Security Technology: Access Controls, Firewalls, VPNs, and Intrusion Detection

Words: 594
Pages: 3
Subject: Uncategorized

*This is a request for a powerpoint based off this
assignment(Included below: Week 5 Security Technology: Access Controls,
Firewalls, VPNs, and Intrusion Detection). I need an awesome powerpoint
presentation based the documents attached. All sources must be cited within the
text or mentioned within the video presentation according to APA guidelines and
must appear at the end of your essay on a separate Reference List page or on
the last page of your PowerPoint presentation.

1) 127265-Information-Security-Maintenance-docx(1)

***********************************************************************************************
Essentially it should sum up the attached assignment in the
powerpoint presentation you create. The Presentation with slides and notes has
to be in between 4-5 minutes? So there has to be enough slides and Speaker notes
to allow for that. The example I attached and referenced below was provided in
class to base my presentation off of, it was 17 slides. I have attached a copy
as an example. Please do not re-use the slides. See below for the specifics
required to complete this effort.

Please make sure the slides are different than the speaker
notes. Here is a good guide from the
the Presentation tips attached, 3 (5)

Reduce the text on your slides to an absolute minimum. The
best slides may have no text at all. This may sound insane given the dependency
of text slides today, but the best PowerPoint slides will be virtually
meaningless with out the narration (that is you). Remember, the slides are
suppose to support/supplement the narration of the speaker, not make the
speaker superfluous. Yes, it is true that many people often say something like
this: “Sorry I missed your presentation, Steve. I hear it was great. Can you
just send me your PowerPoint slides?” Well, you could. But if they are good
slides, they may be of little use without you. (6) Do not read the text word
for word off the slide . Audiences can read, so why do presenters insist on
reading long lines of text from slides? Also, it is very difficult — if not
impossible — to read a slide and listen to someone talk at the same time. So
again, why all the text on slides these days? One reason may be that it is
convenient for the speaker when organizing the presentation to write out
his/her thoughts one bullet point at a time. But as Yale professor and visual
communications specialist, Edward Tufte points out in a September Wired
Magazine article “…convenience for the speaker can be punishing to both
content and audience.” Speakers also may be thinking that their wordy slides
will make for better handouts, a common “handout” technique. However, the
confining, horizontal orientation of a slide (one slide after another) makes
for difficult writing and reading. Which brings us to the next point below
****************************************************************************

Please use Grammarly on THE SPEAKER NOTES, to check/make
sure it flows in a presentation conversation and is not all run-on sentences.
Also it has to relate back to the assignment attached.

——————————————————————————————————————–
Please remove any tags from images, notes and power point
file so the original owner cannot be determined.
———————————————————————————————————————

Below is the original Assignment explanation that was completed. The result is
the attached docx named (127265-Information-Security-Maintenance-docx(1))

Individual Assignment Week 7 –
research paper or video option on passwords, biometrics or banking.

Please refer to our APA Manual or visit
the Purdue Owl website at: https://owl.english.purdue.edu/owl/resource/560/01/
for assistance with APA formatting and style guidelines.

The essay
option requires a minimum of 850 words not including sources. Please use
Grammarly to make sure it is not all run-on sentences and flows.

Include APA
standards for style, citations, references, and format. Be sure to include a
title page with your name and the name of the essay. Please refer to our APA
Manual or visit the Purdue Owl website at:
https://owl.english.purdue.edu/owl/resource/560/01/ for assistance with APA
formatting and style guidelines.

You must use at
least four (4) sources from professional websites or scholarly journals. Some
examples include www.sans.org, www.wired.com, www.cert.org, and www.nsa.gov.

You may not use
Wikipedia, ask.com, or other related dictionary sites.

All sources
must be cited within the text or mentioned within the video presentation
according to APA guidelines and must appear at the end of your essay on a
separate Reference List page or on the last page of your Power Point
presentation.

Option 3 & 4: Security in Banking
Industry OR EPI
Write a 2-3 page (double-spaced, 600-800
words, not including references or cover page) research review.
Analyze
the current state of technology with online banking. Discuss some of the
technologies being used such as strong authentication, visual passwords,
etc.
Give some
real-world examples of which firms are using which technologies, and if
they are successful or not.
What are
some of the security problems banks are encountering with online banking
and give some recent examples (less than 1 year old).
Do you
personally use online banking and what do you think of the security
measures that you encounter?
NOTE: If
you work in an industry that you would like to substitute instead of
banking – that is acceptable, but make sure to get the instructors
permission at least 4 days before it is due.

Let Us write for you! We offer custom paper writing services Order Now.

REVIEWS


Criminology Order #: 564575

“ This is exactly what I needed . Thank you so much.”

Joanna David.


Communications and Media Order #: 564566
"Great job, completed quicker than expected. Thank you very much!"

Peggy Smith.

Art Order #: 563708
Thanks a million to the great team.

Harrison James.


"Very efficient definitely recommend this site for help getting your assignments to help"

Hannah Seven