Presentation Plan
.docx
keyboard_arrow_up
School
Western Governors University *
*We aren’t endorsed by this school
Course
C464
Subject
Information Systems
Date
May 9, 2024
Type
docx
Pages
4
Uploaded by insired on coursehero.com
C464 Task 1 Presentation Plan – TEMPLATE
Be sure to delete this information here in red as well as the instructions under the Requirement’s column to ensure your document is clean and easy to read. For an example, please refer to page 71 of the learning resource.
Requirements
Outline
Intended Audience
Identify your audience for the speech. Be as specific as possible (include demographics if applicable). Cyber security researchers
Importance Statement
Explain why your topic is important for the target audience.
Behavioral biometrics is a relatively new concept yet to be widely implemented in the security field.
INTRODUCTION
Requirements
Outline
Attention-getting Opening
Grab your audience’s attention with an interesting
statistic, fact, compelling question, or story. The threats of the online world have evolved. It is time for our security practices to evolve too.
Thesis Statement
Identify claim and main points in one sentence. We recommend this format: Research suggests that (major claim)
because (main point 1) and
(main point 2).
Behavior models must be implemented in current security applications for continuous authentication
because current methods have been proven to be susceptible to attacks, and because behavioral biometrics will increase security without being a burden on the user.
Preview of Main Points
1. List the first main point from the thesis
2. List the second main point from the thesis
*Use highlights for guidance, feel free to remove after
1.
Current methods have been proven to be susceptible to attacks by high profile cases.
2.
Behavioral modeling will increase security without interfering with the user experience.
BODY
Requirements
Outline
Main Point #1
One subpoint -Current methods have been proven to be susceptible to attacks by high profile cases.
Crypto.com hack bypassed two-factor authentication (Pape, C 2022)
SMS based two-factor is susceptible to MITM attacks.
MUST have supporting evidence (shown via an in-text citation).
Please refer to the example for how to do in-text citations.
Add as many subpoints as needed. We recommend three. (Jover 2020)
Password habits. . (Sulleyman, 2017)
Main Point #2
One subpoint MUST have supporting evidence (shown via an in-text citation).
Please refer to the example for how to do in-text citations.
Add as many subpoints as needed. We recommend three.
Mark your plan to show your visual -Behavioral modeling will increase security without interfering with the user experience.
Behavioral modeling tracks keystrokes, mouse movements, and other session data
Metrics are compared to known behavior model for the user by a ML algorithm
User’s identity is continuously authenticated (Jawed, H et al 2018).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help