Presentation Plan

.docx

School

Western Governors University *

*We aren’t endorsed by this school

Course

C464

Subject

Information Systems

Date

May 9, 2024

Type

docx

Pages

4

Uploaded by insired on coursehero.com

C464 Task 1 Presentation Plan – TEMPLATE Be sure to delete this information here in red as well as the instructions under the Requirement’s column to ensure your document is clean and easy to read. For an example, please refer to page 71 of the learning resource. Requirements Outline Intended Audience Identify your audience for the speech. Be as specific as possible (include demographics if applicable). Cyber security researchers Importance Statement Explain why your topic is important for the target audience. Behavioral biometrics is a relatively new concept yet to be widely implemented in the security field. INTRODUCTION Requirements Outline Attention-getting Opening Grab your audience’s attention with an interesting statistic, fact, compelling question, or story. The threats of the online world have evolved. It is time for our security practices to evolve too. Thesis Statement Identify claim and main points in one sentence. We recommend this format: Research suggests that (major claim) because (main point 1) and (main point 2). Behavior models must be implemented in current security applications for continuous authentication because current methods have been proven to be susceptible to attacks, and because behavioral biometrics will increase security without being a burden on the user. Preview of Main Points 1. List the first main point from the thesis 2. List the second main point from the thesis *Use highlights for guidance, feel free to remove after 1. Current methods have been proven to be susceptible to attacks by high profile cases. 2. Behavioral modeling will increase security without interfering with the user experience. BODY Requirements Outline Main Point #1 One subpoint -Current methods have been proven to be susceptible to attacks by high profile cases. Crypto.com hack bypassed two-factor authentication (Pape, C 2022) SMS based two-factor is susceptible to MITM attacks.
MUST have supporting evidence (shown via an in-text citation). Please refer to the example for how to do in-text citations. Add as many subpoints as needed. We recommend three. (Jover 2020) Password habits. . (Sulleyman, 2017) Main Point #2 One subpoint MUST have supporting evidence (shown via an in-text citation). Please refer to the example for how to do in-text citations. Add as many subpoints as needed. We recommend three. Mark your plan to show your visual -Behavioral modeling will increase security without interfering with the user experience. Behavioral modeling tracks keystrokes, mouse movements, and other session data Metrics are compared to known behavior model for the user by a ML algorithm User’s identity is continuously authenticated (Jawed, H et al 2018).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help