Categories: Homework on time

TIM8330 NCU Impact of State Sponsored Information Security Programs Please see the attached documents for more detail instructions on what’s need for these

TIM8330 NCU Impact of State Sponsored Information Security Programs Please see the attached documents for more detail instructions on what’s need for these assignments. Please take note of instructions in WK4-1 document as it’s a power point presentation but will need to have transcript as a word document as well. *** Please use “Scholarly references vice Book references ***
INSTRUCTIONS
Reform programs based on the integration of theories aim to stimulate the transfer of knowledge.
Evaluate the significance of specific state-sponsored information warfare programs used to
reduce security risks (e.g., unauthorized cyberspace activities) and determine their impact over
time on end users. In your paper, also indicate the roles of the following individuals in helping to
reduce risks for end users:
•
•
•
•
Senior officers
Chief Information Officer (CIO)
Business managers (human resources and procurement directors especially)
Security practitioners
Support your paper with a minimum of five (5) scholarly resources. In addition to these
specified resources, other appropriate scholarly resources, including older articles, may be
included.
Length: 5-7 pages not including title and reference pages
Your paper should demonstrate thoughtful consideration of the ideas and concepts that are
presented in the course and provide new thoughts and insights relating directly to this topic. Your
response should reflect scholarly writing and current APA standards.
*** Please use “Scholarly references vice Book references ***
*** Please use “Scholarly references vice Book references ***
INSTRUCTIONS
For this assignment, you will need to interview one (1) military and one (1) civilian security
practitioner (non-management) concerning information and cyber-warfare. If you are unable to
acquire such an interview, conduct a mock interview where you draft a hypothetical situation.
Document this interview with word processing software to provide a transcript for the interview.
Your interview questions should focus on the following topics:
•
•
How information weaponries are being used to acquire knowledge about their
organizational strategies.
Plans and security measures that have not been effective to reduce information risks.
Why have these measures been ineffective according to your interviewees?
Once you have completed your interview, prepare a presentation of your findings for your course
instructor in which you include:
•
•
•
The impact of information warfare in both the public and private sectors, with specific
examples where applicable.
Your findings from the interviews such as how knowledge is acquired, as well as various
plans and measures that have been attempted, yet ineffective.
Include your documented transcript of the interview in your submission for this activity.
This can be in the form of a Word document.
Incorporate appropriate animations, transitions, and graphics as well as speaker notes for each
slide. The speaker notes may be comprised of brief paragraphs or bulleted lists.
Support your presentation with at least five (5) scholarly resources. In addition to these
specified resources, other appropriate scholarly resources may be included.
Length: 12-15 slides (with a separate reference slide)
Notes Length: 200-350 words for each slide
PLUS your documented transcript: 2-3 pages
Be sure to include citations for quotations and paraphrases with references in APA format
and style where appropriate. Save the file as PPT.
*** Please use “Scholarly references vice Book references ***

Purchase answer to see full
attachment

Don't use plagiarized sources. Get Your Custom Essay on
TIM8330 NCU Impact of State Sponsored Information Security Programs Please see the attached documents for more detail instructions on what’s need for these
Just from $13/Page
Order Essay
superadmin

Share
Published by
superadmin

Recent Posts

Consider the following information, and answer the question below. China and England are internation

Consider the following information, and answer the question below. China and England are international trade…

4 years ago

The CPA is involved in many aspects of accounting and business. Let’s discuss some other tasks, othe

The CPA is involved in many aspects of accounting and business. Let's discuss some other…

4 years ago

For your initial post, share your earliest memory of a laser. Compare and contrast your first percep

For your initial post, share your earliest memory of a laser. Compare and contrast your…

4 years ago

2. The Ajax Co. just decided to save $1,500 a month for the next five years as a safety net for rece

2. The Ajax Co. just decided to save $1,500 a month for the next five…

4 years ago

How to make an insertion sort to sort an array of c strings using the following algorithm: * beg, *

How to make an insertion sort to sort an array of c strings using the…

4 years ago

Assume the following Keynesian income-expenditure two-sector model:

Assume the following Keynesian income-expenditure two-sector model:                                                AD = Cp + Ip                                                Cp = Co…

4 years ago