Question: This INST 5 4 1 Project Guide is to help you through 3 phases of the class project. Use the template for each deliverable. Failure

This INST 541 Project Guide is to help you through 3 phases of the class project. Use the template for each deliverable. Failure to use the template will be cost your grade for each deliverable. You can just cut and past the template into a new word document you have your outline. If there are one or two things that is unknown or to be determined put TBD. You can always set up a meeting with me to discuss challenges associated with your proposal. Your project is about researching ideas related to Information Security and Cybersecurity Policy Subject can be: An existing real-world problemThe problems that a made-up company might face such as Bobs Beastly BeesEmerging threat vector that needs new policy There is lots of latitude, but you have to bring it back to policy. Ideas and potential areas of research are included in Appendix AThe INST 541 Class Project has 3 deliverables: : 1)Submit a Project Proposal (10%) Due Oct. 14 You must use the proposal format. The Proposal need to be at least 2-3 pages Your project must be approved by me to go forward. 2)Submit a Project Report (15%) Due Nov. 18 You must use a class approved project report template format. The Project Report should be at least 6-10 pages3)Final Project Presentation (10%) Due Dec. 2-9 You are expected to do a masterful pitch presentation of the issue and policy solution set using the PowerPoint template which has 12 or more slides. Option 1: You may either present in-person or online on Dec. 2 or to me via Zoom or Teams before Dec. 9. I am very flexible. It will be your responsibility to reach out to me on the scheduling. Advantage: You can provide missing content identified in questions, more feedback5% additional credit on the whole course Disadvantage: Scheduling, having to be ready for questions Option 2: You can tape your presentation Advantage: No questions, no scheduling Disadvantage: Less feedback, less presentation practice, and no fixes to missing data or slidesNo additional credit Teaming Up: You may partner with one other classmate on your project and each of you gets a 5% additional credit for the whole class for doing so. Or you may just decide to go it alone.Deliverable #1 INST 541 Project Proposal is due Oct. 14Your Project Proposal Template Starts Here Cover Page Team Name: Everyone has a team name if only one person Team Members: Project Name: Affiliation/Class: UONA /INST 541 FAL 23 Instructor Professor John Link Section 1 : Analysis 1.Subject Area 2.Problem to be addressed 3.Is there a working hypothesis on how to solve the problem or just a burning question in need of research?4.Has there been any research done on this issue before? 5.Are there any prevailing theories? 6.Implication of the problem for Information Security Policy Section 2 : Proposed Solution Set 7.Do you have a real-world and policy strategy in mind or do wish to do more research and thinking? 8.What research resources do you want to focus on?8.1If want to do primary research such as interviewing hackers, I will provide you additional materials and time9.Do you think you will present real-time in-person or Teams, or record your presentation? Your Project Proposal Template Ends Here Deliverable #2 INST 541 Project Report is Due Nov. 18Your Project Report Template Starts Here Use this template to present your project research findings and strategy. If you are not sure drop me an email. Do not put anything in italics in the project report1.Title Page: 1.1 Project Title 1.2 Team Name and Author(s)1.3 Affiliation UONA 1.4 Course 1.5 Instructor 1.6 Date 2. Overview (write last) Quick overview of the project including challenges that you needed to be overcome in developing the project. This is about the writing of the report, not implementing your ideas in the real world. 3.Background of the issue of problem 3.1 Problem to be addressed (why it is important)3.2 The causes for the problem or opportunity 3.3 Any previous research or theories around this subject? 3.4 Implication for Information Security Policy 4. Strategy 4.1 Proposed Solution/Strategy4.2 Desired Outcomes from the Solution/Strategy 4.3 Risks Associated with the Solution/Strategy5. Policy Impact 5.1 Proposed Policy Changes (There must be a policy or set of policy recommendations)5.2 Issues in implementing the Policy Changes6. Summary and Conclusions Citations: You are required to have at 4 background references cited in the text excluding tertiary sources such as Wikipedia. Presentation: Do you think you will want to present live via teams or zoom or tape your presentation? You receive a 5% class grade bonus for live presentations. There are both in-person and Teams presentations on Dec 2 up until Dec. 9. For students wishing to present live after Dec. 2, I can schedule as late at 12:00 midnight 7 days a week. Your Project Report Template Ends HereDeliverable #3 Project Presentation is due Dec. 2-9 Either in person, or via Team Zoom, or recorded video and put in Moodle. There is a 5% class credit for live presentation to me and I will accommodate extreme time zones. Slide 1 Title Page: 1.1 Project Title 1.2 Team Name and Author(s)1.3 Affiliation UONA 1.4 Course 1.5 Instructor 1.6 DateSlide 2 Problem to be addressed (why it is important)Slide 3 Background of the issue of problem (Use more than one slide if needed)Slide 4 Previous research and /or theories Slide 5 The causes for the problem Slide 6 Proposed strategy including related Policy Changes Slide 7 Desired outcomes from the strategy Slide 8 Risks associated with the strategySlide 9 Implication for information security policySlide 10 Issues in implementing the policy changes Slide 11 Summary and conclusions Slide 12 Citations. You are required to have at 4 background references (excluding tertiary sources such as Wikipedia) which are cited in the body Optional Back up Slides If want to provide additional backup information or dataAppendix A: Subject Areas for Consideration Post COVID information security Warshipping Wardriving Van Eck Freaking Intergenerational impacts on policy compliance Risks associated with new distributed workforce in the changing workplace Fileless malwareThe new work from home business culture The psychology of policy avoidance Cyber threats from and to esportsStrategies to create a user compliance cultureRansomware policy strategies Cyber Insurance Threats to blockchainElectromagnetic Pulse (EMP)Recovery strategy and policy Changes in the current attack vectors New challenges to PIIInformation security threats from Social Media Insider Threat management strategies Zero Trust

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!