These are screenshots from my part of the presentation that I have been working on. All of the screenshots are from the first iteration of the presentation so pretty much everything will be different. In the final version there are more images to demonstrate the points and/or topics. Furthermore, there is way less text to make sure the users don't lose focus.
Figure 1
This is the introduction slide of the presentation. I kept it as minimalistic as possible to not have too much information on it. The background image and the font might be different at the end but the content will stay the same.
Figure 2
This slide contains basic information about which devices in our daily lives need to be secured from cyber attacks. During the talk, I will be putting an emphasis on how some of these devices may be hacked and be used to access your card, phone, laptop and other items. As with the other slides, the design will be changed and images will be added.
Figure 3
The cyber warfare slide at the time of the screenshot was the one with the most text. The text is mostly removed and images related to the topic have been added. The entire design is basically going to change to have proper colour combination.
In this gantt chart you can see that there are huge gaps where nothing was done. This was due to the group not being organised properly. Thankfully, we were able to get back on track and complete the necessary ppt. However, this is an indication that we should've been more in contact to get stuff done quicker and more efficiently.
To sum up, the making of ppt was rather problematic since one person was missing for a while. However, at the end all of us were able to gather and complete all of the necessary steps.
In the future, cyber security will be even more important. We are surrounded by technology that can potentially be hacked. As we move towards a world with more tech products, the need for cyber security will always continue. Even our healthcare records are being stolen as they are more valuable than credit card information [1]. We should not take any risks and take more "drastic" measures to secure ourselves. Unfortunately, in my primary research the majority of the people (60%) have stated that they do important things that may include sharing of their personal information while using public wifi.
While working on this ppt, I've learned how extensive cyber security is. Even the smallest devices that we use such as door remotes can be hacked [2].
If I had the chance of working on this project again, I'd make sure to be more organised and make sure that everyone in the team are aligned properly to be more efficient.
References
- Kandasamy, K. et al. (2022) Digital Healthcare - cyberattacks in Asian organizations ... - IEEE xplore. Available at: https://ieeexplore.ieee.org/abstract/document/9690161/ (Accessed: 05 December 2023).
Pomerleau, P.-L. and Lowery, D.L. (2020) Contemporary Cybersecurity in our daily lives, SpringerLink. Available at: https://link.springer.com/chapter/10.1007/978-3-030-54054-8_1 (Accessed: 05 December 2023).




Comments
Post a Comment