Question: This INST 5 4 1 Project Guide is to help you through 3 phases of the class project. Use the template for each deliverable. Failure
This INST Project Guide is to help you through phases of the class project. Use the template for each deliverable. Failure to use the template will be cost your grade for each deliverable. You can just cut and past the template into a new word document you have your outline. If there are one or two things that is unknown or to be determined put TBD You can always set up a meeting with me to discuss challenges associated with your proposal. Your project is about researching ideas related to Information Security and Cybersecurity Policy Subject can be: An existing realworld problemThe problems that a madeup company might face such as Bobs Beastly BeesEmerging threat vector that needs new policy There is lots of latitude, but you have to bring it back to policy. Ideas and potential areas of research are included in Appendix AThe INST Class Project has deliverables: : Submit a Project Proposal Due Oct. You must use the proposal format. The Proposal need to be at least pages Your project must be approved by me to go forward. Submit a Project Report Due Nov. You must use a class approved project report template format. The Project Report should be at least pagesFinal Project Presentation Due Dec. You are expected to do a masterful pitch presentation of the issue and policy solution set using the PowerPoint template which has or more slides. Option : You may either present inperson or online on Dec. or to me via Zoom or Teams before Dec. I am very flexible. It will be your responsibility to reach out to me on the scheduling. Advantage: You can provide missing content identified in questions, more feedback additional credit on the whole course Disadvantage: Scheduling, having to be ready for questions Option : You can tape your presentation Advantage: No questions, no scheduling Disadvantage: Less feedback, less presentation practice, and no fixes to missing data or slidesNo additional credit Teaming Up: You may partner with one other classmate on your project and each of you gets a additional credit for the whole class for doing so Or you may just decide to go it alone.Deliverable # INST Project Proposal is due Oct. Your Project Proposal Template Starts Here Cover Page Team Name: Everyone has a team name if only one person Team Members: Project Name: AffiliationClass: UONA INST FAL Instructor Professor John Link Section : Analysis Subject Area Problem to be addressed Is there a working hypothesis on how to solve the problem or just a burning question in need of research?Has there been any research done on this issue before? Are there any prevailing theories? Implication of the problem for Information Security Policy Section : Proposed Solution Set Do you have a realworld and policy strategy in mind or do wish to do more research and thinking? What research resources do you want to focus onIf want to do primary research such as interviewing hackers, I will provide you additional materials and timeDo you think you will present realtime inperson or Teams, or record your presentation? Your Project Proposal Template Ends Here Deliverable # INST Project Report is Due Nov. Your Project Report Template Starts Here Use this template to present your project research findings and strategy. If you are not sure drop me an email. Do not put anything in italics in the project reportTitle Page: Project Title Team Name and Authors Affiliation UONA Course Instructor Date Overview write last Quick overview of the project including challenges that you needed to be overcome in developing the project. This is about the writing of the report, not implementing your ideas in the real world. Background of the issue of problem Problem to be addressed why it is important The causes for the problem or opportunity Any previous research or theories around this subject? Implication for Information Security Policy Strategy Proposed SolutionStrategy Desired Outcomes from the SolutionStrategy Risks Associated with the SolutionStrategy Policy Impact Proposed Policy Changes There must be a policy or set of policy recommendations Issues in implementing the Policy Changes Summary and Conclusions Citations: You are required to have at background references cited in the text excluding tertiary sources such as Wikipedia. Presentation: Do you think you will want to present live via teams or zoom or tape your presentation? You receive a class grade bonus for live presentations. There are both inperson and Teams presentations on Dec up until Dec. For students wishing to present live after Dec. I can schedule as late at : midnight days a week. Your Project Report Template Ends HereDeliverable # Project Presentation is due Dec. Either in person, or via Team Zoom, or recorded video and put in Moodle. There is a class credit for live presentation to me and I will accommodate extreme time zones. Slide Title Page: Project Title Team Name and Authors Affiliation UONA Course Instructor DateSlide Problem to be addressed why it is importantSlide Background of the issue of problem Use more than one slide if neededSlide Previous research and or theories Slide The causes for the problem Slide Proposed strategy including related Policy Changes Slide Desired outcomes from the strategy Slide Risks associated with the strategySlide Implication for information security policySlide Issues in implementing the policy changes Slide Summary and conclusions Slide Citations. You are required to have at background references excluding tertiary sources such as Wikipedia which are cited in the body Optional Back up Slides If want to provide additional backup information or dataAppendix A: Subject Areas for Consideration Post COVID information security Warshipping Wardriving Van Eck Freaking Intergenerational impacts on policy compliance Risks associated with new distributed workforce in the changing workplace Fileless malwareThe new work from home business culture The psychology of policy avoidance Cyber threats from and to esportsStrategies to create a user compliance cultureRansomware policy strategies Cyber Insurance Threats to blockchainElectromagnetic Pulse EMPRecovery strategy and policy Changes in the current attack vectors New challenges to PIIInformation security threats from Social Media Insider Threat management strategies Zero Trust
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
