Discussion Cyber Security and Risk Management
Cyber Security and Risk Management
Read Four (4) academically reviewed articles on Cyber Security and Risk Management and complete the following activities:
(Wikipedia articles will not be accepted. Professor may check originality of all posts. Avoid copy-and-paste.
1. Summarize all four (4) articles in 300 words or more. Please use your own words. No copy-and-paste
2. Base on your article review and the assigned reading, discuss the relationship between cybersecurity and risk management.
3. As an IT manager, discuss how you will use the concepts discussed in the four articles in the management of IT risks within your company.
Kindly see the attached for more detail.
Directions for Discussion Questions
Students will respond to the Discussion Question in full APA format
Discussion initial post 300 words is due by aforementioned dates and times
If your posts is less than the minimum word count, points will be deducted from your grade.
•Provide appropriate APA in-text citations and references.
Coping and pasting an article or copying the information and changing a word or two is not a significant post. If you do this, you will receive a 0 for the assignment—no questions asked.
The format should include an introductory paragraph which introduces the topic (12-15 lines), the body which is usually 2-3 paragraphs (12-15 lines each paragraph) and a summary paragraph (12-15 lines) which restates the main points.
Absolutely no Wikipedia, Blogs, Internet Articles, Homework Help, Books or other Chron/Investopedia etc. Journal Articles sourced from the Campbellsville University Library should be your research source.
For APA formatting use APA Manual or www.purdueowl.com
Cyber Security and Risk Management
Read Four (4) academically reviewed articles on Cyber Security and Risk Management and complete the following activities:
(Wikipedia articles will not be accepted. Professor may check originality of all posts. Avoid copy-and-paste.
1. Summarize all four (4) articles in 300 words or more. Please use your own words. No copy-and-paste
2. Base on your article review and the assigned reading, discuss the relationship between cyber security and risk management.
3. As an IT manager, discuss how you will use the concepts discussed in the four articles in the management of IT risks within your company.
(Students must use academically reviewed articles only). Wikipedia and other internet articles will not be accepted. Professor will check originality of all posts with Turnitin plagiarism checker).
Use full APA throughout (use in-text citations and a APA reference list).
Read and respond to at least two (2) of your classmates’ posts 150 words minimum . In your response to your classmates, consider comparing your articles to those of your classmates. Research from academic articles must be included in your responses to classmates post.
Below are additional suggestions on how to respond to your classmates’ discussions:
· Ask a probing question, substantiated with additional background information, evidence or research.
· Share an insight from having read your colleagues’ postings, synthesizing the information to provide new perspectives.
· Offer and support an alternative perspective using readings from the classroom or from your own research.
· Validate an idea with your own experience and additional research.
· Make a suggestion based on additional evidence drawn from readings or after synthesizing multiple postings.
· Expand on your colleagues’ postings by providing additional insights or contrasting perspectives based on readings and evidence.