Please see the attacheddocuments for more detail instructions on what’s need for these assignments. I need both assignments completed WK1-1 & WK1-2. Please take note of instructions in WK1-2 document as it’s a power pointpresentation but will need to have Speaker Notes as well.wk1_1_tim_7030.docxwk1_2_tim_7030.docxUnformatted Attachment Preview***PLEASE ENSURE ALL REFERENCES ARE SCHOLARLY RESOURCES***InstructionsThreat motivation, threat capabilities, ease of exploitation, and existing countermeasures areall considerations in determining the likelihood of a threat occurrence. Determining anumerical value to assess the likelihood of a threat happening is difficult. One of the primaryapproaches to risk calculation is the quantitative approach. The formulas and metrics used inthe calculation of risk analysis using quantitative analysis involve single loss expectancy(SLE), annualized rate of occurrence (ARO), annualized loss expectancy (ALE), total cost ofownership (TCO), return on investment (ROI), and cost/benefit analysis (CBA).Using an organization with which you are familiar and including real-world examples for thatorganization, prepare a short paper that explains the relationship between SLE, ARO, andALE in determining risk and the impact these items will have on your organization. Structureyour response as a professional position paper and NOT a scholarly or academic paper.Avoid explaining academic or theoretical concepts without relating them specifically toyour organization and how they impact your organization.Length: 1-2 pages not including titles and reference pages.References: Support your paper with a minimum of 4 scholarly resourcesYour paper should demonstrate thoughtful consideration of the ideas and concepts presentedin the course and provide new thoughts and insights relating directly to this topic. Yourresponse should reflect scholarly writing and current APA standards.***PLEASE ENSURE ALL REFERENCES ARE SCHOLARLY RESOURCES******PLEASE ENSURE ALL REFERENCES ARE SCHOLARLY RESOURCES***InstructionsLogical attacks abuse the functionality of a program. Logical attacks can be accomplishedthrough denial of service, queue jumping, distributed denial of service attacks, and IPspoofing. Combating logical attacks requires a new set of prevention and detectiontechniques.126.96.36.199.188.8.131.52.9.Imagine that you are the chief information security officer (CISO) for an organization (it mayhelp to select a specific organization with which you are familiar). You have been asked todevelop a presentation for upper-level management on the key techniques to mitigate logicalattacks against computers and computer networks.For this task, you will develop a PowerPoint presentation on how the following topics canhelp mitigate logical attacks:Establish and maintain an information security management system (ISMS)Monitor and review the ISMSTesting of solutionsMonitor IT infrastructureDevelop and implement a business continuity responseProtect against malwareManage network and connectivity securityMonitor the infrastructure for security-related eventsEffect of the influence of the organizational structures enabler (information security manager,heads of IT operations, service manager, chief security architect)Incorporate appropriate animations, transitions, and graphics as well as speaker notes for eachslide. The speaker notes may be comprised of brief paragraphs or bulleted lists.Support your presentation with at least 12 scholarly resources. In addition to thesespecified resources, other appropriate scholarly resources may be included.Keep your audience in mind. Remember you are not preparing this for an academicaudience. Your audience will not care about theoretical or conceptual issues in riskmanagement. They will only care about specific issues, strategies, and scenarios that arerelevant to their organization.Length: 12-15 slides (with a separate reference slide)Notes Length: 200-350 words for each slideBe sure to include citations for quotations and paraphrases with references in APA format andstyle where appropriate. Save the file as PPT.***PLEASE ENSURE ALL REFERENCES ARE SCHOLARLY RESOURCES***…Purchase answer to see fullattachment.
Other samples, services and questions:
When you use PaperHelp, you save one valuable — TIME
You can spend it for more important things than paper writing.