For Milestone Three, you will prepare and submit a three-slide presentation explaining information assurance needs includingrisks associated with non-adherence to information assurance processes, and countermeasures to mitigate risks. You will also prepare two one-page tutorials. The first tutorial is for setting the company website as the homepage and the second for enabling and disabling cookies. Requirements of Submission: The slide presentation should consist of three slides using Microsoft PowerPoint. Written components of project must follow these formatting guidelines when applicable: double spacing, 12-point Times New Roman font, and one-inch margins. The tutorials should be one page in length. Instructor Feedback : Students can find their feedback in the Grade Center. Critical Elements Exemplary Proficient Needs Improvement Not Evident Value Information Assurance – Access Meets “Proficient“ criteria and provides specific examples to substantiate description (18-20) Provides a slide with a description of information assurance (16-17) Provides a slide describing information assurance; however, it is not accurate or lacks important detail (14-15) Does not provide a slide describing information assurance (0-13) 20 Information Assurance – Risks Meets “Proficient“ criteria and provides specific examples to illustrate risks (18-20) Provides a slide explaining the risks associated with non-adherence to information security processes (16-17) Provides a slide explaining the risks associated with non-adherence to information security processes; however, description lacks clarity or is not accurate (14-15) Does not provide a slide describing the risks associated with non-adherence to information security processes (0-13) 20 Information Assurance – Countermeasures Meets “Proficient“ criteria and uses specific examples to support countermeasure use (18-20) Provides a slide describing countermeasures to mitigate information security risks (16-17) Provides a slide describing countermeasures to mitigate information security risks; however, description is limited or is not accurate (14-15) Does not provide a slide describing the risks associated with non-adherence to information security processes (0-13) 20 Instructions: Set Homepage Meets “Proficient“ criteria, and the tutorial indicates the optimal settings for use and function (18-20) Provides a tutorial for setting the company website as the homepage for newly updated computers (16-17) Provides a tutorial, but it is missing significant information (14-15) Does not provide a tutorial for setting company website as the homepage for newly updated computers (0-13) 20 Instructions: Cookies Meets “Proficient“ criteria, and the tutorial indicates key considerations for enabling and disabling cookies (18-20) Provides a tutorial for enabling and disabling cookies (16-17) Provides a tutorial for enabling and disabling cookies, but instructions lack detail or are inaccurate (14-15) Does not provide a tutorial for enabling and disabling cookies (0-13) 20 Earned Total Comments: 100%

Looking for solution of this Assignment?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay