Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Imagine you are the information systems security officer at your company and are tasked with creating a cybersecurity threat awareness training. You must create an

image text in transcribed
Imagine you are the information systems security officer at your company and are tasked with creating a cybersecurity threat awareness training. You must create an infographic or job aid for the company's intranet and a brief presentation for the company's stakeholders, including executives, managers, and staff. Refer to the Linkedin course "PowerPoint: Creating an Infographic" by Heather Ackmann, located in this week's Learning Activities folder, for guidance on creating infographics. Create a 1-page infographic or job aid of the cyber domain using the OSI model. Identify 5 to 7 threats to the cyber domain, including at least 1 threat for each of the layers in your infographic. Create a 4-to 6-slide presentation in which you: - Discuss the challenges of securing each layer of the cyber domain in the company's cyber threat awareness training. - Select 3 threats from your infographic or job aid. - Identify 2 challenges from the threats you identified. Imagine you are the information systems security officer at your company and are tasked with creating a cybersecurity threat awareness training. You must create an infographic or job aid for the company's intranet and a brief presentation for the company's stakeholders, including executives, managers, and staff. Refer to the Linkedin course "PowerPoint: Creating an Infographic" by Heather Ackmann, located in this week's Learning Activities folder, for guidance on creating infographics. Create a 1-page infographic or job aid of the cyber domain using the OSI model. Identify 5 to 7 threats to the cyber domain, including at least 1 threat for each of the layers in your infographic. Create a 4-to 6-slide presentation in which you: - Discuss the challenges of securing each layer of the cyber domain in the company's cyber threat awareness training. - Select 3 threats from your infographic or job aid. - Identify 2 challenges from the threats you identified

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Machine Learning And Knowledge Discovery In Databases European Conference Ecml Pkdd 2016 Riva Del Garda Italy September 19 23 2016 Proceedings Part 3 Lnai 9853

Authors: Bettina Berendt ,Bjorn Bringmann ,Elisa Fromont ,Gemma Garriga ,Pauli Miettinen ,Nikolaj Tatti ,Volker Tresp

1st Edition

3319461303, 978-3319461304

Students also viewed these Databases questions