Project Written Report and Presentation You will choose any information security topic from our…

Project Written Report and Presentation You will choose any information security topic from our…

Project Written Report and PresentationYou will choose any information security topic from our textbook and/or discussions to write apaper and develop a PowerPoint presentation. The final report should be 10-12 pages, 12 fontsize, 1” margins, double-spaced, including figures, tables, etc. Follow the current APA formatguide for your report. Use spell check, grammar check, etc. to make sure that your report iswritten in professional form with no keyboarding or grammatical errors. No abstract is required.However, a cover page and a reference page are required. Make sure the cover page andreference page are also in current APA format.Your project paper will be assessed as follows:• Is the paper of optimal length?• Is the paper well organized?• Is the paper clear and concise?• Is the title appropriate• Are individual ideas assimilated well?• Are wording, punctuation, etc. correct?• Is the paper formatted correctly?• Is the paper well motivated?• Is an interesting problem/issue addressed?• Is knowledge of the area demonstrated?• Use of diagrams or other graphics?• Have all key references been cited?• Are conclusions valid and appropriate?You will need to develop a PowerPoint presentation to summarize your final report. Usetransition and animation in your slides. Ten to twenty slides are required to highlight yourproject.Discussion Questions and Online NetiquetteListed below are the discussion (essay) questions that we will cover. Make sure that yourresponse reflects an understanding of the situation and the reading materials. Eachanswer/response should be supported with research unless the question is opinion oriented.Answer my question by 11 p.m. on Wednesday evening (minimum 250 word response); and givea response to one classmate between 1 a.m. on Thursday and 11 p.m. on Saturday evening(minimum 125 word response to each classmate). Do not give both responses on Wednesday.Information Systems Security Page 9Your class participation will be evaluated on the following criteria:• Discussion contributions reflect thorough preparation.• Ideas offered are usually substantive and provide good insight and sometimes directionfor the class.• Class comments and demeanor support an open and encouraging class environment.• Arguments are usually well supported and often persuasive.• Comments usually help others improve their thinking.• Students are required to post one original response for each discussion question, as wellas a response to one classmate. Original responses should not be a word for wordrehashing of what is stated in the readings, but rather an integration of the concepts andadditional insights, either from real world experience or additional sources. It should be a250 word response to my question each week by 11 p.m. on Wednesday evening. Yourprimary posting may end with a tag-line or a related question of your own. Between 1a.m. on Thursday and 11 p.m. on Saturday, you should have done your secondaryposting. Your secondary posting is a response to one classmate’s post. Eachanswer/response should be supported with research unless the question is opinionoriented. Responses to classmates should not be “I agree” or “I like the way you statedthat.” These responses should again be insightful, offering an opinion or facts based onyour research and experiences. The response to one classmate should be a minimum of125 words. See APA criteria for citing resources.Week 1 Discussion QuestionYour boss mentions that recently a number of employees have received calls from individualswho didn’t identify themselves and asked a lot of questions about the company and its computerinfrastructure. At first, he thought this was just a computer vendor who was trying to sell yourcompany some new product, but no vendor has approached the company. He also says severalstrange e-mails requesting personal information have been sent to employees, and quite a fewpeople have been seen searching your company’s trash dumpsters for recyclable containers.Your boss asks what you think about all of these strange incidents. Respond and be sure toprovide a recommendation on what should be done about the various incidents.Week 2 Discussion QuestionPerform a search on the Web for articles and stories about social engineering attacks or reversesocial engineering attacks. Find an attack that was successful and describe how it could havebeen prevented.Week 3 Discussion QuestionDiscuss why your company or organization needs more user education about security.Week 4 Discussion QuestionDiscuss why sensitive information should not be sent over the Wireless Application Protocol.Week 5 Discussion QuestionDescribe the best practice to employ to mitigate malware effects on a machine.Information Systems Security Page 10Week 6 Discussion QuestionMuch has been made of the new Web 2.0 phenomenon, including social networking sites anduser-created mash-ups. How does Web 2.0 change security for the Internet?Week 7 Discussion QuestionDescribe and discuss at least two backup strategies.Week 8 Discussion QuestionDiscuss one of the most important things you will take from this course. You do not have todocument your sources for this question. It is an opinion questionInformation Systems Security Page 11BOOKS RECOMMENDED BY OUR TEXTBOOK AUTHORSComputer Forensics: A Beginner’s Guide. McGraw-Hill ISBN: 978-0-07-174245-0.Security Metrics: A Beginner’s Guide. McGraw-Hill ISBN: 978-0-07-174400-3.Web Application Security: A Beginner’s Guide. McGraw-Hill ISBN 978-0-07-177616-5.Wireless Network Security: A Beginner’s Guide. McGraw-Hill ISBN 978-0-07-176094-2.