MIS301_Assessment_2 Part C Brief_Case Study Report_Presentation_Module 6.1 Page 1 of 7 Context: The management of the case study business received your report from Part A and Part B, and decided to...

1 answer below »
6 min presentation with speaker notes


MIS301_Assessment_2 Part C Brief_Case Study Report_Presentation_Module 6.1 Page 1 of 7 Context: The management of the case study business received your report from Part A and Part B, and decided to tighten up cybersecurity. The management requested you (as a group) to implement all the recommendations you made in Part B and stop hackers from gaining access to critical information by any means necessary. However, you are concerned about that request and you were not sure whether the management understands that there is a range of ethically significant issues associated with cybersecurity practices. You decided to record a 6-minute video to explore one ethical challenge in cybersecurity. In the video, you will speak to the management as a cybersecurity specialist. Keep in mind that the business management do not have a technical background. ASSESSMENT 2 PART C BRIEF Subject Code and Title MIS301 Cybersecurity Assessment Case Study Report and Presentation: Presentation Individual/Group Group Length Part C: 6 minute presentation Learning Outcomes The Subject Learning Outcomes demonstrated by successful completion of the task below include: a) Investigate and analyse the tenets of cybersecurity. b) Identify and communicate a range of threats and vulnerabilities to informational assets. c) Recommend and justify robust solutions to identified threats and vulnerabilities to cybersecurity. d) Develop own professional practice and ethical standards around security issues and implementation of solutions. Submission Due by 11:55pm AEST Sunday of Module 6.1 Weighting 15% Total Marks 100 marks MIS301_Assessment_2 Part C Brief_Case Study Report_Presentation_Module 6.1 Page 2 of 7 Instructions: 1. Review your Assessment 2 Part B, focusing on the recommendations. 2. Create a 6-minute video presentation using PowerPoint (or a similar platform) and advise management on the following two topics: a. Discuss how other values (e.g. privacy) may be in tension with the value of cybersecurity. Give two specific examples in cybersecurity practice where management needs to strike an ethically acceptable balance between the value of cybersecurity and other values. b. What will you suggest the business should do to respond to requests from law- enforcement agencies to weaken their encryption practices or decrypt a specific user’s account? 3. Requirements for the video presentation: a. All group members must present in the video presentation. b. For authentication purposes, all group members must show their face in the video presentation for at least 1 minute each. c. Your presentation must be in video format (mp4, MOV, etc.) for uploading onto Blackboard. There is a lot of free software that can be used to create a group presentation video, e.g. Zoom and Microsoft Teams. You may create a Zoom meeting for the presentation among your group members and record the meeting. 4. Before submitting your assessment, you should check it against the assessment criteria and the marking rubric included in this specification to ensure that you have satisfactorily addressed all the criteria that will be used to mark your submission. 5. Download the Group Participation Matrix from Assessment 2 Part C section. Use this document to review your group members performance in this assessment and to specify their specific contribution made to the group work. This Group Participation Matrix document needs to be submitted individually through the Assessment 2 Part C submission link. Referencing It is essential that you use appropriate APA style for citing and referencing research. Please see more information on referencing here https://library.torrens.edu.au/academicskills/apa/tool Submission Instructions Group submission 1. Each team will submit their video via the Assessment link in the main navigation menu in Blackboard. The Learning Facilitator will provide feedback via the Grade Centre in the LMS portal. Feedback can be viewed in My Grades. Detailed instructions on compressing (if necessary) and uploading video presentation is available at https://laureate- au.blackboard.com/webapps/blackboard/content/listContentEditable.jsp?content_id=_3876 29_1&course_id=_4044_1 https://library.torrens.edu.au/academicskills/apa/tool https://laureate-au.blackboard.com/webapps/blackboard/content/listContentEditable.jsp?content_id=_387629_1&course_id=_4044_1 https://laureate-au.blackboard.com/webapps/blackboard/content/listContentEditable.jsp?content_id=_387629_1&course_id=_4044_1 https://laureate-au.blackboard.com/webapps/blackboard/content/listContentEditable.jsp?content_id=_387629_1&course_id=_4044_1 MIS301_Assessment_2 Part C Brief_Case Study Report_Presentation_Module 6.1 Page 3 of 7 After uploading your video presentation, retain a copy in a safe place. Peer evaluation – Individual Submission 1. Each individual student is to submit a completed Group Participation Matrix document in the Peer Evaluation submission link. Please submit a peer review correctly, as no submission may result in zero grading for this assessment criteria. Academic Integrity Declaration We declare that except where we have referenced, the work we are submitting for this assessment task is our own work. We have read and are aware of Torrens University Australia Academic Integrity Policy and Procedure viewable online at http://www.torrens.edu.au/policies-and-forms We are aware that we need to keep a copy of all submitted material and their drafts, and we will do so accordingly. http://www.torrens.edu.au/policies-and-forms MIS301_Assessment_2 Part C Brief_Case Study Report_Presentation_Module 6.1 Page 4 of 7 Assessment Rubric Assessment attributes Fail (Unacceptable) 0-49% Pass (Functional) 50-64% Credit (Proficient) 65-74% Distinction (Advanced) 75 -84% High Distinction (Exceptional) 85-100% Knowledge and understanding Understanding of ethical standards around security issues and implementation of solutions 40% Little or no understanding of ethical standards around security issues and implementation of solutions. Key components of the assessment are not addressed. Understands the fundamentals of ethical standards around security issues and implementation of solutions. Often confuses assertion of personal opinion with information substantiated by evidence from the research/course materials. Some of the key components of the assessment are not addressed. Sound understanding of ethical standards around security issues and implementation of solutions. Supports personal opinion and information substantiated by evidence from the research/course materials. All key components of the assessment are addressed with an adequate capacity to explain and apply relevant key concepts. Very good understanding of ethical standards around security issues and implementation of solutions. Discriminates between assertion of personal opinion and information substantiated by robust evidence from the research/course materials and extended reading. All of the key components are addressed. Well demonstrated capacity to explain and apply relevant key concepts. Excellent understanding of ethical standards around security issues and implementation of solutions. Systematically and critically discriminates between assertion of personal opinion and information substantiated by robust evidence from the research/course materials and extended reading. All of the key components are addressed. Demonstrates mastery and application of key concepts. Effective communication - Clear and logical structure Difficult to understand for audience, no logical/clear structure, poor flow of ideas, Information, arguments and evidence are presented in a way that is Information, arguments and evidence are well presented, with a mostly Information, arguments and evidence are very well presented; the presentation is logical, Expertly presented — the presentation is logical, persuasive, and well supported by evidence, MIS301_Assessment_2 Part C Brief_Case Study Report_Presentation_Module 6.1 Page 5 of 7 Assessment attributes Fail (Unacceptable) 0-49% Pass (Functional) 50-64% Credit (Proficient) 65-74% Distinction (Advanced) 75 -84% High Distinction (Exceptional) 85-100% - Flow of information - Clarity and quality of verbal communication - Good use of time 30% argument lacks supporting evidence. Audience cannot follow the line of reasoning. Does not engage the audience or look at the camera. Body language inappropriate or not professional. Inaccurate information. Inadequate or excessive length. not always clear and logical. Line of reasoning is difficult to follow at times. Speech and tone not always appropriate for audience; however, not throughout the entire presentation. The presentation is of an acceptable length. clear flow of ideas and arguments. Line of reasoning is easy to follow. Uses engaging presentation techniques (e.g. posture; eye contact; gestures; volume; pitch and pace of voice) The presentation is of an acceptable length. clear and well supported by evidence. Confidently and consistently uses a range of engaging presentation techniques (e.g. posture; eye contact; gestures; volume; pitch and pace of voice). Clear and confident delivery. The presentation is of an acceptable length. demonstrating a clear flow of ideas and arguments. Engages and sustains audience’s interest in the topic. Dynamic, integrated and professional use of a wide range of engaging presentation techniques (e.g. posture; eye contact; gestures; volume; pitch and pace of voice). Clear, confident and persuasive delivery. The presentation is of an acceptable length. Teamwork 10% Does not participate
Answered 3 days AfterApr 30, 2021MIS301

Answer To: MIS301_Assessment_2 Part C Brief_Case Study Report_Presentation_Module 6.1 Page 1 of 7 Context: The...

Neha answered on May 02 2021
143 Votes
Privacy Issues
Privacy Issues
Submitted By:-
Data Privacy
Data privacy can be defined as the type of information security which has to deal with the proper handling of the data as it has concerned with the notice, regulatory concerns, consent a
nd the sensitivity.
Data privacy can be the understanding of the customer for their rights and also how their personal information will be connected collected, shared, stored and used by the organization
Explain the usage of personal information to the customers.
Author defines data privacy as a type of “information security that deals with the proper handling of data concerning consent, notice, sensitivity and regulatory concerns.” On its most basic level, data privacy is a consumer’s understanding of their rights as to how their personal information is collected, used, stored and shared. The use of personal information must be explained to consumers in a simple and transparent manner and in most cases, consumers must give their consent before their personal information is provided.
2
Data Security
Major focus on protecting person information about the customers.
The 3rd party will have capabilities of performing malicious attacks or exploit the data.
The data security is setup so that the organization can protect personal information about the customer
Organization can use different Methods and techniques to achieve data privacy .
Helps to achieve data integrity.
The integrity allows us to have accurate data which is available and reliable for the authorised users.
Data security is focused on protecting personal data from any unauthorized third-party access or malicious attacks and exploitation of data. It is set up to protect personal data using different methods and techniques to ensure data privacy.
Data security ensures the integrity of the data, meaning data is accurate, reliable, and available to authorized parties.
Data Security methods practices and processes can include:
activity monitoring
network security
access control
breach response
encryption
multi-factor authentication
3
Cybersecurity
Cyber Security can be defined as protective measures to keep the digital assets protected from any harmful effect .
There can be technical or the human errors which can perform harmful events over the data .
There can be unauthorised users who can try to access the data and perform malicious tasks.
All the valuable information can be stored in the paper documents...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here