Security Bid Response Proposal

Description

need to make 20 slides

Don't use plagiarized sources. Get Your Custom Assignment on
Security Bid Response Proposal
From as Little as $13/Page

Unformatted Attachment Preview

Weeks 7 Security Bid Response Proposal – Start Assignment
Submitting a file upload
File Types pptx and mp4
INSTRUCTIONS
NOTE: For this assignment, you will submit two files. One is the PowerPoint presentation .pptx file. The
other is a video of your presentation. See below for further information.
The Bid Response Proposal is presented in Week 6 but is due in Week 7. It would be advantageous to
begin working on this assignment before Week 7.
A company has published a Request For Proposal (RFP) to address its many information security
issues. You own a firm that specializes in providing information security solutions for small and
mediumsized companies.
Create a Security Bid Proposal presentation that provides a cost-effective security solution for their
problems. Your objective is to win the bid over your competition.
The company has 75 employees and is inundated with security issues. Employees use laptops and
smartphones that have remote access to office systems. Your Security Bid Proposal must provide
readyto-implement security solutions.
Here are 12 common security issues for many small businesses for you to address:
1. Equipment is disappearing (See Footnote A)
2. No building or computer room security (See Footnote A)
3. No Acceptable User Policy (AUP) (See Footnote B)
4. No malware protection and experiencing attacks daily (See Footnote A)
5. No intrusion detection and experiencing intrusions daily (See Footnote A)
6. Passwords compromised (See Footnote C)
7. There is an Internet connection but no protection and content filtering (See Footnote A)
8. Sensitive information is being copied from systems (See Footnote B)
9. No automated operating system and application patching (See Footnote A)
10. Legacy software and systems (See Footnote C)
11. No data backup (See Footnote A)
12. If a disaster should happen to the building, there are no plans to recover (See Footnote C)
FOOTNOTES:
1. Find real commercial product or services from the internet to solve EACH issue.
1. Include their cost in the final price estimate.
2. Provide a clickable URL to the actual product on the solution slide and the references slide. Do
not just point to the company home page. If I need to hunt to find the product, it does not count.
2. State the specific new policies, rules, guidelines or procedures should be instituted to solve the issue
3. To solve these issues, you can use approach (A) or (B) or both
Format: A voice-annotated PowerPoint presentation, 15-20 slides
Record yourself as you go through each slide in your presentation. Use the PowerPoint Record
function as explained in Recording a PowerPoint Presentation
(https://support.microsoft.com/en-us/office/record-a-presentation-2570dff5-f81c-40bcb404e04e95ffab33) .
I should see your PowerPoint slides with a small circle inset showing your face, as recorded by
your webcam, talking about each slide.
Do NOT embed separate audio clips on each slide.
Export as a mp4 file.
It should be 6-8 minutes long. You will lose points for being too short or too long.
Submit two separate files, the pptx and mp4
WARNING: You will lose points if you do not submit both
Download the Security Bid Proposal.pptx
and modify this template as you wish. It provides hints about how you should create your
presentation.
Change the background and add images and clipart. The more visually appealing, the better
You can create your presentation from scratch, but it should contain the same content as the
template.
CAUTION: Remember to include the following
An Overview slide that shows the audience what you intend to cover
A Summary slide that briefly describes your overall solution
A Cost Summary slide that shows the final cost plus the prices for each proposed solution.
Resources to get you started:
Lee, L. (January 20, 2020). How companies can prepare for a heightened threat environment
(https://www.microsoft.com/security/blog/2020/01/20/how-companies-prepare-heightenedthreatenvironment/) . Microsoft
Top 11 most powerful cybersecurity software tools in 2022
(https://www.softwaretestinghelp.com/cybersecurity-software-tools/) . (May 4, 2022). Software Testing
Help
Storm, M. (August 12, 2020).5 security tools to protect your small business data.
(https://blogs.cisco.com/smallbusiness/5-security-tools-to-protect-your-small-business-data) Cisco
blogs.
Building a cybersecurity strategy to protect your small business.
(https://business.comcast.com/community/browse-all/details/building-a-cybersecurity-strategytoprotect-your-small-business) (September 24, 2022) Comcast Business Community.
Best server backup software for small businesses.
(https://www.g2.com/categories/serverbackup/small-business) (September 23, 2022).
Witts, Joel. The top 11 endpoint security solutions for business.
(https://www.expertinsights.com/insights/the-top-endpoint-security-solutions-for-business/) (May 3,
2022).
A cybersecurity guide for small to medium businesses in 2022.
(https://www.vpnmentor.com/blog/the-complete-cybersecurity-guide-for-small-andmediumbusinesses/?
keyword=&geo=9007488&device=&gclid=Cj0KCQjwit_8BRCoARIsAIx3Rj5rRg72G5BHvtqxYvJ2qSrofK5
4_
SEC 205 Security Bid Proposal
Criteria
Topic
Coverage
Ratings
40 pts
Distinguished
A
Reveals a solid
understanding
of all security
issues.
All
problems had
an exemplary
solution
proposed
32 pts
Proficient B
24 pts
Satifactory C
Reveals an
adequate
understanding
of the security
issues. Most
problems, but
not all, had an
adequate
solution
proposed
Reveals a
limited
understanding
of the security
issues. Some
problems, but
not all, had an
adequate
solution
proposed
Pts
16 pts
Emerging
D
0 pts
Unsatisfactory
F
Poorly
identifies
the security
issues. Few
problems
had an
adequate
solution
proposed. .
Does not
identify of
security issues
or propose any
adequate
solutions.
40 pts
Organization
20 pts
Distinguished
A
16 pts
Proficient B
12 pts
Satifactory C
8 pts
Emerging D
The material
The
was organized
The material
was
The material
was
inadequately
organized as
a security
bid/sales
not organized as
presentation.
Few problems
had a
proposed
template was
solution. An
Overview
and/or
solution. An
Overview and/or
Summary slide
might be missing.
A cost estimate
slide might be
missing or it
might only show
the total cost but
not all of the
individual prices
material
was an excellent
as a security
security
bid/sales
marginally
organized as a
bid/sales
presentation.
security
presentation. All
Most
problems had a
problems, but
bid/sales
presentation.
proposed
not all, had a
solutions that
proposed
were easy to
solutions that
were easy to
identify. The
presentation
had an
Overview and
Summary
slide. The
presentation
had a cost
estimate slide
showing the
total cost and
individual
prices.
identify. The
presentation
had an
Overview and
Summary slide.
The
presentation
had a cost
estimate slide
showing the
total cost and
individual
prices.
Criteria
Only
some
problems had
a
proposed
solutions that
was easy to
identify. An
Overview
and/or
Summary
slide might be
missing. A cost
estimate slide
might
be
missing or it
might
only
show the total
cost but not all
of the
Ratings
individual
prices.
Summary
slide might be
missing. A cost
estimate slide
might
be
missing or it
might
only
show the total
cost but not all
of
the
individual
prices
0 pts
Unsatisfactory
F
20 pts
The material was
a security
bid/sales
presentation. The
barely followed.
Few problems
had a proposed
Pts
Writing Style
Graphics
10 pts
Distinguished
A
8 pts
Proficient
B
6 pts
Satifactory
C
There were no
spelling and
grammar errors
There were
There were
only a few
spelling and
several
spelling and
grammar
errors
grammar
errors
10 pts
Distinguished
A
Creative and
abundant use of
graphics and clip
art against a
colorful
background.
Good creativity
was shown.
4 pts
Emerging D
0 pts
Unsatisfactory F
Understanding
the presentation
was difficult
because of the
many spelling
and grammar
errors
One could not
understand the
presentation
because the
spelling and
grammar was so
poor
8 pts
Proficient B
6 pts
Satifactory C
4 pts
Emerging D
0 pts
Unsatisfactory F
Numerous
graphics and
ciip art were
used with a
background.
Moderate use
Only a few
of graphics
graphics and
and clip art.
clip art were
No
background
used. No
Some
was used or
was used or
creativity wa
shown.
s
was not
was not
No graphics or
clip art were
used.. No
background was
used or was not
visually
appealing. No
creativity was
shown.
visually
visually
appealing.
appealing.
Adequate
Little creativity
was shown.
creativity was
shown
Presentation
Criteria
background
ll
20 pts
Distinguished A
16 pts
Proficient B
Engaging and
interesting
delivery style that
conveyed all
important points
with clarity.
Well
delivered. A
important
points were
adequately
conveyed.
12 pts
Satifactory C
Adequate
delivery. Not
all points were
conveyed.
Sometimes
read from the
Ratings
8 pts
Emerging D
Marginal
0 pts
Unsatisfactory
F
10 pts
10 pts
20 pts
Did not provide
a presentation
delivery.
Presentation
was difficult to
understand or
was just
Pts
Rarely read from
the slides.
Generally
spoke about
the slides
rather than
reading from
them.
slides instead
of speaking
about them
mostly reading
from the slides
Total Points: 100
SEC 210
Principles and Practices of
Information Security
Security Bid Proposal
 Organize the presentation as a sales pitch
 You are trying to convince them to hire you to
solve their security problems
 12 problems are identified. You should offer a
solution for each
 You should recommend product purchases
 Provide a separate cost estimate for solving
each problem that is based on research and
not just made up
 The presentation should start with an
Overview
 Then each problem should be discussed along
with your recommended solution
 The presentation should end with a Summary
and what you will charge the company to solve
their security problem
 Search the internet for a commercial product(s)
that you will use to solve this problem
 Include a clickable URL to the product(s) on the
slide
 Search the internet for a commercial product(s)
that you will use to solve this problem
 Include a clickable URL to the product(s) on the
slide
 Make at least 6 specific policy rules
 DO NOT just say “we will help you to create…”
 Search the internet for a commercial product(s)
that you will use to solve this problem
 Include a clickable URL to the product(s) on the
slide
 Search the internet for a commercial product(s)
that you will use to solve this problem
 Include a clickable URL to the product(s) on the
slide
 Make at least 3 specific password management
policy rules
 You might also find a commercial product(s) that
solve this problem
 If you do, include a clickable URL to the
product(s) on the slide
 Search the internet for a commercial product(s)
that you will use to solve this problem
 Include a clickable URL to the product(s) on the
slide
 Propose changes to the company data
protection policies
 You might also find a commercial product(s) that
solve this problem
 If you do, include a clickable URL to the
product(s) on the slide
 Search the internet for a commercial product(s)
that you will use to solve this problem
 Include a clickable URL to the product(s) on the
slide
 Propose specific steps to take to lower the risk
 You might also find a commercial product(s) or
services that solve this problem
 If you do, include a clickable URL to the
product(s) on the slide
 Search the internet for a commercial product(s)
that you will use to solve this problem
 Include a clickable URL to the product(s) on the
slide
 Search the internet for a commercial product(s)
or service that might solve this problem
 Include a clickable URL to the product(s) on the
slide
 Summarize your findings
 Summarize your recommendations
 Give them a price for your services
 Give them a total estimate of what costs the
company will incur to solve their security
problems
 Enumerate the hardware and software they will
need to purchase and estimate their cost
 Provide an estimate of any other costs they
might incur such as new physical security
measures and training.
 List any URLs for the products or services that
you recommend in your slides
 They must be URLs to actual products or
services
 Slides should be visually appealing
 Double-check your spelling and grammar
 Show what you have learned from the course
 DO NOT just summarize course topics
 You should provide a solution for EVERY
security problem
 You are a salesperson trying to win the bid
 After your presentation, will I know
▪ What problems you are solving
▪ What solutions you are recommending
▪ How much each solution will cost
▪ How much the entire solution will cost
 Be as engaging as possible
 Talk about the slides, don’t just read from them
 DO NOT just summarize course topics
QUESTION: Would you hire yourself after
listening/seeing to your presentation?

Purchase answer to see full
attachment