K;KFKNFNFnlj

0 comments

WK 1, MIS6230

PART I

Breach: Research

Tasks

  • Conduct research and find a recently (within the last year) publicized security breach. Summarize it in your own words.
  • After analyzing the incident what management and technical missteps have you identified?
  • If you had the power, what would you have done to prevent the breach from occurring?

Feel free to make assumptions when answering the question. Support your assertions by citing credible sources.

  • PART II

    The Interview: I am the best person for the job!

    Imagine you have several years of experience in Information Technology and you are trying to break into the Information Security field. You applied for a position at a technology company that creates products in the health care sector called Wellness Technology, Inc. The position is for an “Information Security Manager”. You had a telephone interview with a hiring manager. The telephone interview went very well and you are onto the next step of the interview process. You have now been asked to create a PowerPoint presentation with audio narration. The PowerPoint presentation will be a pervasive one and will cover several items in an effort to show the technology company that you are the ideal candidate for the position. Your audience is a nontechnical stakeholder of the company and therefore jargon should not be used unless it is defined so that a nontechnical person can fully understand it. Your PowerPoint presentation with audio narration should include at least 8 slides covering the following:

    • Accurately describe the difference between Information Technology and Information Security along with at least one example.
    • Describe at least three key features of Information Security with at least one example for each.
    • Describe at least two technical controls that can be used to defend against outside threats including examples for each.
    • Describe at least two technical controls that can be used to defend against inside threats including examples for each.
    • Describe your plan for continuing your information security education as a way to demonstrate that you will keep up with the ever-changing landscape.
    • Explain why you are the best person for the job.

    Submission Details:

    • Use Microsoft PowerPoint with a professional theme.
    • Presentation should include at least eight slides.
    • Each slide should contain audio narration.
    • Name the presentation BU_MIS6250_W1_Project_LastName_FirstInitial.pptx.

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}