Historical reference points in cyber security


Assignment:

OVERVIEW

You will prepare a PowerPoint presentation wherein you will design training which will cover everything discussed in the written paper you completed on this same topic in this course. Each section that was written and covered in the paper needs to be discussed, but the training video will end with additional information that will include contingencies and countermeasures related to either a cyber-attack or intrusion (Option A), or a WMD/CBRNE attack (Option B).

INSTRUCTIONS

You will use PPT Mix (Audio/Visual), which may be turned into a Windows Media Video WMV, to present and record your information. A minimum of 20 content slides are required not including the cover and reference slides. You will, at the minimum, use the same headings as

listed previously in these instructions. The presentation needs to be at least 15 minutes long and should last no more than 30 minutes maximum. References will be included on the last slide.

Once submitted for grading, you will email your PPT video to the rest of the class for their review.

  • The presentation needs to be at least 15 minutes long and should last no more than 30 minutes maximum.
  • A minimum of 20 content slides are required not including the cover and reference slides.
  • You will present and record your information.
  • The presentation must include at least 7 sources.
  • You do not have to show yourself in the video unless you wish to.

Option A: Instructions for a Comprehensive Examination of the Cyber Security Threat

Training Presentation

As a refresher, the following will be needed in the training video in addition to the aforementioned. You will provide the following using these headings: historical reference points in cyber security; critical infrastructure and cyber security; cyber security and critical infrastructure protection - engineering and design concepts and include mitigation, resiliency, and redundancy; cyber intelligence, conflict, and warfare; cyber security legal issues; economic costs of cyber security, and the future threat landscape involving cyber security.

Option B: Instructions for a Comprehensive Examination of the WMD (CBRNE) Threat

Training Presentation

As a refresher, the following will be needed in the training video in addition to the aforementioned. You will provide the following using these headings: historical reference points in WMD use as a weapon; critical infrastructure and WMD use from a preparedness as well as mitigation perspective; an examination of each CBRNE including this sub headings discussions (cover each group in its entirety before moving on to the next): brief overview of each CBRNE as a group - in other words C - Chemical weapons or agents; most common agents or weapons in the Chemical group; most common delivery systems for this group; lethality and other ertinent facts that are specific for this group; for each group discuss the impact, likelihood by probability and impact; do this for each CBRNE group. After chemical do biological, nuclear, radioactive and finally explosive. Conclude with your thought regarding future threat landscape involving CBRNE/ WMD. Remember any one of these might be used on purpose by a terrorist or criminal, some might occur naturally, and others might be encountered through accident.

Solution Preview :

Prepared by a verified Expert
Business Law and Ethics: Historical reference points in cyber security
Reference No:- TGS03151002

Now Priced at $70 (50% Discount)

Recommended (90%)

Rated (4.3/5)