Final Project-Briefing Project _OUTLINE - CCJS 390 Final...

This preview shows page 1 - 5 out of 10 pages.

We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
Management of Information Security
The document you are viewing contains questions related to this textbook.
Chapter 6 / Exercise 1
Management of Information Security
Mattord/Whitman
Expert Verified
CCJS 390 Final Outline 10 page paper o 12 pt font o Double spaced o APA format o 1 in margins Paper Structure Cover Page o Name o Course Title o Date of Submission Introduction o Purpose of the presentation Body o Discussion of the slides and their content Conclusion o Summary of discussion Reference Page 15 – 20 Slide PowerPoint Presentation o Title Slide Name Course Title Date of Submission
We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
Management of Information Security
The document you are viewing contains questions related to this textbook.
Chapter 6 / Exercise 1
Management of Information Security
Mattord/Whitman
Expert Verified
o Slide Show theme to match the topic of the meeting
INTRODUCTION Cyber security threats are consistently on the rise at a very alarming rate. This is because of the large increase in network connected devices[Har15]. In 2015 Gartner predicted some 6.8 million devices would be connected and in use this year[Har15]. Even more, Gartner predicted that by the year 2020, that number would jump to around 20 billion[Har15]. That averages out to about two or three connected devices per one person[Har15]. CNBC quotes Derek Manky – a global security strategist for Fortinet – on the growth in number IoT (Internet of Things) devices saying "We're facing a massive problem moving forward for growing attack surface," [Har15]. The number of IoT devices presents an “unprecedented opportunity for hackers” [Har15]. The purpose of this presentation is to brief our new CSO on the current happenings in cyber security. Given her background in physical security, I wanted to provide a brief comparison in the concepts of the two security points. I also wanted to bring to light some key best practices for protecting our company as well as highlight current and potential policies that may aid in our efforts to protect our data. SLIDE/PAPER QUESTIONS & ANSWERS 1. What Is Cyber Security a. Cyber security by definition is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access[Rou16]. As it relates to computing, security implies both cyber and physical[Rou16]. 2. What Are The Key Concepts Of Cyber Security? a. 3. Are Cyber Criminals A Real Danger To The Company
a. Yes, cyber criminals are indeed a threat to our company. With the so many data breaches happening within organizations – for the sole purpose of getting, manipulating and or controlling it. Our company would be a gold mine of information. According to an article posted to CNBC in 2013, companies were seeing a great increase in cyber threats[Arj13]. In October 2013, a third of organizations reported a rise in attacks. Even large companies like Facebook, Sony and Netflix have reported attacks[Arj13]. To quote Ken Allan, “Cyber-crime is the greatest threat for organizations' survival today," Ken Allan, EY global information security leader said in a statement”

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture