[Solved] CSIA 350 6381 Cybersecurity in Business and Industry (2172)

$25

File Name: CSIA_350_6381_Cybersecurity_in_Business_and_Industry_(2172).zip
File Size: 555.78 KB

SKU: [Solved] CSIA 350 6381 Cybersecurity in Business and Industry (2172) Category: Tag:
5/5 - (1 vote)

For this paper, you will research and construct a corporate profile for a publicly-traded company which operates in cyberspace and therefore has a need for cybersecurity products and services. A list of approved companies appears at the end of this assignment description. If you wish to use a company not on the approved list you must first obtain the approval of your instructor.

Research

  1. Review the companys website to learn about the products and services which it sells.
  2. Retrieve and review the Hoovers profile for the company. The company profile web pages are interactive and have expanding menus / options (see figure below). You may find it helpful to use the Print Quick Report menu item under My Tools.http://ezproxy.umuc.edu/login?url=http://www.mergentonline.com/Hoovers
  3. Download and review a copy of the companys most recent Annual Report to Investors from its Form 10-K filing with the United States Securities and Exchange Commission. (Note: the company is the author of its Form 10-K. Do not list the SEC as the author.)
  4. Identify 3 or more additional sources of information about the company and how it operates in cyberspace. These can be news articles, data breach reports, etc.
  5. Using the information obtained from your sources, identify the types of information and business operations which drive this companys need for cybersecurity products and services. (What needs to be protected?)
  6. Using the course readings and other materials, develop a Buying Forecast for likely purchases by this company for cybersecurity related products and services.

Write

  1. An introduction section which identifies the company being discussed and includes a brief overview of the company including when it was founded and significant events in its history.
  2. An overview of the companys operations which summarizes information obtained from its annual report, the Hoovers profile for the company, and other sources which you found in your research. This information should include: headquarters location, key personnel, primary types of business activities and locations, major products or services sold by the company, major competitors, stock information (including ticker symbol or NASDAQ code), recent financial performance, and additional relevant information from the business profiles.
  3. A separate section in which you describe this companys needs or requirements for cybersecurity. What information and/or business operations need to be protected?
  4. A separate Buying Forecast section in which you discuss the companys likely future purchases for cybersecurity products and services. In this section, you should identify and discuss three or more categories of cybersecurity products or services which this company is likely to purchase.

Your three to five page Buyer Profile is to be prepared using basic APA formatting (including title page and reference list) and submitted as an MS Word attachment to the Corporate Profile Part 1 entry in your assignments folder. See the sample paper and paper template provided in Course Resources > APA Resources for formatting examples. Consult the grading rubric for specific content and formatting requirements for this assignment.

Rubric Name: Corporate Profile Part 1: Buyer Profile

Criteria Excellent Outstanding Acceptable Needs Improvement Needs Significant Improvement Missing or Unacceptable
Introduction to the Company 20 pointsProvided an excellent introduction section which identified the company being profiled and included a brief overview of the company (when it was founded, by whom, major products or services provided by the company, and significant events in the companys history). Appropriately used information from 3 or more authoritative sources. 18 pointsProvided an outstanding introduction section which identified the company being profiled and included a brief overview of the company (when it was founded, by whom,major products or services provided by the company, and significant events in the companys history). Appropriately used information from 2 or more authoritative sources. 16 pointsProvided an introduction section which identified the company being profiled and included a brief overview of the company (when it was founded, by whom,major products or services provided by the company, and significant events in the companys history). Appropriately used information from authoritative sources. 14 pointsProvided an introduction to the company but the section lacked some required details. Information from authoritative sources was cited and used in the overview. 9 pointsAttempted to provide an introduction to the company but this section lacked detail and/or was not well supported by information drawn from authoritative sources. 0 pointsThe introduction section was missing or did not clearly identify the company.
Business Profile (Locations, Operations, & Finances) 20 pointsProvided an excellent overview of the companys operations which summarized information from its annual report, the Hoovers profile for the company, and other authoritative sources. This information included: headquarters location, key personnel, primary types of business activities and locations, major products or services sold by the company, major competitors, stock information (including ticker symbol or NASDAQ code), recent financial performance, and additional relevant information from the business profiles. Appropriately used and cited information from authoritative sources. 18 pointsProvided an outstanding overview of the companys operations which summarized information from its annual report and other authoritative sources. This information included: headquarters location, key personnel, primary types of business activities and locations, major products or services sold by the company, major competitors, stock information (including ticker symbol or NASDAQ code), recent financial performance, etc. Appropriately used and cited information from authoritative sources. 16 pointsProvided an overview of the companys operations including: headquarters location, key personnel, primary types of business activities and locations, major products or services sold by the company, major competitors, stock information (including ticker symbol or NASDAQ code), recent financial performance, and additional relevant information from the business profiles. Appropriately used and cited information from authoritative sources. 14 pointsProvided information about the companys business operations with some detailes from annual report or company profiles (e.g. Hoovers). Appropriately used and cited information from authoritative sources. 9 pointsProvided a discussion of the companys business operations. The discussion lacked detail and/or was not well supported by information drawn from authoritative sources. 0 pointsThis section was missing, off topic, or failed to provide information about the companys business operations.
Business Needs for Cybersecurity Products and Services 15 pointsProvided an excellent discussion of this companys business needs or requirements for cybersecurity. Fully answered the question: What information and/or business operations need to be protected? Appropriately used information from 3 or more authoritative sources. 14 pointsProvided an outstanding discussion of this companys business needs or requirements for cybersecurity. Answered the question: What information and/or business operations need to be protected? Appropriately used information from 2 or more authoritative sources. 13 pointsProvided a discussion of this companys business needs or requirements for cybersecurity. Provided some details about the types of information and/or business operations that need protection. The discussion was supported by information drawn from authoritative sources. 11 pointsAttempted to provide a discussion of this companys requirements for cybersecurity. Provided few details about the types of information and/or business operations that need protection. The discussion was supported by information drawn from authoritative sources. 9 pointsMentioned the business need or company requirements for cybersecurity but the section was lacking in details and/or was not well supported by information from authoritative sources. 0 pointsThis section was missing, off topic, or failed to address the companys business needs or requirements for cybersecurity.
Buying Forecast 15 pointsProvided an excellent discussion of the companys likely future purchases for cybersecurity products and services. Identified and discussed three or more categories of cybersecurity products or services which this company is likely to purchase with an appropriate rationale or reason for the purchase (what benefit will the company realize from this purchase).Appropriately used information from 3 or more authoritative sources. 14 points Provided an outstanding discussion of the companys likely future purchases for cybersecurity products and services. Identified and discussed three or more categories of cybersecurity products or services which this company is likely to purchase with an appropriate rationale or reason for the purchase (what benefit will the company realize from this purchase).Appropriately used information from 2 or more authoritative sources. 13 points Provided a discussion ofthe companys likely future purchases for cybersecurity products and services. Identified and discussed at 2 or more categories of cybersecurity products or services which this company is likely to purchase. Appropriately used information from authoritative sources. 11 pointsProvided a discussion of likely future purchases for cybersecurity products or services. Appropriately used information from authoritative sources. 9 pointsProvided a discussion of likely future purchases for cybersecurity products or services but the discussion lacked important details and/or was not well supported by information drawn from authoritative sources. 0 pointsDid not mention the three required investment categories.
Addressed security issues using standard cybersecurity terminology 5 pointsDemonstrated excellence in the integration of standard cybersecurity terminology into the case study. 4 pointsProvided an outstanding integration of standard cybersecurity terminology into the case study. 3 pointsIntegrated standard cybersecurity terminology into the into the case study 2 pointsUsed standard cybersecurity terminology but this usage was not well integrated with the discussion. 1 pointMisused standard cybersecurity terminology. 0 pointsDid not integrate standard cybersecurity terminology into the discussion.
APA Formatting for Citations and Reference List 5 pointsWork contains a reference list containing entries for all cited resources. Reference list entries and in-text citations are correctly formatted using the appropriate APA style for each type of resource. 4 pointsWork contains a reference list containing entries for all cited resources. One or two minor errors in APA format for in-text citations and/or reference list entries. 3 pointsWork contains a reference list containing entries for all cited resources. No more than 3 minor errors in APA format for in-text citations and/or reference list entries. 2 pointsWork has no more than three paragraphs with omissions of citations crediting sources for facts and information. Work contains a reference list containing entries for cited resources. Work contains no more than 5 minor errors in APA format for in-text citations and/or reference list entries. 1 pointWork attempts to credit sources but demonstrates a fundamental failure to understand and apply the APA formatting standard as defined in the Publication Manual of the American Psychological Association (6th ed.). 0 pointsReference list is missing. Work demonstrates an overall failure to incorporate and/or credit authoritative sources for information used in the paper.
Professionalism Part I: Organization & Appearance 5 pointsSubmitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type. 4 pointsSubmitted work has minor style or formatting flaws but still presents a professional appearance. Submitted work is well organized and appropriately uses color, fonts, and section headings (per the assignments directions). 3 pointsOrganization and/or appearance of submitted work could be improved through better use of fonts, color, titles, headings, etc. OR Submitted work has multiple style or formatting errors. Professional appearance could be improved. 2 pointsSubmitted work has multiple style or formatting errors. Organization and professional appearance need substantial improvement. 1 pointSubmitted work meets minimum requirements but has major style and formatting errors. Work is disorganized and needs to be rewritten for readability and professional appearance. 0 pointsNo work submitted.
Professionalism Part II: Execution 15 pointsNo formatting, grammar, spelling, or punctuation errors. 14 pointsWork contains minor errors in formatting, grammar, spelling or punctuation which do not significantly impact professional appearance. 13 pointsErrors in formatting, spelling, grammar, or punctuation which detract from professional appearance of the submitted work. 11 pointsSubmitted work has numerous errors in formatting, spelling, grammar, or punctuation. Work is unprofessional in appearance. 4 pointsSubmitted work is difficult to read / understand and has significant errors in formatting, spelling, grammar, punctuation, or word usage. 0 pointsNo work submitted.
Overall Score Excellent90 or more Outstanding80 or more Acceptable70 or more Needs Improvement56 or more Needs Significant Improvement36 or more Missing or Unacceptable0 or more

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Shopping Cart
[Solved] CSIA 350 6381 Cybersecurity in Business and Industry (2172)
$25