6 min presentation with speaker notes
MIS301_Assessment_2 Part C Brief_Case Study Report_Presentation_Module 6.1 Page 1 of 7 Context: The management of the case study business received your report from Part A and Part B, and decided to tighten up cybersecurity. The management requested you (as a group) to implement all the recommendations you made in Part B and stop hackers from gaining access to critical information by any means necessary. However, you are concerned about that request and you were not sure whether the management understands that there is a range of ethically significant issues associated with cybersecurity practices. You decided to record a 6-minute video to explore one ethical challenge in cybersecurity. In the video, you will speak to the management as a cybersecurity specialist. Keep in mind that the business management do not have a technical background. ASSESSMENT 2 PART C BRIEF Subject Code and Title MIS301 Cybersecurity Assessment Case Study Report and Presentation: Presentation Individual/Group Group Length Part C: 6 minute presentation Learning Outcomes The Subject Learning Outcomes demonstrated by successful completion of the task below include: a) Investigate and analyse the tenets of cybersecurity. b) Identify and communicate a range of threats and vulnerabilities to informational assets. c) Recommend and justify robust solutions to identified threats and vulnerabilities to cybersecurity. d) Develop own professional practice and ethical standards around security issues and implementation of solutions. Submission Due by 11:55pm AEST Sunday of Module 6.1 Weighting 15% Total Marks 100 marks MIS301_Assessment_2 Part C Brief_Case Study Report_Presentation_Module 6.1 Page 2 of 7 Instructions: 1. Review your Assessment 2 Part B, focusing on the recommendations. 2. Create a 6-minute video presentation using PowerPoint (or a similar platform) and advise management on the following two topics: a. Discuss how other values (e.g. privacy) may be in tension with the value of cybersecurity. Give two specific examples in cybersecurity practice where management needs to strike an ethically acceptable balance between the value of cybersecurity and other values. b. What will you suggest the business should do to respond to requests from law- enforcement agencies to weaken their encryption practices or decrypt a specific user’s account? 3. Requirements for the video presentation: a. All group members must present in the video presentation. b. For authentication purposes, all group members must show their face in the video presentation for at least 1 minute each. c. Your presentation must be in video format (mp4, MOV, etc.) for uploading onto Blackboard. There is a lot of free software that can be used to create a group presentation video, e.g. Zoom and Microsoft Teams. You may create a Zoom meeting for the presentation among your group members and record the meeting. 4. Before submitting your assessment, you should check it against the assessment criteria and the marking rubric included in this specification to ensure that you have satisfactorily addressed all the criteria that will be used to mark your submission. 5. Download the Group Participation Matrix from Assessment 2 Part C section. Use this document to review your group members performance in this assessment and to specify their specific contribution made to the group work. This Group Participation Matrix document needs to be submitted individually through the Assessment 2 Part C submission link. Referencing It is essential that you use appropriate APA style for citing and referencing research. Please see more information on referencing here https://library.torrens.edu.au/academicskills/apa/tool Submission Instructions Group submission 1. Each team will submit their video via the Assessment link in the main navigation menu in Blackboard. The Learning Facilitator will provide feedback via the Grade Centre in the LMS portal. Feedback can be viewed in My Grades. Detailed instructions on compressing (if necessary) and uploading video presentation is available at https://laureate- au.blackboard.com/webapps/blackboard/content/listContentEditable.jsp?content_id=_3876 29_1&course_id=_4044_1 https://library.torrens.edu.au/academicskills/apa/tool https://laureate-au.blackboard.com/webapps/blackboard/content/listContentEditable.jsp?content_id=_387629_1&course_id=_4044_1 https://laureate-au.blackboard.com/webapps/blackboard/content/listContentEditable.jsp?content_id=_387629_1&course_id=_4044_1 https://laureate-au.blackboard.com/webapps/blackboard/content/listContentEditable.jsp?content_id=_387629_1&course_id=_4044_1 MIS301_Assessment_2 Part C Brief_Case Study Report_Presentation_Module 6.1 Page 3 of 7 After uploading your video presentation, retain a copy in a safe place. Peer evaluation – Individual Submission 1. Each individual student is to submit a completed Group Participation Matrix document in the Peer Evaluation submission link. Please submit a peer review correctly, as no submission may result in zero grading for this assessment criteria. Academic Integrity Declaration We declare that except where we have referenced, the work we are submitting for this assessment task is our own work. We have read and are aware of Torrens University Australia Academic Integrity Policy and Procedure viewable online at http://www.torrens.edu.au/policies-and-forms We are aware that we need to keep a copy of all submitted material and their drafts, and we will do so accordingly. http://www.torrens.edu.au/policies-and-forms MIS301_Assessment_2 Part C Brief_Case Study Report_Presentation_Module 6.1 Page 4 of 7 Assessment Rubric Assessment attributes Fail (Unacceptable) 0-49% Pass (Functional) 50-64% Credit (Proficient) 65-74% Distinction (Advanced) 75 -84% High Distinction (Exceptional) 85-100% Knowledge and understanding Understanding of ethical standards around security issues and implementation of solutions 40% Little or no understanding of ethical standards around security issues and implementation of solutions. Key components of the assessment are not addressed. Understands the fundamentals of ethical standards around security issues and implementation of solutions. Often confuses assertion of personal opinion with information substantiated by evidence from the research/course materials. Some of the key components of the assessment are not addressed. Sound understanding of ethical standards around security issues and implementation of solutions. Supports personal opinion and information substantiated by evidence from the research/course materials. All key components of the assessment are addressed with an adequate capacity to explain and apply relevant key concepts. Very good understanding of ethical standards around security issues and implementation of solutions. Discriminates between assertion of personal opinion and information substantiated by robust evidence from the research/course materials and extended reading. All of the key components are addressed. Well demonstrated capacity to explain and apply relevant key concepts. Excellent understanding of ethical standards around security issues and implementation of solutions. Systematically and critically discriminates between assertion of personal opinion and information substantiated by robust evidence from the research/course materials and extended reading. All of the key components are addressed. Demonstrates mastery and application of key concepts. Effective communication - Clear and logical structure Difficult to understand for audience, no logical/clear structure, poor flow of ideas, Information, arguments and evidence are presented in a way that is Information, arguments and evidence are well presented, with a mostly Information, arguments and evidence are very well presented; the presentation is logical, Expertly presented — the presentation is logical, persuasive, and well supported by evidence, MIS301_Assessment_2 Part C Brief_Case Study Report_Presentation_Module 6.1 Page 5 of 7 Assessment attributes Fail (Unacceptable) 0-49% Pass (Functional) 50-64% Credit (Proficient) 65-74% Distinction (Advanced) 75 -84% High Distinction (Exceptional) 85-100% - Flow of information - Clarity and quality of verbal communication - Good use of time 30% argument lacks supporting evidence. Audience cannot follow the line of reasoning. Does not engage the audience or look at the camera. Body language inappropriate or not professional. Inaccurate information. Inadequate or excessive length. not always clear and logical. Line of reasoning is difficult to follow at times. Speech and tone not always appropriate for audience; however, not throughout the entire presentation. The presentation is of an acceptable length. clear flow of ideas and arguments. Line of reasoning is easy to follow. Uses engaging presentation techniques (e.g. posture; eye contact; gestures; volume; pitch and pace of voice) The presentation is of an acceptable length. clear and well supported by evidence. Confidently and consistently uses a range of engaging presentation techniques (e.g. posture; eye contact; gestures; volume; pitch and pace of voice). Clear and confident delivery. The presentation is of an acceptable length. demonstrating a clear flow of ideas and arguments. Engages and sustains audience’s interest in the topic. Dynamic, integrated and professional use of a wide range of engaging presentation techniques (e.g. posture; eye contact; gestures; volume; pitch and pace of voice). Clear, confident and persuasive delivery. The presentation is of an acceptable length. Teamwork 10% Does not participate