Skip to content

⭐ Rated 4.9/5 by 8,400+ students  |  🎓 Expert writers in 80+ subjects  |  ✅ 100% original, no AI  |  🔒 Confidential & secure

Home Blog

IT Strategy Week – 7 Assignments

5 min read

Question description

Dissertation chapter by chapter, or full document — we deliver.

PhD-qualified writers handle every part of your dissertation: literature review, methodology, data analysis, and discussion. We align with your university's format requirements and provide a model you can confidently reference throughout your research.

✓ Plagiarism-free · ✓ 100% human · ✓ Free revisions · ✓ Confidential

Start My Dissertation

🔒 No payment to start · From 3 hrs

Q1. For this assignment, you are creating and
submitting a PowerPoint presentation rather than a Word document.
  Chapters
8 through 13 in the Security Strategy book provide different tactical concepts
that apply to information technology.  Again, even though these are
focused on security, each applies to IT.  While you need to be familiar
with all of them, for this assignment you should choose one to explain in your
own words.  Include an example that explains the concept.  Justify
why the principle is important for IT Strategy or Tactics. Find at least one
additional reference for each one you choose.  Rather than providing a
paper, you are to create a PowerPoint presentation explaining the
concept.  It should contain 10-15 slides, including a title slide and a reference
slide.  You may include pictures, graphs, figures, or charts to help your
discussion of the topic.  Your final presentation product should be
professional in format as if you are going to present it to upper management.
Textbook : Security-Strategy-From-Requirements-to-Reality.pdf
Q2. Review the supplemental reading material linked below. 
Pick one of the concepts discussed in the documents and explain it in your own
words.  Include an example of that concept that explains it in real-world
terms.  Provide how it applies in today’s cyber-world and how it ties to
the IT Strategic or Tactical plans. Feel free to play devil’s advocate and
challenge each other. 
Supplemental
Readings:Information Security Key Concepts.pdf”The Protection of Information in Computer Systems”, Jerome Saltzer and Michael Schroeder, IEEE
Deadlines:
Q1: 3 Days
Q2: 16 hours

Dissertation chapter by chapter, or full document — we deliver.

PhD-qualified writers handle every part of your dissertation: literature review, methodology, data analysis, and discussion. We align with your university's format requirements and provide a model you can confidently reference throughout your research.

✓ Plagiarism-free · ✓ 100% human · ✓ Free revisions · ✓ Confidential

Start My Dissertation

🔒 No payment to start · From 3 hrs

Need help with your assignment?

Expert writers available now. Original work, no AI, free revisions.

🔒 No payment to start · Free revisions · Money-back guarantee

4.9 ★

Student rating

8,400+

Papers delivered

97%

On-time delivery

Why students choose Scholaris

  • 100% human writing, no AI
  • Plagiarism report with every order
  • Deadlines from 3 hours
  • Money-back guarantee
  • Free unlimited revisions

Related Study Guides