Networks, Privacy, and Security Presentation

      

    Networks, Privacy, and Security Presentation

     
     

    Assessment Description

    The purpose of this assignment is to explore legal and ethical issues related to networks, privacy, and security, as well as to research specific types of privacy and security threats and the measures that employee users should take to maintain privacy and security within an organization.

    Assume you are part of the IT security team in your organization. Research one common employee IT privacy and security issues and ways that employee users can protect themselves and the business from privacy and security breaches and risks. Some common risks to business include:

    • Lack of password management
    • Electronic storage and transfer of information
    • Privilege abuse by employees
    • Use of unapproved hardware and software
    • Data mishandling
    • Equipment misuse (including hardware and systems)
    • Knowledge misuse
    • Unapproved workarounds
    • Securing company data and information on personal      employee devices (e.g., cell phones, tablets)
    • Collaboration with third-party service providers
    • Social engineering
    • Phishing attacks

    Summarize your research findings and educate employees about the identified IT privacy and security issues.

    Create a PowerPoint presentation with a minimum of six slides that addresses the following:

    1. Define the employee privacy/security issue and      explain why it could be a risk for an organization.
    2. Provide a specific workplace scenario to illustrate      the employee privacy/security issue.
    3. Discuss the legal and ethical implications the      privacy/security issue presents for the employee, the company, and the      customer.
    4. Describe the negative impact the employee      privacy/security issue could present to the organization in terms of its      overall effect on accounting, finance, marketing, management, economics,      and general business operations.
    5. Discuss the ways that employee users can protect      themselves and the business from these types of privacy and security      breaches and risks.
    6. Discuss specific policies, strategies, and techniques      that could be employed by the organization and the employee to minimize      the identified employee privacy/security issue.
    7. Discuss how to educate employees about the identified      IT privacy and security risks.
    8. Include speaker notes at the bottom of each slide.

    Submit the Microsoft PowerPoint presentation file only. Do not submit any other file format, such as an Adobe PDF file, or you will not earn full credit.

    Refer to the resource, “Creating Effective PowerPoint Presentations,” located in the Student Success Center, for additional guidance on completing this assignment in the appropriate style.

    While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.

    This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

    You are required to submit this assignment to LopesWrite. A link to the LopesWrite technical support articles is located in Class Resources if you need assistance. .

    Rubric

    Collapse All RubricCollapse All

    collapse Legal and Ethical Implications assessment

    Legal and Ethical Implications

    15 points

    Criteria Description

    Legal and Ethical Implications

    5. Excellent

    15 points

    Discussion of the legal and ethical implications the privacy/security issue presents for the employee, company, and customers is thorough and includes substantial explanation and relevant supporting details.

    4. Good

    12.75 points

    Discussion of the legal and ethical implications the privacy/security issue presents for the employee, company, and customers is complete and includes explanation and relevant supporting details.

    3. Satisfactory

    11.25 points

    Discussion of the legal and ethical implications the privacy/security issue presents for the employee, company, and customers is included but lacks explanation and relevant supporting details.

    2. Less Than Satisfactory

    9.75 points

    Discussion of the legal and ethical implications the privacy/security issue presents for the employee, company, and customers is incomplete or incorrect.

    1. Unsatisfactory

    0 points

    Discussion of the legal and ethical implications the privacy/security issue presents for the employee, company, and customers is not included.

    collapse Negative Impact assessment

    Negative Impact

    15 points

    Criteria Description

    Negative Impact

    5. Excellent

    15 points

    Description of the negative impact the employee privacy security issue could present, including discussion of the effect on accounting, finance, marketing, management, economics, and general business operations, is thorough and includes substantial explanation and relevant supporting details.

    4. Good

    12.75 points

    Description of the negative impact the employee privacy security issue could present, including discussion of the effect on accounting, finance, marketing, management, economics, and general business operations, is complete and includes explanation and relevant supporting details.

    3. Satisfactory

    11.25 points

    Description of the negative impact the employee privacy security issue could present, including discussion of the effect on accounting, finance, marketing, management, economics, and general business operations, is included but lacks explanation and relevant supporting details.

    2. Less Than Satisfactory

    9.75 points

    Description of the negative impact the employee privacy security issue could present, including discussion of the effect on accounting, finance, marketing, management, economics, and general business operations, is incomplete or incorrect.

    1. Unsatisfactory

    0 points

    Description of the negative impact the employee privacy security issue could present is not included.

    collapse Policies, Strategies, and Techniques assessment

    Policies, Strategies, and Techniques

    15 points

    Criteria Description

    Policies, Strategies, and Techniques

    5. Excellent

    15 points

    Discussion of specific policies, strategies, and techniques that could be employed to minimize the employee privacy/security issue is thorough and includes substantial explanation and relevant supporting details.

    4. Good

    12.75 points

    Discussion of specific policies, strategies, and techniques that could be employed to minimize the employee privacy/security issue is complete and includes explanation and relevant supporting details.

    3. Satisfactory

    11.25 points

    Discussion of specific policies, strategies, and techniques that could be employed to minimize the employee privacy/security issue is included but lacks explanation and relevant supporting details.

    2. Less Than Satisfactory

    9.75 points

    Discussion of specific policies, strategies, and techniques that could be employed to minimize the employee privacy/security issue is incomplete or incorrect.

    1. Unsatisfactory

    0 points

    Discussion of specific policies, strategies, and techniques that could be employed to minimize the employee privacy/security issue is not included.

    collapse Privacy/Security Issue assessment

    Privacy/Security Issue

    10 points

    Criteria Description

    Privacy/Security Issue

    5. Excellent

    10 points

    Definition of the employee privacy/security issue, including explanation of why it could be a risk for an organization, is thorough and includes substantial relevant supporting details.

    4. Good

    8.5 points

    Definition of the employee privacy/security issue, including explanation of why it could be a risk for an organization, is complete and includes relevant supporting details.

    3. Satisfactory

    7.5 points

    Definition of the employee privacy/security issue, including explanation of why it could be a risk for an organization, is included but lacks relevant supporting details.

    2. Less Than Satisfactory

    6.5 points

    Definition of the employee privacy/security issue, including explanation of why it could be a risk for an organization, is incomplete or incorrect.

    1. Unsatisfactory

    0 points

    Definition of the employee privacy/security issue is not included.

    collapse Workplace Scenario assessment

    Workplace Scenario

    10 points

    Criteria Description

    Workplace Scenario

    5. Excellent

    10 points

    A specific workplace scenario illustrating the employee privacy/security issue is thorough and includes substantial explanation.

    4. Good

    8.5 points

    A specific workplace scenario illustrating the employee privacy/security issue is complete and includes explanation.

    3. Satisfactory

    7.5 points

    A specific workplace scenario illustrating the employee privacy/security issue is included but lacks explanation.

    2. Less Than Satisfactory

    6.5 points

    A specific workplace scenario illustrating the employee privacy/security issue is incomplete or incorrect.

    1. Unsatisfactory

    0 points

    A specific workplace scenario illustrating the employee privacy/security issue is not included.

    collapse Presentation of Content assessment

    Presentation of Content

    5 points

    Criteria Description

    Presentation of Content

    5. Excellent

    5 points

    The content is written clearly and concisely. Ideas universally progress and relate to each other. The project includes motivating questions and advanced organizers. The project gives the audience a clear sense of the main idea. Persuasive, authoritative information from reliable, credible sources is included.

    4. Good

    4.25 points

    The content is written with a logical progression of ideas and supporting information exhibiting a unity, coherence, and cohesiveness. Persuasive information is included from reliable sources.

    3. Satisfactory

    3.75 points

    The presentation slides are generally competent, but ideas may show some inconsistency in organization or in their relationships to each other. Some persuasive information is included.

    2. Less Than Satisfactory

    3.25 points

    The content is vague in conveying a point of view and does not create a strong sense of purpose. Some persuasive information from reliable sources is included. Some persuasive information is included but may be unreliable or lack credibility.

    1. Unsatisfactory

    0 points

    The content lacks a clear point of view and logical sequence of information is unclear. Little or no persuasive information from reliable sources is included.

    collapse Layout assessment

    Layout

    5 points

    Criteria Description

    Layout

    5. Excellent

    5 points

    The layout is visually pleasing and contributes to the overall message with appropriate use of headings, subheadings, and white space. Text is appropriate in length for the target audience and to the point. The background and colors enhance the readability of the text.

    4. Good

    4.25 points

    The layout background and text complement each other and enable the content to be easily read. The fonts are easy to read and point size varies appropriately for headings and text.

    3. Satisfactory

    3.75 points

    The layout uses horizontal and vertical white space appropriately. Sometimes the fonts are easy to read, but in a few places the use of fonts, italics, bold, long paragraphs, color, or busy background detracts and does not enhance readability.

    2. Less Than Satisfactory

    3.25 points

    The layout shows some structure but appears cluttered and busy or distracting with large gaps of white space or a distracting background. Overall readability is difficult due to lengthy paragraphs, too many different fonts, dark or busy background, overuse of bold, or lack of appropriate indentations of text.

    1. Unsatisfactory

    0 points

    The layout is cluttered, confusing, and does not use spacing, headings, and subheadings to enhance the readability. The text is extremely difficult to read with long blocks of text, small point size for fonts, and inappropriate contrasting colors. Poor use of headings, subheadings, indentations, or bold formatting is evident.

    collapse Mechanics of Writing (includes spelling, punctuation, grammar, language use) assessment

    Mechanics of Writing (includes spelling, punctuation, grammar, language use)

    5 points

    Criteria Description

    Mechanics of Writing (includes spelling, punctuation, grammar, language use)

    5. Excellent

    5 points

    Writer is clearly in command of standard, written, academic English.

    4. Good

    4.25 points

    Prose is largely free of mechanical errors, although a few may be present. The writer uses a variety of effective sentence structures and figures of speech.

    3. Satisfactory

    3.75 points

    Some mechanical errors or typos are present, but they are not overly distracting to the reader. Correct and varied sentence structure and audience-appropriate language are employed.

    2. Less Than Satisfactory

    3.25 points

    Frequent and repetitive mechanical errors distract the reader. Inconsistencies in language choice (register) or word choice are present. Sentence structure is correct but not varied.

    1. Unsatisfactory

    0 points

    Surface errors are pervasive enough that they impede communication of meaning. Inappropriate word choice or sentence construction is used.

    collapse Speaker Notes assessment

    Speaker Notes

    10 points

    Criteria Description

    Speaker Notes

    5. Excellent

    10 points

    Speaker notes are thorough and include substantial explanation and justification of computer system selections and relevant supporting details.

    4. Good

    8.5 points

    Speaker notes are complete, justify computer system selections, and include explanation and relevant supporting details.

    3. Satisfactory

    7.5 points

    Speaker notes are included but do not justify computer system selections or lack explanation and relevant supporting details.

    2. Less Than Satisfactory

    6.5 points

    Speaker notes are incomplete or incorrect.

    1. Unsatisfactory

    0 points

    Speaker notes are not included.

    collapse Documentation of Sources assessment

    Documentation of Sources

    10 points

    Criteria Description

    Documentation of Sources (citations, footnotes, references, bibliography, etc., as appropriate to assignment and style)

    5. Excellent

    10 points

    Sources are completely and correctly documented, as appropriate to assignment and style, and format is free of error.

    4. Good

    8.5 points

    Sources are documented, as appropriate to assignment and style, and format is mostly correct.

    3. Satisfactory

    7.5 points

    Sources are documented, as appropriate to assignment and style, although some formatting errors may be present.

    2. Less Than Satisfactory

    6.5 points

    Documentation of sources is inconsistent or incorrect, as appropriate to assignment and style, with numerous formatting errors.

    1. Unsatisfactory

    0 points

    Sources are not docum

                                                                                                                                      Order Now