Campbellsville University IT Security presentation

timer Asked: Feb 22nd, 2019
account_balance_wallet $10

Question Description

must use this norms:

12-point font using Times New Roman; 14-point font can be used for headings

Use APA style correctly throughout the presentation

Use correct grammar and punctuation

Format correctly and consistently

Include a cover page, introduction slide at the beginning of the presentation, and a conclusion slide at the end of the presentation; include a reference slide using APA

format for the references at the very end

Number all slides beginning with the cover slide as page 1

Utilize 10 references from scholarly NOT use Wikipedia (one source can be the textbook)

Cite references within the presentation using correct APA format

Include a minimum of 16 slides which will include the cover and reference slides

Include at least ONE FIGURE or ONE TABLE in the presentation and format in APA style

Highlight your knowledge of technology by including TRANSITION and ANIMATION

Tutor Answer

School: UCLA


February 2019
Developed by K2Share, LLC.

What You Will Learn

• Possible risks and vulnerabilities
• Definitions
• Your role in cyber security and shielding
• Best practices in security and privacy


Cyber Security and Privacy Starts
and Ends with Us!

Security Tips
Commit to a disciplined practice of information
security and continue to refresh yourself so you
don’t become a point of vulnerability in our
security defenses.


Information Stewardship
• You are a steward of
personal information for
millions of Americans
• Vulnerabilities at home
and at work jeopardize
not only the
stakeholders, but
everyone you connect


You are part of the Department’s
stewardship of this information

Cyber Security Defined
• Cyber Security’s goal: Protect our information and
information systems
• Cyber Security is: “Protection of information
systems against unauthorized access to or
modification of information, whether in storage,
processing or transit, and against the denial of service
to authorized users, including those measures
necessary to detect, document, and counter such


Privacy Defined

• Information privacy, or data privacy: the
relationship between collection and
dissemination of data, technology, the pub...

flag Report DMCA

awesome work thanks

Similar Questions
Hot Questions
Related Tags
Study Guides

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors