College Pal
Connecting to a pal for your paper
  • Home
  • Place Order
  • My Account
    • Register
    • Login
  • Confidentiality Policy
  • Samples
  • How It Works
  • Guarantees

Sms or Whatsapp only : US:+12403895520

 

email: [email protected]
February 6, 2024

PC-3.2: Interact with others in a professional manner using appropriate communication and presentation skills. Purpose The ability to make presentations is important for any p

computer science

 

PC-3.2: Interact with others in a professional manner using appropriate communication and presentation skills.

Purpose

The ability to make presentations is important for any professional. This assignment reinforces your ability to develop a presentation for upper management. 

Assignment Instructions

Based on the knowledge you have achieved thus far in this class, compose a minimum 10-slide research presentation using the current APA version with title and reference slides using Microsoft PowerPoint. Prepare the slides for a 15-minute professional presentation on the topic of cybersecurity policies contains a policy recommendation of some type. Your presentation will be to upper management in an enterprise firm with over 2,000 employees and six locations throughout the world. Your presentation needs to include a title slide and follow APA formatting guidelines. 

Note: Be sure to use the notes portion within the slides to include additional content.

Then, compose a 1-page paper explaining how you will utilize interpersonal skills, including communications skills, problem solving, decision making, listening skills negotiation, and assertiveness to obtain management buy-in for your policy recommendation. 

Assignment Requirements

  1. Include a title slide.
  2. 10 slides in length, not counting the title and reference slides
  3. Includes a highly developed viewpoint and purpose and exceptional content
  4. Paper and slides demonstrate superior organization and are well ordered, logical, and unified.
  5. Free of grammar and spelling errors
  6. No evidence of plagiarism
  7. At least three outside references on the topic of cybersecurity policies
  8. One-page paper using the most current APA formatting

Your work should demonstrate a comprehensive understanding and expert-level usage of interpersonal skills to embody professional demeanor using all of the following skills: communication skills, problem solving, decision making, listening skills, negotiation, and assertiveness. Make sure to show how you would apply all of the skills in a professional situation.

For assistance with APA requirements, please go to Academic Writer. You will find the link in the Academic Tools section of the course.

Directions for Submitting Your Assignment

Compose your assignment using Microsoft PowerPoint and Word and save them as IT484_YourName_Unit_9_ Assignment 2 and submit them separately to the Assignment 2 Dropbox for Unit 9.

see unit 9-2 rubric

  • attachment

    IT484_Rubrics.docx

Purdue University Global logo

Rubric Title: IT484 Unit 1 Assignment Rubric

Assignment Criteria

Level III

Level II

Level I

Not Present

Criteria 1

Points: 30

Points: 25.5

Points: 18

Not Present

Criteria 1: The Role of Cybersecurity Policies

In 500 words or more:

· Explains the role cybersecurity policy plays in securing

· private organizations

· public organizations

· government organizations

· nation’s infrastructure

In 200–500 words:

· Explains the role cybersecurity policy plays in three organizations.

· private organizations

· public organizations

· government organizations

· nation’s infrastructure

In 200 words or less:

· Explains the role cybersecurity policy plays in two organizations.

· private organizations

· public organizations

· government organizations

· nation’s infrastructure

Does not meet any criteria.

Criteria 2

Points: 10

Points: 8.5

Points: 6

Not Present

Criteria 2: Other questions about cybersecurity policies

Answers the following questions in 600 words or more:

· What are the main categories of an in-depth cybersecurity policy?

· How would a well-designed cybersecurity policy program help secure a government agency, such as the Department of Homeland Security (DHS)?

· What are some challenges to making sure everyone in an organization follows the cybersecurity policy?

Answers the following questions in 400 to 600 words:

· What are the main categories of an in-depth cybersecurity policy?

· How would a well-designed cybersecurity policy program help secure a government agency, such as the Department of Homeland Security (DHS)?

· What are some challenges to making sure everyone in an organization follows the cybersecurity policy?

Answers the following questions in 400 words or less:

· What are the main categories of an in-depth cybersecurity policy?

· How would a well-designed cybersecurity policy program help secure a government agency, such as the Department of Homeland Security (DHS)?

· What are some challenges to making sure everyone in an organization follows the cybersecurity policy?

Or

· Does not answer one question

Does not meet any criteria.

Criteria 3

Points: 5

Points: 4.25

Points: 3

Not Present

Criteria 3: APA Style and Writing Conventions

Meets all criteria:

· Applies current APA style to in-text citations and references, and document formatting if appropriate, with minor to no errors

· Writing is focused, concise, and organized and articulates at a college level, with minor to no errors

· Uses resources from reliable and/or scholarly sources

Meets two criteria:

· Applies current APA style to in-text citations and references, and document formatting if appropriate, with minor to no errors

· Writing is focused, concise, and organized and articulates at a college level, with minor to no errors

· Uses resources from reliable and/or scholarly sources

Meets one criterion:

· Applies current APA style to in-text citations and references, and document formatting if appropriate, with minor to no errors

· Writing is focused, concise, and organized and articulates at a college level, with minor to no errors

· Uses resources from reliable and/or scholarly sources

Does not meet any criteria.

Maximum Total Points

45

38.25

27

0

Minimum Total Points

38.26 points minimum

27.01 points minimum

1 point minimum

0

Rubric Title: IT484 Unit 2 Assignment Rubric

Assignment Criteria

Level III

Level II

Level I

Not Present

Criteria 1

Points: 30

Points: 25.5

Points: 18

Not Present

Criteria 1: The Role of Cybersecurity Policies in Management

In 500 words or more:

· Why does an organization’s management present special challenges when it comes to policy compliance? Provide examples

In 200 to 500 words:

· Why does an organization’s management present special challenges when it comes to policy compliance? Provide examples

In less than 200 words:

· Why does an organization’s management present special challenges when it comes to policy compliance? Provide examples

Does not meet any criteria.

Criteria

Points: 10

Points: 8.5

Points: 6

Not Present

Criteria 2: Other questions about cybersecurity policies

Answers the following questions in 600 words or more:

· What are the components of an effective cybersecurity training program?

· How do organizational best practices help minimize risk to an organization’s confidential data?

· What are some best practices to manage portable devices in an organization?

Answers the following questions in 400 to 600 words:

· What are the components of an effective cybersecurity training program?

· How do organizational best practices help minimize risk to an organization’s confidential data?

· What are some best practices to manage portable devices in an organization?

Answers the following questions in 400 words or less:

· What are the components of an effective cybersecurity training program?

· How do organizational best practices help minimize risk to an organization’s confidential data?

· What are some best practices to manage portable devices in an organization?

Does not meet any criteria.

Criteria 3

Points: 5

Points: 4.25

Points: 3

Not Present

Criteria 3: APA Style and Writing Conventions

Meets all criteria:

· Applies current APA style to in-text citations and references, and document formatting if appropriate, with minor to no errors

· Writing is focused, concise, and organized and articulates at a college level, with minor to no errors

· Uses resources from reliable and/or scholarly sources

Meets two criteria:

· Applies current APA style to in-text citations and references, and document formatting if appropriate, with minor to no errors

· Writing is focused, concise, and organized and articulates at a college level, with minor to no errors

· Uses resources from reliable and/or scholarly sources

Meets one criterion:

· Applies current APA style to in-text citations and references, and document formatting if appropriate, with minor to no errors

· Writing is focused, concise, and organized and articulates at a college level, with minor to no errors

· Uses resources from reliable and/or scholarly sources

Does not meet any criteria.

Maximum Total Points

45

38.25

27

0

Minimum Total Points

38.26 points minimum

27.01 points minimum

1 point minimum

0

Rubric Title: IT484 Unit 3 Assignment Rubric

Assignment Criteria

Level III

Level II

Level I

Not Present

Criteria 1

Points: 30

Points: 25.5

Points: 18

Not Present

Criteria 1: The Role of Cybersecurity Policies and Controls

In 500 words or more:

· Evaluate the different types of access controls and the roles they play in a “defense in-depth” strategy. 

In 200 to 500 words:

· Evaluates the different types of access controls and the roles they play in a “defense-in-depth” strategy with examples.

In less than 200 words:

· Evaluates the different types of access controls and the roles they play in a “defense-in-depth” strategy with examples.

Does not meet any criteria.

Criteria 2

Points: 10

Points: 8.5

Points: 6

Not Present

Criteria 2: Other questions about cybersecurity policies

In 200 or more words for each answer, respond to the following:

· What are the pros and cons of three different biometric identification authentication systems?

· What security controls would you use to make credit cards more secure?

· What is authentication, and what are three different ways to accomplish it?

·

Answers the following questions in 400 to 600 words or more:

· What are the components of an effective cybersecurity training program?

· How do organizational best practices help minimize risk to an organization's confidential data?

· What are some best practices to manage portable devices in an organization?

Answers the following questions in 400 words or less:

· What are the components of an effective cybersecurity training program?

· How do organizational best practices help minimize risk to an organization's confidential data?

· What are some best practices to manage portable devices in an organization?

Does not meet any criteria.

Criteria 3

Points: 5

Points: 4.25

Points: 3

Not Present

Criteria 3: APA Style and Writing Conventions

Meets all criteria:

· Applies current APA style to in-text citations and references, and document formatting if appropriate, with minor to no errors

· Writing is focused, concise, and organized and articulates at a college level, with minor to no errors

· Uses resources from reliable and/or scholarly sources

Meets two criteria:

· Applies current APA style to in-text citations and references, and document formatting if appropriate, with minor to no errors

· Writing is focused, concise, and organized and articulates at a college level, with minor to no errors

· Uses resources from reliable and/or scholarly sources

Meets one criterion:

· Applies current APA style to in-text citations and references, and document formatting if appropriate, with minor to no errors

· Writing is focused, concise, and organized and articulates at a college level, with minor to no errors

· Uses resources from reliable and/or scholarly sources

Does not meet any criteria.

Maximum Total Points

45

38.25

27

0

Minimum Total Points

38.26 points minimum

27.01 points minimum

1 point minimum

0

Rubric Title: IT484 Unit 4 Assignment Rubric

Assignment Criteria

Level III

Level II

Level I

Not Present

Criteria 1

Points: 30

Points: 25.5

Points: 18

Not Present

Criteria 1: The Role of Cybersecurity Policies in Operations Security and Risk Assessment

In 750 words or more answers the following:

· What are the major considerations of operational security policies?

· Creates two example security policies regarding risk assessment.

In 500–750 word answers the following:

· What are the major considerations of operational security policies?

· Creates two example security policies regarding risk assessment.

In less than 500 words answers the following:

· Evaluates the different types of access controls and the roles they play in a “defense-in-depth” strategy with examples.

Does not meet any criteria.

Collepals.com Plagiarism Free Papers

Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.

Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS

Why Hire Collepals.com writers to do your paper?

Quality- We are experienced and have access to ample research materials.

We write plagiarism Free Content

Confidential- We never share or sell your personal information to third parties.

Support-Chat with us today! We are always waiting to answer all your questions.

Part I: Decisions for Quarter Three. Prior to beginning work on the Decisions for Quarter Three, carefully review the content found in the Suggestions for Quarter 3? pop-up sc Per the text, when patients cannot receive needed medical care, nursing services, or rehabilitation therapies in a community-based setting, they are typically admitted to a lo

Related Posts

computer science

Instructions ?Instructions: HYPOTHESIS AND RESEARCH DESIGN: Hypothesis: Since your hypotheses may serve as your research questions (what you plan to measure/examine)

computer science

Research Paper Instructions Based on the research question assignment in Week 2, write a research paper on your approved topic.?The paper should be?between 10-12?pages

computer science

Herb’s Concoction and Martha’s Dilemma: The Case of the Deadly Fertilizer Martha Wang worked in the Consumer Affairs Department of a company cal

Why Choose Us

Best Essay Writing Services- Get Quality Homework Essay Paper at Discounted Prices

At the risk of sounding immodest, we must point out that we have an elite team of writers. Ours isn’t a collection of individuals who are good at searching for information on the Internet and then conveniently re-writing the information obtained to barely beat Plagiarism Software. Who can’t do that?

Our writers have strong academic backgrounds with regards to their areas of writing. A paper on History will only be handled by a writer who is trained in that field. A paper on health care can only be dealt with by a writer qualified on matters health care. Thesis papers will only be handled by Masters’ Degree holders while Dissertations will strictly be handled by PhD holders. With such a system, you needn’t worry about the quality of work. Quality isn’t just an option, it is the only option. We don’t just employ writers, we hire professionals.

We have writers spread into all fields including but not limited to Philosophy, Economics, Business, Medicine, Nursing, Education, Technology, Tourism and Travels, Leadership, History, Poverty, Marketing, Climate Change, Social Justice, Chemistry, Mathematics, Literature, Accounting and Political Science.

Our writers are also well trained to follow client instructions as well adhere to various writing conventional writing structures as per the demand of specific articles.

They are also well versed with citation styles such as APA, MLA, Chicago, Harvard, and Oxford which come handy during the preparation of academic papers.

They also have unrivalled skill in writing language be it UK English or USA English considering that they are native English speakers. You also needn’t worry about logical flow of thought, sentence structure as well as proper use of phrases.

Our writers are also not the kind to decorate articles with unnecessary filler words. We respect your money and most importantly your trust in us. In writing, we will be precise and to the point and fill the paper with content as opposed to words aimed at beating the word count.

Our shift-system also ensures that you get fresh writers each time you send a job. This helps overcome occupational hazards brought about by fatigue. Hence, quality will consistently be at the top.

From our writers, you expect; good quality work, friendly service, timely deliveries, and adherence to client’s demands and specifications.

Once you’ve submitted your writing requests, you can go take a stroll while waiting for our all-star team of writers and editors to submit top quality work.

How Our Website Works

Get an Essay from Us

College Essays is the biggest affiliate and testbank for WriteDen. We hire writers from all over the world with an aim to give the best essays to our clients.

Our writers will help you write all your homework. They will write your papers from scratch. We also have a team of editors who read each paper from our writers just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE.

Step 1
To make an Order you only need to click ORDER NOW and we will direct you to our Order Page. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline. Deadline range from 6 hours to 30 days.

Step 2
Once done with writing your paper we will upload it to your account on our website and also forward a copy to your email.

Step 3
Upon receiving your paper, review it and if any changes are needed contact us immediately. We offer unlimited revisions at no extra cost.

Is it Safe to use our services?
We never resell papers on this site. Meaning after your purchase you will get an original copy of your assignment and you have all the rights to use the paper.

Pricing and Discounts
Our price ranges from $8-$14 per page. If you are short of Budget, contact our Live Support for a Discount Code. All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.
Please note we do not have prewritten answers. We need some time to prepare a perfect essay for you.

Recent Posts

  • Research Report: Introduction and Literature Review Assignment
  • Week 1 – Assignment: Topic/Thesis/Table of Contents
  • Week 1- Discussion: Choosing Your Thesis Research Topic
  • In this task, you will address a business scenario for a company that is wanting to become a more emotionally and culturally intelligent organization. You will be aske
  • B. ?Apply either the research of Peter Salovey and John D. Mayer or Daniel Goleman to explain two ways you can improve your intrapersonal areas of opportunity, self-aw
College Pal

All Rights Reserved Terms and Conditions
College pals.com Privacy Policy 2010-2018