Campbellsville University IT Security presentation

Anonymous
timer Asked: Feb 22nd, 2019
account_balance_wallet $10

Question Description

must use this norms:

12-point font using Times New Roman; 14-point font can be used for headings

Use APA style correctly throughout the presentation

Use correct grammar and punctuation

Format correctly and consistently

Include a cover page, introduction slide at the beginning of the presentation, and a conclusion slide at the end of the presentation; include a reference slide using APA

format for the references at the very end

Number all slides beginning with the cover slide as page 1

Utilize 10 references from scholarly sources....do NOT use Wikipedia (one source can be the textbook)

Cite references within the presentation using correct APA format

Include a minimum of 16 slides which will include the cover and reference slides

Include at least ONE FIGURE or ONE TABLE in the presentation and format in APA style

Highlight your knowledge of technology by including TRANSITION and ANIMATION

Tutor Answer

NKURUMAH
School: UCLA

Attached.

IT SECURITY
Name:
University
February 2019
Developed by K2Share, LLC.

What You Will Learn

• Possible risks and vulnerabilities
• Definitions
• Your role in cyber security and shielding
privacy
• Best practices in security and privacy

2

Cyber Security and Privacy Starts
and Ends with Us!

Security Tips
Commit to a disciplined practice of information
security and continue to refresh yourself so you
don’t become a point of vulnerability in our
security defenses.

3

Information Stewardship
• You are a steward of
personal information for
millions of Americans
• Vulnerabilities at home
and at work jeopardize
not only the
Department’s
stakeholders, but
everyone you connect
with

4

You are part of the Department’s
stewardship of this information

Cyber Security Defined
• Cyber Security’s goal: Protect our information and
information systems
• Cyber Security is: “Protection of information
systems against unauthorized access to or
modification of information, whether in storage,
processing or transit, and against the denial of service
to authorized users, including those measures
necessary to detect, document, and counter such
threats.”

5

Privacy Defined

• Information privacy, or data privacy: the
relationship between collection and
dissemination of data, technology, the pub...

flag Report DMCA
Review

Anonymous
awesome work thanks

Similar Questions
Hot Questions
Related Tags
Study Guides

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors