Need small PowerPoint project done, computer science homework help

User Generated

fgvyyjvpxrqyl

Computer Science

Description

Already finished majority of the assignment. I just need someone to put my paper in PowerPoint form and abide by the rubric. Everything in the Rubric must be included. If you have any questions or concerns feel free to message me.


Using PowerPoint, Prezi, or a similar program, create a presentation that uses audio and/or slide commenting features. In your presentation, design a security awareness program pitch for the executive team of a company. The pitch should include both the human element and the organizational side of operations. Be sure to highlight the differences between intentional and unintentional threats posed by human beings and the organizational factors that impact the level of human error within an enterprise. Specifically, the following critical elements must be addressed: I. Introduction: Why is it important for a company to foster awareness of and mitigate against human factors in information security? II. Unintentional Human Error A. Human/Cognitive Factors: What are some examples of human/cognitive factors that influence unintentional human error? How do these factors impact the security posture of the organization? B. Psychosocial/Sociocultural Factors: What are some examples of psychosocial/sociocultural factors that influence unintentional human error? How do these factors impact the security posture of the organization? C. What potential predisposed and counterintuitive behaviors are examples of unintentional human error? D. How can a company use this information to harden its security posture? III. Malicious Human Behavior A. Human/Cognitive Factors: What are some examples of human/cognitive factors that influence malicious human behavior? How do these factors impact the security posture of the organization? B. Psychosocial/Sociocultural Factors: What are some examples of psychosocial/sociocultural factors that influence malicious human behavior? How do these factors impact the security posture of the organization? C. What potential predisposed and counterintuitive behaviors are examples of malicious human behavior? D. How can a company use this information to harden its security posture? IV. Organizational Factors A. How can data flow factors affect the company’s security posture? Provide examples to support your claims. B. How can work setting factors affect the company’s security posture? Provide examples to support your claims. C. How can work planning and control factors affect the company’s security posture? Provide examples to support your claims. D. How can employee readiness factors affect the company’s security posture? Provide examples to support your claims. V. Conclusion A. What is a healthy security culture? Why is it important for a company to have a healthy security culture? B. How can security awareness training programs promote healthy security culture in companies? How can these programs address the needs of various stakeholders? C. How can security awareness training for enterprise stakeholders mitigate against unintentional human error that negatively impacts security cultures? What kinds of training or remediation strategies could be used in addressing unintentional behaviors? D. How can security awareness training for enterprise stakeholders mitigate against malicious human behavior? What kinds of training or remediation strategies could be used in addressing malicious behaviors? E. How can security awareness training for enterprise stakeholders mitigate against organizational factors that negatively impact security cultures? What kinds of training or remediation strategies could be used in addressing organizational factors?

Unformatted Attachment Preview

Running head: 2-2 company description 1 Company Description Austin K. Garcia Southern New Hampshire 4/23/17 2-2 company description 2 Introduction Sony is a Japanese multinational conglomerate that is headquartered in Konan, Minato Tokyo. Sony is a diversified electronics company selling video games, network services, music, medical business, and motion pictures. Sony is one of the top manufacturers of electronics products for consumers and professionals. Sony is one of the most successful corporations which had an estimated revenue of 72.06 billion in 2016 (Statista, 2017). While the revenue is impressive, Sony is not stopping there. Sony announces new plans for future growth (Gabriel Kane, 2016). Sony is enjoying a turnaround in its fortunes coming out with new Walkman’s, tablets, TV’s, and smartphones. Sony reports they are creating Sony Picture Entertainment 4K streaming service in the beginning of 2017 (Gabriel Kane, 2016). One of the reasons why Sony is successful because of the unique employees. Sony has ranged from as much as 180,500 employees in 2008 to 125,300 in 2016 (Sony Corporation, 2017). Unfortunately, due to business restructuring, Sony had to downsize the employees. Sony’s business segment such as the electronics, pictures, music, financial service, and other are where all the employees are working. With 88,500 employees working in the electronics department because of the high demand of electronic devices. Sony’s 2-2 company description 3 geographic segment is in Japan, United States, Europe, China, Asia-Pacific, and Other areas. Japan is where majority of the employees work with 38 percent being more than the United States and China. I plan on inviting a security analyst and a public speaker about cybersecurity. Bringing a security analyst and a writer/slideshow maker will be extremely helpful before, and during the presentation. The security analyst will inform people on the security protocols that need to be in place and answering anyone’s questions after the presentation. Also, having a writer/presentation creator will be helpful to create the slideshow and or paper. Security What would life be without security? Hectic, chaotic, scary? Security is important in day to day life. Security ensures the safety of people and people’s information. Today, we live in a world where technology is advancing at an exponential rate. Everywhere you go, you will see some form of technology whether it’s a cellphone, TV, smart watch, stop light, or roller coaster. They are all forms of technology, and it is not only important to protect the devices itself, but the people who use those devices. By incorporating security measures and protocols, people can live 2-2 company description 4 a safe, secure, and protected life. However, there are people who want to abuse and exploit devices and information which puts innocent civilians in danger. Unintentional Human Error You may ask yourself how do we protect technological devices from being hacked and sensitive information from being leaked? Security awareness. Security awareness is the knowledge and protection of the physical and informational assets of an organization. It is biased to believe a corporation or someone can prevent a cyber-attack. It is bound to happen even with the highest form of security measures and protocols. Every system is vulnerable. Security awareness brings attention to this matter by alerting employees. The majority of cyber-attacks are from human carelessness and errors. That is why it is vital for employees to be properly trained and informed. Malicious Human Behavior Malicious human behavior is one of the main contributors when it comes to cyberattacks. Some cyber-attacks are employees who leak information. A good example of a malicious 2-2 company description 5 behavior is Edward Snowden. Edward Snowden worked for the CIA and the NSA. In 2013, Snowden leaked classified information from the NSA in 2013 without authorization. It is important to note insiders (employees) are the biggest security threat for organizations. Information Security Forum stated those network openings were created innocently through error without intentions of hurting the company or employees. However, in some cases, it was the result of trusted employees doing the tasks such as taking files and exploiting information. There are three types of insider behaviors such as malicious, negligent, and accidental. Malicious behavior is someone having a motive to harm the company and misuse the information gained intentionally. Negligent behavior is people who avoid policies and security measures and try to work around them. Accidental behavior is unintentional without a motive to harm the company or employees. Accidental behavior is more common than malicious and negligent behavior which means the majority of cyber-attacks are from human carelessness and error. Organizational Factors Organizational factors are the framework companies use to outline their authority. Those factors include policies, rules, and responsibilities for each member of an organization. 2-2 company description 6 Organizational factors are critical to ensure the safety of the company and or employee. Some companies have rigorous hiring process to pick the right candidate for the position. Depending on the job title, some organizations have multiple interviews with polygraph screenings. Conclusion In conclusion, it’s highly unlikely to stop or prevent a cyber-attack. Security awareness is important for companies and personal use as it can make people aware of their online activity. It is important to note that majority of cyber-attacks come from human carelessness and error. Implementation of security awareness in the hiring process and training for a job is crucial to ensure the safety of employees and the company. 2-2 company description 7 References Sony. (2017, March 13). Retrieved March 13, 2017, from https://en.wikipedia.org/wiki/Sony#Finances (n.d.). Sony revenue 2008-2016 | Statistic. Retrieved March 13, 2017, from https://www.statista.com/statistics/279269/total-revenue-of-sony-since-2008/2016 Gabriel Kane | Sep 6, 2016 1:13 pm EDT. (n.d.). Sony Announces New Plans for Future Growth. Retrieved March 13, 2017, from http://marketrealist.com/2016/09/sonyannounces-new-plans-for-future-growth/ Sony Corporation Global Headquarters. (n.d.). Retrieved March 13, 2017, from https://www.sony.net/SonyInfo/csr_report/employees/info/ https://www.recode.net/2016/5/24/11756584/cyber-attack-data-breach-insider-threatsteve-durbin http://smallbusiness.chron.com/factors-affecting-organizational-structure-2778.html
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

This question has not been answered.

Create a free account to get help with this and any other question!

Related Tags