{"id":3195,"date":"2017-04-26T21:56:22","date_gmt":"2017-04-27T01:56:22","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5902sum119\/?page_id=3195"},"modified":"2017-04-28T09:38:22","modified_gmt":"2017-04-28T13:38:22","slug":"research-project","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/mis5902sum119\/research-project\/","title":{"rendered":"Research Project"},"content":{"rendered":"<p>Research Analyses, Presentation and Executive Report<\/p>\n<hr \/>\n<p>Important Dates:<\/p>\n<p>May 10th-\u00a0Students are expected to form a group of 3-4 members and give the\u00a0team member names.<br \/>\nMay 27th- \u00a0Submit the Topic of your group Research Project- \u00a0Name of the Organisation and \u00a0breach identified.<br \/>\nJune 10th- Submit draft\/outline for the research project.<\/p>\n<p>Learning Objectives:<\/p>\n<ul>\n<li>To related the IT risks and controls framework you\u2018ve learned to real life cybersecurity breaches when adequate controls are not implemented to protect companies.<\/li>\n<li>To take the lessons learned from the research to apply to your current or future jobs.<\/li>\n<li>To learn how to deliver presentations to corporate Executives<\/li>\n<\/ul>\n<p>Students will paired up in groups to perform in-depth research analysis of current\u201d Information Technology Security Breach\u201d topics. Present the results of their research during weeks noted in the \u201cSchedule Summary\u201d below and turn in an executive report of the research analysis. Students will submit a proposal for the topics during week two of the semester and provide periodic updates to their research analysis every 3 week subsequent. Final presentation will comprise of a PowerPoint presentation and an executive report not to exceed 4 pages following the format outlined below. The research analysis, presentation and executive report will be grated using the criteria and guideline noted in the class rubric. The research scenario is that the Executives wants to know how to fix the IT Security breach to ensure that they have appropriate governance and controls in place to prevent IT security incidents in the future. Researched topic must be approved by the professor prior to execution.<\/p>\n<p>Research Presentation Format:<br \/>\n1. Executive Summary must describe:<br \/>\na) What was the event or cyber breach?<br \/>\nb) How did it happen?<br \/>\nc) When did it happen?<br \/>\nd) Who was involved?<br \/>\ne) Why did it happen?<br \/>\nf) What was the impact and risks?<br \/>\ng) What is the loss exposure (money, reputation, market share, customer data, etc.)?<br \/>\nh) What did the company do to remediate the situation?<br \/>\ni) How much did it cost the company to remedial the event?<br \/>\n2. Based on what you\u2019ve learned about Information Security, what are your conclusions and recommendations to the company to prevent future breach?<br \/>\n3. Be creative in the presentation and use whatever is necessary (preso, video, demo, simulate, etc) to sale your point and convince management to do what you recommend.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Research Analyses, Presentation and Executive Report Important Dates: May 10th-\u00a0Students are expected to form a group of 3-4 members and give the\u00a0team member names. May 27th- \u00a0Submit the Topic of your group Research Project- \u00a0Name of the Organisation and \u00a0breach identified. June 10th- Submit draft\/outline for the research project. Learning Objectives: To related the IT [&hellip;]<\/p>\n","protected":false},"author":14218,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"class_list":{"0":"post-3195","1":"page","2":"type-page","3":"status-publish","5":"entry"},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P8FLQU-Px","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5902sum119\/wp-json\/wp\/v2\/pages\/3195","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5902sum119\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5902sum119\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5902sum119\/wp-json\/wp\/v2\/users\/14218"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5902sum119\/wp-json\/wp\/v2\/comments?post=3195"}],"version-history":[{"count":5,"href":"https:\/\/community.mis.temple.edu\/mis5902sum119\/wp-json\/wp\/v2\/pages\/3195\/revisions"}],"predecessor-version":[{"id":3244,"href":"https:\/\/community.mis.temple.edu\/mis5902sum119\/wp-json\/wp\/v2\/pages\/3195\/revisions\/3244"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5902sum119\/wp-json\/wp\/v2\/media?parent=3195"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}