Discussion—Migration and ImmigrationGlobalization .docxAssignment 2 Discussion—Migration and ImmigrationGlobalization .docx
Assignment 2 Discussion—Migration and ImmigrationGlobalization .docxannrodgerson
 
Assignment 2 Discussion Research Questions for Correlational and.docx
Assignment 2 Discussion Research Questions for Correlational and.docxAssignment 2 Discussion Research Questions for Correlational and.docx
Assignment 2 Discussion Research Questions for Correlational and.docxannrodgerson
 
Assignment 2 Discussion QuestionCorporate leaders often encount.docx
Assignment 2 Discussion QuestionCorporate leaders often encount.docxAssignment 2 Discussion QuestionCorporate leaders often encount.docx
Assignment 2 Discussion QuestionCorporate leaders often encount.docxannrodgerson
 
Assignment 2 DiscussionDuring Module 5, we have studied socia.docx
Assignment 2 DiscussionDuring Module 5, we have studied socia.docxAssignment 2 DiscussionDuring Module 5, we have studied socia.docx
Assignment 2 DiscussionDuring Module 5, we have studied socia.docxannrodgerson
 
Assignment 2 Discussion Question Comparison of Theories on Anxie.docx
Assignment 2 Discussion Question Comparison of Theories on Anxie.docxAssignment 2 Discussion Question Comparison of Theories on Anxie.docx
Assignment 2 Discussion Question Comparison of Theories on Anxie.docxannrodgerson
 
Assignment 2 Discussion - Global ManagementThis assignment is d.docx
Assignment 2 Discussion - Global ManagementThis assignment is d.docxAssignment 2 Discussion - Global ManagementThis assignment is d.docx
Assignment 2 Discussion - Global ManagementThis assignment is d.docxannrodgerson
 
Assignment 2 Directions Enter your Name Here =è XXXXXXXXXX.docx
Assignment 2 Directions Enter your Name Here =è XXXXXXXXXX.docxAssignment 2 Directions Enter your Name Here =è XXXXXXXXXX.docx
Assignment 2 Directions Enter your Name Here =è XXXXXXXXXX.docxannrodgerson
 
Assignment 2 Demographic TransitionsDemographic transition is the.docx
Assignment 2 Demographic TransitionsDemographic transition is the.docxAssignment 2 Demographic TransitionsDemographic transition is the.docx
Assignment 2 Demographic TransitionsDemographic transition is the.docxannrodgerson
 
Assignment 2 Current Events and U.S. DiplomacyThis paper will be .docx
Assignment 2 Current Events and U.S. DiplomacyThis paper will be .docxAssignment 2 Current Events and U.S. DiplomacyThis paper will be .docx
Assignment 2 Current Events and U.S. DiplomacyThis paper will be .docxannrodgerson
 
Assignment 2 Decision-making and Philosophy Part II Philosophy and.docx
Assignment 2 Decision-making and Philosophy Part II Philosophy and.docxAssignment 2 Decision-making and Philosophy Part II Philosophy and.docx
Assignment 2 Decision-making and Philosophy Part II Philosophy and.docxannrodgerson
 
Assignment 2 Court StandardsTasksExplore court standards, rule.docx
Assignment 2 Court StandardsTasksExplore court standards, rule.docxAssignment 2 Court StandardsTasksExplore court standards, rule.docx
Assignment 2 Court StandardsTasksExplore court standards, rule.docxannrodgerson
 
Assignment 2 Controversy Surrounding the Patriot ActThe USA Patri.docx
Assignment 2 Controversy Surrounding the Patriot ActThe USA Patri.docxAssignment 2 Controversy Surrounding the Patriot ActThe USA Patri.docx
Assignment 2 Controversy Surrounding the Patriot ActThe USA Patri.docxannrodgerson
 
Assignment 2 Construction Law PaperIn this assignment, you wi.docx
Assignment 2 Construction Law PaperIn this assignment, you wi.docxAssignment 2 Construction Law PaperIn this assignment, you wi.docx
Assignment 2 Construction Law PaperIn this assignment, you wi.docxannrodgerson
 
Assignment 2 Community Prevention ProgramAfter hearing that a nei.docx
Assignment 2 Community Prevention ProgramAfter hearing that a nei.docxAssignment 2 Community Prevention ProgramAfter hearing that a nei.docx
Assignment 2 Community Prevention ProgramAfter hearing that a nei.docxannrodgerson
 
Assignment 2 Communicating Bad News Leaders and managers often ha.docx
Assignment 2 Communicating Bad News Leaders and managers often ha.docxAssignment 2 Communicating Bad News Leaders and managers often ha.docx
Assignment 2 Communicating Bad News Leaders and managers often ha.docxannrodgerson
 

More from annrodgerson (20)

Assignment 2 Explain the difference between the following 1. A .docx
Assignment 2 Explain the difference between the following 1. A .docxAssignment 2 Explain the difference between the following 1. A .docx
Assignment 2 Explain the difference between the following 1. A .docx
 
Assignment 2 Exploring the Art of Indigenous Cultures Part 1All .docx
Assignment 2 Exploring the Art of Indigenous Cultures Part 1All .docxAssignment 2 Exploring the Art of Indigenous Cultures Part 1All .docx
Assignment 2 Exploring the Art of Indigenous Cultures Part 1All .docx
 
Assignment 2 Ethical (Moral) RelativismIn America, many are comfo.docx
Assignment 2 Ethical (Moral) RelativismIn America, many are comfo.docxAssignment 2 Ethical (Moral) RelativismIn America, many are comfo.docx
Assignment 2 Ethical (Moral) RelativismIn America, many are comfo.docx
 
Assignment 2 Discussion—Risk Factors and Protective FactorsResear.docx
Assignment 2 Discussion—Risk Factors and Protective FactorsResear.docxAssignment 2 Discussion—Risk Factors and Protective FactorsResear.docx
Assignment 2 Discussion—Risk Factors and Protective FactorsResear.docx
 
Assignment 2 Discussion—The Impact of CommunicationRemember a tim.docx
Assignment 2 Discussion—The Impact of CommunicationRemember a tim.docxAssignment 2 Discussion—The Impact of CommunicationRemember a tim.docx
Assignment 2 Discussion—The Impact of CommunicationRemember a tim.docx
 
Assignment 2 Discussion—Migration and ImmigrationGlobalization .docx
Assignment 2 Discussion—Migration and ImmigrationGlobalization .docxAssignment 2 Discussion—Migration and ImmigrationGlobalization .docx
Assignment 2 Discussion—Migration and ImmigrationGlobalization .docx
 
Assignment 2 Discussion Research Questions for Correlational and.docx
Assignment 2 Discussion Research Questions for Correlational and.docxAssignment 2 Discussion Research Questions for Correlational and.docx
Assignment 2 Discussion Research Questions for Correlational and.docx
 
Assignment 2 Discussion QuestionCorporate leaders often encount.docx
Assignment 2 Discussion QuestionCorporate leaders often encount.docxAssignment 2 Discussion QuestionCorporate leaders often encount.docx
Assignment 2 Discussion QuestionCorporate leaders often encount.docx
 
Assignment 2 DiscussionDuring Module 5, we have studied socia.docx
Assignment 2 DiscussionDuring Module 5, we have studied socia.docxAssignment 2 DiscussionDuring Module 5, we have studied socia.docx
Assignment 2 DiscussionDuring Module 5, we have studied socia.docx
 
Assignment 2 Discussion Question Comparison of Theories on Anxie.docx
Assignment 2 Discussion Question Comparison of Theories on Anxie.docxAssignment 2 Discussion Question Comparison of Theories on Anxie.docx
Assignment 2 Discussion Question Comparison of Theories on Anxie.docx
 
Assignment 2 Discussion - Global ManagementThis assignment is d.docx
Assignment 2 Discussion - Global ManagementThis assignment is d.docxAssignment 2 Discussion - Global ManagementThis assignment is d.docx
Assignment 2 Discussion - Global ManagementThis assignment is d.docx
 
Assignment 2 Directions Enter your Name Here =è XXXXXXXXXX.docx
Assignment 2 Directions Enter your Name Here =è XXXXXXXXXX.docxAssignment 2 Directions Enter your Name Here =è XXXXXXXXXX.docx
Assignment 2 Directions Enter your Name Here =è XXXXXXXXXX.docx
 
Assignment 2 Demographic TransitionsDemographic transition is the.docx
Assignment 2 Demographic TransitionsDemographic transition is the.docxAssignment 2 Demographic TransitionsDemographic transition is the.docx
Assignment 2 Demographic TransitionsDemographic transition is the.docx
 
Assignment 2 Current Events and U.S. DiplomacyThis paper will be .docx
Assignment 2 Current Events and U.S. DiplomacyThis paper will be .docxAssignment 2 Current Events and U.S. DiplomacyThis paper will be .docx
Assignment 2 Current Events and U.S. DiplomacyThis paper will be .docx
 
Assignment 2 Decision-making and Philosophy Part II Philosophy and.docx
Assignment 2 Decision-making and Philosophy Part II Philosophy and.docxAssignment 2 Decision-making and Philosophy Part II Philosophy and.docx
Assignment 2 Decision-making and Philosophy Part II Philosophy and.docx
 
Assignment 2 Court StandardsTasksExplore court standards, rule.docx
Assignment 2 Court StandardsTasksExplore court standards, rule.docxAssignment 2 Court StandardsTasksExplore court standards, rule.docx
Assignment 2 Court StandardsTasksExplore court standards, rule.docx
 
Assignment 2 Controversy Surrounding the Patriot ActThe USA Patri.docx
Assignment 2 Controversy Surrounding the Patriot ActThe USA Patri.docxAssignment 2 Controversy Surrounding the Patriot ActThe USA Patri.docx
Assignment 2 Controversy Surrounding the Patriot ActThe USA Patri.docx
 
Assignment 2 Construction Law PaperIn this assignment, you wi.docx
Assignment 2 Construction Law PaperIn this assignment, you wi.docxAssignment 2 Construction Law PaperIn this assignment, you wi.docx
Assignment 2 Construction Law PaperIn this assignment, you wi.docx
 
Assignment 2 Community Prevention ProgramAfter hearing that a nei.docx
Assignment 2 Community Prevention ProgramAfter hearing that a nei.docxAssignment 2 Community Prevention ProgramAfter hearing that a nei.docx
Assignment 2 Community Prevention ProgramAfter hearing that a nei.docx
 
Assignment 2 Communicating Bad News Leaders and managers often ha.docx
Assignment 2 Communicating Bad News Leaders and managers often ha.docxAssignment 2 Communicating Bad News Leaders and managers often ha.docx
Assignment 2 Communicating Bad News Leaders and managers often ha.docx
 

Recently uploaded

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 

Recently uploaded (20)

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

Assignment 2 CybersecurityWe use computers and electronic systems.docx

  • 1. Assignment 2: Cybersecurity We use computers and electronic systems to run and store just about everything. Personal computers and the Internet are now included as part of the Department of Homeland Security's cybersecurity issues. Cybersecurity involves protecting the information by preventing, detecting, and responding to attacks on information that is housed in technology. There are many levels of risks in cybersecurity, some more serious and damaging than others. Among these dangers are: Viruses erasing the entire system. Individuals breaking into personal computer systems and altering the systems' files. Individuals using personal computers to attack others' computer systems. Individuals stealing credit card information and making unauthorized purchases. Unfortunately, there is no 100% guarantee that even with the best precautions some of these things won't happen. Risk reduction steps exist to minimize vulnerability to information. Tasks: Create a PowerPoint Presentation containing 6–8 slides to address the following: Analyze and discuss the vulnerabilities and recommend what security management can do to minimize the potential of a government or private organization being at risk for cybersecurity damage. Outline the steps you recommend and identify any impediments to successfully implementing the suggested cybersecurity program. Support your presentation with at least three outside scholarly resources using APA in-text citations. Add detailed speaker notes for each of the slides. Submission Details: Save the presentation as M4_A2_Lastname_Firstname.ppt.
  • 2. By Wednesday, November 5, 2014 , submit your presentation to the M4: Assignment 2 Dropbox . Assignment 2 Grading Criteria Maximum Points Analyzed and discussed the vulnerabilities and recommended what security management can do to minimize the potential of a government or private organization being at risk for cybersecurity damage. 40 Outlined the steps recommended and identified any impediments to successfully implementing the suggested cybersecurity program. 40 Wrote in a clear, concise, and organized manner; demonstrated ethical scholarship in accurate representation and attribution of sources; displayed accurate spelling, grammar, and punctuation. 20 Total: 100