Define Information and Communication Technology (ICT), and explain why it is a very important component of cyber security.

CMGT 433
 
Assignment 1 – Due Friday 10/27/2017 6pm EST
Cyber Security, ICT, Legal Obligations and Constraints
You have been asked by the CIO of your company, or another company, to create a PowerPoint® informational presentation. Examples of companies might be a company you have worked for in the past or wish to work for in the future.  The audience for this week’s presentation will be a group of department supervisors.
The objectives of this presentation are to:

Define “cyber security,” and identify threats to private and public organizations.
Define Information and Communication Technology (ICT), and explain why it is a very important component of cyber security.
Identify the pillars of personal security that assist in personal protection.
Define the Six Principles of Information Security Management and legislation constraints that apply to cyber security.

Create a 9- to 10-slide PowerPoint® informational presentation, including the following:

Content for each of the objectives
Speaker’s notes
References used to support your presentation, including a minimum of two outside academic references in addition to course textbooks and videos

 
Assignment 2 – Due 10/31/2017
Hot Topics in Cyber Security
The CIO, of the company you chose in Week One, has asked you to create a PowerPoint® informational presentation. The audience for this week’s presentation will be a group of IT Operations employees.
The objectives of this presentation are to:

Explain why the three most active areas in cyber security are the Internet, mobile technology, and cloud computing.
Describe the growing use of penetration (pen) testing in many companies.
Identify what the pen testing process is and how the outcomes should be handled.
Explain the Six Principles of Information Security Management and why they are important.

Create a 9- to 10-slide PowerPoint® informational presentation, including the following:

Content for each of the objectives
Speaker’s notes
References used to support your presentation, including a minimum of two outside academic references in addition to course textbooks and videos

Assignment 3 – Due 11/5/2017
Cyber Security – Risk, Contingency Planning, and Defensive Management
The CIO of the company you chose in Week One, has asked you to create a PowerPoint® informational presentation. The audience for this week’s presentation will be a group of department managers within the company.
The objectives of this presentation are to:

Explain why risk, risk analysis, and prioritization of a company’s risks are some of the best methods to reduce threats in vulnerability management.
Identify the major components of contingency planning.
Define and explain what makes up the process called “vulnerability management.”
Explain several options that can be taken when severe risk is found in the area of incidence response.

Create a 9- to 10-slide PowerPoint® informational presentation, including the following:

Content for each of the objectives
Speaker’s notes
References used to support your presentation, including a minimum of two outside academic references in addition to course textbooks and videos

 
Assignment 4 – Due 11/10/2017
Cyber Security – Standard Operating Procedures
The CIO, of the company you chose in Week One, has asked you to create a PowerPoint® informational presentation. The audience for this week’s presentation will be the members of the executive staff, including the Vice Presidents, CIO, and CEO.
The objectives of this presentation are to:

Identify at least five opportunities areas for management to improve company’s security plan.
Identify at least five opportunities for employees to contribute a positive effect on the company’s security plan.
Identify at least three opportunities for management to display their support for the efforts of the IT Department in the pursuit of safe computing for all employees.

Create a 9- to 10-slide PowerPoint® training presentation, including the following:

Content for each of the objectives
Speaker’s notes
References used to support your presentation, including a minimum of two outside academic references in addition to course textbooks and videos

Assignment 5 – Due 11/15/2017
Cyber Security Awareness, Deterring Attacks, Personnel, and Ethics
The company you chose in Week One will hold a national convention of all of the U.S.-based executive staff members across 15 locations. The CIO has chosen “Cyber Security Awareness” as the theme for the convention. Based on the quality of your previous training presentations, you have been chosen to write and deliver a presentation at one of the Executive Round Table Meetings during the convention. The CIO has stressed creating a presentation that will capture the attention of executive management.
Create a 17- to 20-slide PowerPoint® presentation, including speaker’s notes. Use graphics, animation, or charts as appropriate. Reference and Title slides are in addition to the 17-20 slides.
Create a 1-page executive summary that the executives can use to communicate the highlights of the presentation within their organizations.
Include the following topics in the presentation. Avoid using research quotes or acronyms. Combine and/or order the topics in the way you believe to be most effective:

What is network protection? What needs protecting?
What is a Cyber Attack? How can cyber security help?
Security and ROI
Legislation and government influence
Ethical and legal issues
The Six Principles of Information Security Management.
What challenges are there with cloud computing?
Why is the Internet often considered the cause of cyber security issues?
The role of the workforce in security
Training, awareness, motivation, and continuous improvement
Disaster recovery and business continuity
Why are contingency planning and vulnerability management important?
Security Audits – What are they? Who uses and performs them?
Risk Management in reducing the probability of a negative event
Social Engineering – What is it? How might we be vulnerable to it?
Backups (full, copy, incremental, differential)
Deterring network attacks
Roles of our employees in cyber security
Conclusion
References

Compile all files into a ZIP folder.