SlideShare a Scribd company logo
1 of 2
Use speaker notes on each slide I need 6 slides EXCLUDING
cover pages and refe slide.
Assignment 2: Cybersecurity
We use computers and electronic systems to run and store just
about everything. Personal computers and the Internet are now
included as part of the Department of Homeland Security's
cybersecurity issues.
Cybersecurity involves protecting the information by
preventing, detecting, and responding to attacks on information
that is housed in technology.
There are many levels of risks in cybersecurity, some more
serious and damaging than others. Among these dangers are:
Viruses erasing the entire system.
Individuals breaking into personal computer systems and
altering the systems' files.
Individuals using personal computers to attack others' computer
systems.
Individuals stealing credit card information and making
unauthorized purchases.
Unfortunately, there is no 100% guarantee that even with the
best precautions some of these things won't happen. Risk
reduction steps exist to minimize vulnerability to information.
Tasks:
Create a PowerPoint Presentation containing 6–8 slides to
address the following:
Analyze and discuss the vulnerabilities and recommend what
security management can do to minimize the potential of a
government or private organization being at risk for
cybersecurity damage.
Outline the steps you recommend and identify any impediments
to successfully implementing the suggested cybersecurity
program.
Support your presentation with at least three outside scholarly
resources using APA in-text citations. Add detailed speaker
notes for each of the slides.

More Related Content

Similar to Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docx

Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Security economics
Security economicsSecurity economics
Security economicsYansi Keim
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET Journal
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
CYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptxCYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptxmalik298381
 
ID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxFahimMuntasir21
 
Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Lana Sorrels
 
Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Devendra kashyap
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBsGFI Software
 
Free Guide-to-cybersecurity-fundamentals.pdf
Free Guide-to-cybersecurity-fundamentals.pdfFree Guide-to-cybersecurity-fundamentals.pdf
Free Guide-to-cybersecurity-fundamentals.pdfVarinder K
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitypinkutinku26
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxchristiandean12115
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration RecommendationsMeg Weber
 
Computer Security Policy
Computer Security PolicyComputer Security Policy
Computer Security Policyeverestsky66
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 

Similar to Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docx (20)

Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Security economics
Security economicsSecurity economics
Security economics
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
CYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptxCYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptx
 
ID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptx
 
Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...
 
Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
Free Guide-to-cybersecurity-fundamentals.pdf
Free Guide-to-cybersecurity-fundamentals.pdfFree Guide-to-cybersecurity-fundamentals.pdf
Free Guide-to-cybersecurity-fundamentals.pdf
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
 
I0516064
I0516064I0516064
I0516064
 
22 need-for-security
22  need-for-security22  need-for-security
22 need-for-security
 
Ijnsa050215
Ijnsa050215Ijnsa050215
Ijnsa050215
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
Computer Security Policy
Computer Security PolicyComputer Security Policy
Computer Security Policy
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

More from gidmanmary

Using C#, write a program to find the nearest common parent of any t.docx
Using C#, write a program to find the nearest common parent of any t.docxUsing C#, write a program to find the nearest common parent of any t.docx
Using C#, write a program to find the nearest common parent of any t.docxgidmanmary
 
Using autoethnography in a qualitative research,consider a resid.docx
Using autoethnography in a qualitative research,consider a resid.docxUsing autoethnography in a qualitative research,consider a resid.docx
Using autoethnography in a qualitative research,consider a resid.docxgidmanmary
 
Using Earned Value to Determine StatusJennifer turned in her statu.docx
Using Earned Value to Determine StatusJennifer turned in her statu.docxUsing Earned Value to Determine StatusJennifer turned in her statu.docx
Using Earned Value to Determine StatusJennifer turned in her statu.docxgidmanmary
 
Using at least your textbook and a minimum of three additional sourc.docx
Using at least your textbook and a minimum of three additional sourc.docxUsing at least your textbook and a minimum of three additional sourc.docx
Using at least your textbook and a minimum of three additional sourc.docxgidmanmary
 
Using APA style format, write a 4-5 page paper describing the provis.docx
Using APA style format, write a 4-5 page paper describing the provis.docxUsing APA style format, write a 4-5 page paper describing the provis.docx
Using APA style format, write a 4-5 page paper describing the provis.docxgidmanmary
 
Use the organization you selected in Week One and the Security Ass.docx
Use the organization you selected in Week One and the Security Ass.docxUse the organization you selected in Week One and the Security Ass.docx
Use the organization you selected in Week One and the Security Ass.docxgidmanmary
 
Using DuPont analysis is a quick and relatively easy way to assess t.docx
Using DuPont analysis is a quick and relatively easy way to assess t.docxUsing DuPont analysis is a quick and relatively easy way to assess t.docx
Using DuPont analysis is a quick and relatively easy way to assess t.docxgidmanmary
 
Using APA style, prepare written research paper of 4 double spaced p.docx
Using APA style, prepare written research paper of 4 double spaced p.docxUsing APA style, prepare written research paper of 4 double spaced p.docx
Using APA style, prepare written research paper of 4 double spaced p.docxgidmanmary
 
Use the organization selected for your Managing Change Paper Part .docx
Use the organization selected for your Managing Change Paper Part .docxUse the organization selected for your Managing Change Paper Part .docx
Use the organization selected for your Managing Change Paper Part .docxgidmanmary
 
Use your knowledge to develop the circumstances and details involved.docx
Use your knowledge to develop the circumstances and details involved.docxUse your knowledge to develop the circumstances and details involved.docx
Use your knowledge to develop the circumstances and details involved.docxgidmanmary
 
Use the percentage method to compute the federal income taxes to w.docx
Use the percentage method to compute the federal income taxes to w.docxUse the percentage method to compute the federal income taxes to w.docx
Use the percentage method to compute the federal income taxes to w.docxgidmanmary
 
Use the textbook andor online sources to locate and capture three w.docx
Use the textbook andor online sources to locate and capture three w.docxUse the textbook andor online sources to locate and capture three w.docx
Use the textbook andor online sources to locate and capture three w.docxgidmanmary
 
Use the Web to conduct research on User Domain Security Policy and A.docx
Use the Web to conduct research on User Domain Security Policy and A.docxUse the Web to conduct research on User Domain Security Policy and A.docx
Use the Web to conduct research on User Domain Security Policy and A.docxgidmanmary
 
Use this Article to create the powerpoint slidesBrown, S. L., No.docx
Use this Article to create the powerpoint slidesBrown, S. L., No.docxUse this Article to create the powerpoint slidesBrown, S. L., No.docx
Use this Article to create the powerpoint slidesBrown, S. L., No.docxgidmanmary
 
use the work sheet format made available  but only to give brief, bu.docx
use the work sheet format made available  but only to give brief, bu.docxuse the work sheet format made available  but only to give brief, bu.docx
use the work sheet format made available  but only to give brief, bu.docxgidmanmary
 
Use these three sources to compose an annotated bibliography on Data.docx
Use these three sources to compose an annotated bibliography on Data.docxUse these three sources to compose an annotated bibliography on Data.docx
Use these three sources to compose an annotated bibliography on Data.docxgidmanmary
 
Use this outline to crete a four page essay. Guideline included and .docx
Use this outline to crete a four page essay. Guideline included and .docxUse this outline to crete a four page essay. Guideline included and .docx
Use this outline to crete a four page essay. Guideline included and .docxgidmanmary
 
Use the link provided to complete a self-assessment. After completin.docx
Use the link provided to complete a self-assessment. After completin.docxUse the link provided to complete a self-assessment. After completin.docx
Use the link provided to complete a self-assessment. After completin.docxgidmanmary
 
Use the SPSS software and the data set (2004)GSS.SAV (attached).docx
Use the SPSS software and the data set (2004)GSS.SAV (attached).docxUse the SPSS software and the data set (2004)GSS.SAV (attached).docx
Use the SPSS software and the data set (2004)GSS.SAV (attached).docxgidmanmary
 
Use the Internet to research functional systems that would contain a.docx
Use the Internet to research functional systems that would contain a.docxUse the Internet to research functional systems that would contain a.docx
Use the Internet to research functional systems that would contain a.docxgidmanmary
 

More from gidmanmary (20)

Using C#, write a program to find the nearest common parent of any t.docx
Using C#, write a program to find the nearest common parent of any t.docxUsing C#, write a program to find the nearest common parent of any t.docx
Using C#, write a program to find the nearest common parent of any t.docx
 
Using autoethnography in a qualitative research,consider a resid.docx
Using autoethnography in a qualitative research,consider a resid.docxUsing autoethnography in a qualitative research,consider a resid.docx
Using autoethnography in a qualitative research,consider a resid.docx
 
Using Earned Value to Determine StatusJennifer turned in her statu.docx
Using Earned Value to Determine StatusJennifer turned in her statu.docxUsing Earned Value to Determine StatusJennifer turned in her statu.docx
Using Earned Value to Determine StatusJennifer turned in her statu.docx
 
Using at least your textbook and a minimum of three additional sourc.docx
Using at least your textbook and a minimum of three additional sourc.docxUsing at least your textbook and a minimum of three additional sourc.docx
Using at least your textbook and a minimum of three additional sourc.docx
 
Using APA style format, write a 4-5 page paper describing the provis.docx
Using APA style format, write a 4-5 page paper describing the provis.docxUsing APA style format, write a 4-5 page paper describing the provis.docx
Using APA style format, write a 4-5 page paper describing the provis.docx
 
Use the organization you selected in Week One and the Security Ass.docx
Use the organization you selected in Week One and the Security Ass.docxUse the organization you selected in Week One and the Security Ass.docx
Use the organization you selected in Week One and the Security Ass.docx
 
Using DuPont analysis is a quick and relatively easy way to assess t.docx
Using DuPont analysis is a quick and relatively easy way to assess t.docxUsing DuPont analysis is a quick and relatively easy way to assess t.docx
Using DuPont analysis is a quick and relatively easy way to assess t.docx
 
Using APA style, prepare written research paper of 4 double spaced p.docx
Using APA style, prepare written research paper of 4 double spaced p.docxUsing APA style, prepare written research paper of 4 double spaced p.docx
Using APA style, prepare written research paper of 4 double spaced p.docx
 
Use the organization selected for your Managing Change Paper Part .docx
Use the organization selected for your Managing Change Paper Part .docxUse the organization selected for your Managing Change Paper Part .docx
Use the organization selected for your Managing Change Paper Part .docx
 
Use your knowledge to develop the circumstances and details involved.docx
Use your knowledge to develop the circumstances and details involved.docxUse your knowledge to develop the circumstances and details involved.docx
Use your knowledge to develop the circumstances and details involved.docx
 
Use the percentage method to compute the federal income taxes to w.docx
Use the percentage method to compute the federal income taxes to w.docxUse the percentage method to compute the federal income taxes to w.docx
Use the percentage method to compute the federal income taxes to w.docx
 
Use the textbook andor online sources to locate and capture three w.docx
Use the textbook andor online sources to locate and capture three w.docxUse the textbook andor online sources to locate and capture three w.docx
Use the textbook andor online sources to locate and capture three w.docx
 
Use the Web to conduct research on User Domain Security Policy and A.docx
Use the Web to conduct research on User Domain Security Policy and A.docxUse the Web to conduct research on User Domain Security Policy and A.docx
Use the Web to conduct research on User Domain Security Policy and A.docx
 
Use this Article to create the powerpoint slidesBrown, S. L., No.docx
Use this Article to create the powerpoint slidesBrown, S. L., No.docxUse this Article to create the powerpoint slidesBrown, S. L., No.docx
Use this Article to create the powerpoint slidesBrown, S. L., No.docx
 
use the work sheet format made available  but only to give brief, bu.docx
use the work sheet format made available  but only to give brief, bu.docxuse the work sheet format made available  but only to give brief, bu.docx
use the work sheet format made available  but only to give brief, bu.docx
 
Use these three sources to compose an annotated bibliography on Data.docx
Use these three sources to compose an annotated bibliography on Data.docxUse these three sources to compose an annotated bibliography on Data.docx
Use these three sources to compose an annotated bibliography on Data.docx
 
Use this outline to crete a four page essay. Guideline included and .docx
Use this outline to crete a four page essay. Guideline included and .docxUse this outline to crete a four page essay. Guideline included and .docx
Use this outline to crete a four page essay. Guideline included and .docx
 
Use the link provided to complete a self-assessment. After completin.docx
Use the link provided to complete a self-assessment. After completin.docxUse the link provided to complete a self-assessment. After completin.docx
Use the link provided to complete a self-assessment. After completin.docx
 
Use the SPSS software and the data set (2004)GSS.SAV (attached).docx
Use the SPSS software and the data set (2004)GSS.SAV (attached).docxUse the SPSS software and the data set (2004)GSS.SAV (attached).docx
Use the SPSS software and the data set (2004)GSS.SAV (attached).docx
 
Use the Internet to research functional systems that would contain a.docx
Use the Internet to research functional systems that would contain a.docxUse the Internet to research functional systems that would contain a.docx
Use the Internet to research functional systems that would contain a.docx
 

Recently uploaded

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 

Recently uploaded (20)

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 

Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docx

  • 1. Use speaker notes on each slide I need 6 slides EXCLUDING cover pages and refe slide. Assignment 2: Cybersecurity We use computers and electronic systems to run and store just about everything. Personal computers and the Internet are now included as part of the Department of Homeland Security's cybersecurity issues. Cybersecurity involves protecting the information by preventing, detecting, and responding to attacks on information that is housed in technology. There are many levels of risks in cybersecurity, some more serious and damaging than others. Among these dangers are: Viruses erasing the entire system. Individuals breaking into personal computer systems and altering the systems' files. Individuals using personal computers to attack others' computer systems. Individuals stealing credit card information and making unauthorized purchases. Unfortunately, there is no 100% guarantee that even with the best precautions some of these things won't happen. Risk reduction steps exist to minimize vulnerability to information. Tasks: Create a PowerPoint Presentation containing 6–8 slides to address the following: Analyze and discuss the vulnerabilities and recommend what security management can do to minimize the potential of a government or private organization being at risk for cybersecurity damage. Outline the steps you recommend and identify any impediments to successfully implementing the suggested cybersecurity program. Support your presentation with at least three outside scholarly
  • 2. resources using APA in-text citations. Add detailed speaker notes for each of the slides.