See attached file Information Assurance and Web Technologies Communications Submit a presentation explaining information assurance needs, including risks associated wi

See attached file

Information Assurance and Web Technologies Communications

Submit a presentation explaining information assurance needs, including risks associated with non-adherence to processes and describing countermeasures to mitigate risks, and two tutorials for setting the company website as the homepage and for enabling and disabling cookies.

Create two tutorials for Help Desk interns, describing how to set up web technologies for the new operating system for use with a specific web browser. Prepare one tutorial for setting the company website as the employees’ homepage. The second tutorial should describe how to enable and disable cookies.

IT 505 Milestone Three Guidelines and Rubric

Prompt
You are a new employee at an IT help desk. The organization that you work for has computers that are due for an operating system (OS) upgrade. Your
supervisor has provided you with components of the implementation plan to carry out in order to facilitate a smooth upgrade process in each department.

For Milestone Three, you will prepare and submit a three-slide presentation explaining information assurance needs including risks associated with non-
adherence to information assurance processes, and countermeasures to mitigate risks. You will also prepare two one-page tutorials. The first tutorial is for setting
the company website as the homepage and the second for enabling and disabling cookies.

Guidelines for Submission: The slide presentation should consist of three slides using Microsoft PowerPoint. Written components of project must follow these
formatting guidelines when applicable: double spacing, 12-point Times New Roman font, and one-inch margins. The tutorials should be one page in length.

Critical Elements Exemplary (100%) Proficient (90%) Needs Improvement (70%) Not Evident (0%) Value

Information
Assurance – Access

Meets “Proficient“ criteria and
provides specific examples to
substantiate description

Provides a slide with a
description of information
assurance

Provides a slide describing
information assurance;
however, it is not accurate or
lacks important detail

Does not provide a slide
describing information
assurance

20

Information
Assurance – Risks

Meets “Proficient“ criteria and
provides specific examples to
illustrate risks

Provides a slide explaining the
risks associated with non-
adherence to information
security processes

Provides a slide explaining the
risks associated with non-
adherence to information
security processes; however,
description lacks clarity or is
not accurate

Does not provide a slide
describing the risks associated
with non-adherence to
information security processes

20

Information
Assurance –

Countermeasures

Meets “Proficient“ criteria and
uses specific examples to
support countermeasure use

Provides a slide describing
countermeasures to mitigate
information security risks

Provides a slide describing
countermeasures to mitigate
information security risks;
however, description is limited
or is not accurate

Does not provide a slide
describing the risks associated
with non-adherence to
information security processes

20

Instructions

IT 505 Milestone Three Guidelines and Rubric

Prompt
You are a new employee at an IT help desk. The organization that you work for has computers that are due for an operating system (OS) upgrade. Your
supervisor has provided you with components of the implementation plan to carry out in order to facilitate a smooth upgrade process in each department.

For Milestone Three, you will prepare and submit a three-slide presentation explaining information assurance needs including risks associated with non-
adherence to information assurance processes, and countermeasures to mitigate risks. You will also prepare two one-page tutorials. The first tutorial is for setting
the company website as the homepage and the second for enabling and disabling cookies.

Guidelines for Submission: The slide presentation should consist of three slides using Microsoft PowerPoint. Written components of project must follow these
formatting guidelines when applicable: double spacing, 12-point Times New Roman font, and one-inch margins. The tutorials should be one page in length.

Critical Elements Exemplary (100%) Proficient (90%) Needs Improvement (70%) Not Evident (0%) Value

Information
Assurance – Access

Meets “Proficient“ criteria and
provides specific examples to
substantiate description

Provides a slide with a
description of information
assurance

Provides a slide describing
information assurance;
however, it is not accurate or
lacks important detail

Does not provide a slide
describing information
assurance

20

Information
Assurance – Risks

Meets “Proficient“ criteria and
provides specific examples to
illustrate risks

Provides a slide explaining the
risks associated with non-
adherence to information
security processes

Provides a slide explaining the
risks associated with non-
adherence to information
security processes; however,
description lacks clarity or is
not accurate

Does not provide a slide
describing the risks associated
with non-adherence to
information security processes

20

Information
Assurance –

Countermeasures

Meets “Proficient“ criteria and
uses specific examples to
support countermeasure use

Provides a slide describing
countermeasures to mitigate
information security risks

Provides a slide describing
countermeasures to mitigate
information security risks;
however, description is limited
or is not accurate

Does not provide a slide
describing the risks associated
with non-adherence to
information security processes

20

Instructions




See attached file





Information Assurance and Web Technologies Communications


Submit a presentation explaining information assurance needs, including risks associated with non-adherence to processes and describing countermeasures to mitigate risks, and two tutorials for setting the company website as the homepage and for enabling and disabling cookies.
Create two tutorials for Help Desk interns, describing how to set up web technologies for the new operating system for use with a specific web browser. Prepare one tutorial for setting the company website as the employees’ homepage. The second tutorial should describe how to enable and disable cookies.















IT 505 Milestone Three Guidelines and Rubric

Prompt
You are a new employee at an IT help desk. The organization that you work for has computers that are due for an operating system (OS) upgrade. Your
supervisor has provided you with components of the implementation plan to carry out in order to facilitate a smooth upgrade process in each department.

For Milestone Three, you will prepare and submit a three-slide presentation explaining information assurance needs including risks associated with non-
adherence to information assurance processes, and countermeasures to mitigate risks. You will also prepare two one-page tutorials. The first tutorial is for setting
the company website as the homepage and the second for enabling and disabling cookies.

Guidelines for Submission: The slide presentation should consist of three slides using Microsoft PowerPoint. Written components of project must follow these
formatting guidelines when applicable: double spacing, 12-point Times New Roman font, and one-inch margins. The tutorials should be one page in length.

Critical Elements Exemplary (100%) Proficient (90%) Needs Improvement (70%) Not Evident (0%) Value

Information
Assurance  –  Access

Meets “Proficient“ criteria and
provides specific examples to
substantiate description

Provides a slide with  a
description of information
assurance

Provides a slide describing
information assurance;
however, it is not accurate or
lacks important detail

Does not provide a slide
describing information
assurance

20

Information
Assurance – Risks

Meets “Proficient“ criteria and
provides specific examples to
illustrate risks

Provides a slide explaining the
risks  associated  with non-
adherence to  information
security processes

Provides a slide explaining the
risks  associated  with non-
adherence to information
security processes; however,
description lacks clarity or is
not accurate

Does not provide a slide
describing the risks  associated
with non-adherence to
information security processes

20

Information
Assurance  –

Countermeasures

Meets “Proficient“ criteria and
uses  specific examples  to
support countermeasure use

Provides a slide describing
countermeasures to mitigate
information security risks

Provides a  slide  describing
countermeasures to mitigate
information security risks;
however, description is limited
or is not accurate

Does not provide a slide
describing the risks  associated
with non-adherence to
information security processes

20

Instructions













IT 505 Milestone Three Guidelines and Rubric

Prompt
You are a new employee at an IT help desk. The organization that you work for has computers that are due for an operating system (OS) upgrade. Your
supervisor has provided you with components of the implementation plan to carry out in order to facilitate a smooth upgrade process in each department.

For Milestone Three, you will prepare and submit a three-slide presentation explaining information assurance needs including risks associated with non-
adherence to information assurance processes, and countermeasures to mitigate risks. You will also prepare two one-page tutorials. The first tutorial is for setting
the company website as the homepage and the second for enabling and disabling cookies.

Guidelines for Submission: The slide presentation should consist of three slides using Microsoft PowerPoint. Written components of project must follow these
formatting guidelines when applicable: double spacing, 12-point Times New Roman font, and one-inch margins. The tutorials should be one page in length.

Critical Elements Exemplary (100%) Proficient (90%) Needs Improvement (70%) Not Evident (0%) Value

Information
Assurance  –  Access

Meets “Proficient“ criteria and
provides specific examples to
substantiate description

Provides a slide with  a
description of information
assurance

Provides a slide describing
information assurance;
however, it is not accurate or
lacks important detail

Does not provide a slide
describing information
assurance

20

Information
Assurance – Risks

Meets “Proficient“ criteria and
provides specific examples to
illustrate risks

Provides a slide explaining the
risks  associated  with non-
adherence to  information
security processes

Provides a slide explaining the
risks  associated  with non-
adherence to information
security processes; however,
description lacks clarity or is
not accurate

Does not provide a slide
describing the risks  associated
with non-adherence to
information security processes

20

Information
Assurance  –

Countermeasures

Meets “Proficient“ criteria and
uses  specific examples  to
support countermeasure use

Provides a slide describing
countermeasures to mitigate
information security risks

Provides a  slide  describing
countermeasures to mitigate
information security risks;
however, description is limited
or is not accurate

Does not provide a slide
describing the risks  associated
with non-adherence to
information security processes

20

Instructions

Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Your Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.