MG622 University of Nairobi Cyber Security Company Project

User Generated

zggg

Business Finance

MG622

University of Nairobi

Description

Group Project 1: The Cyber Security Company

Instructions

You need to complete this assignment below during the Semester as a Group exercise. I will grade the Group on a final product, and each participant on their level of participation. One can submit for the group.

  1. Fact Pattern: You are the Officers and Board of a technology start-up that has created the latest and greatest cyber-security software products. Your products have application everywhere in the World that the Web is used for e-commerce. You have just received ten million dollars in venture funding to expand the products sales globally if you can convince the VC fund that your plan has merit.
  2. Project: How would you spend that money and why?
  3. Instructions: Please create a power point slide deck to be presented to the VC fund to outline and substantiate your desired spend and how you would support it with business infrastructure and sales support of all kinds. You should also outline the advantages and disadvantages of multiple options for expansion so that the VC fund can understand your thinking and outcomes. This needs to expressly include international markets and expansion opportunities. The VC Fund will approve or not upon your recommendations and presentation. Accordingly, it needs to contain all of the information required for such a decision as well as the appropriate level of detail.

To view the grading rubric for this discussion, please see below.

Rubric

MG 662 Group Project 1 Rubric

MG 662 Group Project 1 Rubric

CriteriaRatingsPts

This criterion is linked to a Learning OutcomeCritical Analysis(Understanding of Readings, Videos and Outside References)

20.0 pts

Exemplary

Group project displays an excellent understanding of the required readings, videos and underlying concepts including correct use of terminology and examples. Power Point or other Project display integrates outside resources, relevant research, and specific real- life application (work experience, prior coursework, etc.) to support important points. Well- edited quotes are cited appropriately. Group project completely answers the question asked and provides full substantiation as to why the decisions were made and outcomes selected.

5.0 pts

Limited

Group project displays an understanding of the required readings, videos, research and underlying concepts including correct use of terminology, examples and proper citation. Group project answers the question asked and provides some substantiation as to why the decisions were made.

0.0 pts

Unsatisfactory

Group Project shows little or no evidence that readings, videos or research were completed or understood. Slides are largely unsubstantiated, without supporting statements with concepts from the readings, outside resources, relevant research, or specific real- life application.

20.0 pts

This criterion is linked to a Learning OutcomeParticipation in the Learning Community

20.0 pts

Exemplary

Group project illustrates group work and each individual members contribution to the overall purpose and conclusions of the Group project. Work does evidence joint contributions or illustrates different views and diversity of the group in coming to conclusions as well as full substantiation of conclusions made and why.

5.0 pts

Limited

Group project illustrates group work and some individual members contribution to the overall purpose of the Group project. Work does evidence some joint contributions or illustrates some different views and diversity of the group in coming to conclusions, with some substantiation.

0.0 pts

Unsatisfactory

Group project does not illustrate group work and individual members contribution to the overall purpose of the Group project. Work does not evidence joint contributions or illustrate different views and diversity of the group in coming to conclusions.

20.0 pts

This criterion is linked to a Learning OutcomeEtiquette in Dialogue with Peers

20.0 pts

Exemplary

Interactions on the Group project show total respect for the viewpoints of others , substantive participation by all members.

5.0 pts

Limited

Interactions on the Group project show mostly respect for the viewpoints of others or some lack of participation by members.

0.0 pts

Unsatisfactory

Interactions on the Group project show disrespect for the viewpoints of others or lack of participation by members.

20.0 pts

This criterion is linked to a Learning OutcomeQuality of Writing and Proofreading

20.0 pts

Exemplary

Written Group Presentation contains no grammatical, spelling or punctuation errors. The style of writing and overall presentation does facilitates effective communication. The layout is completely professional and uses graphical, chart and pictorial examples or media effectively, useful headings, the lay-out and overall presentation always facilitates effective communication.

5.0 pts

Limited

Written Group Presentation contains some grammatical, spelling or punctuation errors. The style of writing and overall presentation does facilitates some effective communication. The layout is not completely professional nor use enough graphical, chart, or pictorial examples or media, it has some useful headings and lay-out.

0.0 pts

Unsatisfactory

Written Group Presentation contains numerous grammatical, spelling or punctuation errors. The style of writing and overall presentation does not facilitate effective communication. The layout is not professional nor use graphical or pictorial examples or media.

20.0 pts

Total Points: 80.0

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Cyber Security
Name
Institution

Introduction


Cyber security is important in enhancing the protection of systems.



The aim is to protect networks, programs and systems from attacks
that occur digitally.



The attacks are aimed at accessibility, change or the destruction of
information from the systems.



In most cases, it leads to the interruption of normal processes in an
organization.

Increase in Demand


As organizations move towards digitization, the demand for the
products continue to increase.



The aim is to ensure there is protection of the systems and the securing
of the operations of the business.



The challenge in the implementation of the security measures is due to
varied devices.



It gives the attackers the ability to use innovation in accessing the
different types of systems.

Our Product


Our products are the best investment that an organization can make in
cyber security.



It ...


Anonymous
Awesome! Made my life easier.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags