Farhan Ihsas, Comm-101 (Explanatory Speech Plan)

docx

School

Georgetown University *

*We aren’t endorsed by this school

Course

101

Subject

Electrical Engineering

Date

Feb 20, 2024

Type

docx

Pages

3

Uploaded by HighnessWolf3942

Report
Explanatory Speech Plan Asynchronous courses : Download the Word file for this assignment. You will complete this assignment, save it, and upload it to Blackboard to earn 10 PA points. In-person and synchronous labs: You will complete this assignment as an in-class activity during class time for participation and attendance points. Identify three topics that you might choose for your explanatory speech assignment. For each topic, write out the thesis statement and main points that you would use if you were developing a speech. Identify the pattern of organization that you have selected for that topic. The Three I would like to talk about is- *Ransomware. *Social Engineering. *Two factor authentication. Topic: Ransomware Attacks. Thesis Statement: Individuals and companies are at serious risk from ransomware attacks. Protecting sensitive data requires knowing the technical details and putting preventive measures in place. Main Points: * Definition and Types of Ransomwares *Explain of what ransomware is and its various forms. *High profile cases and the impact of regular backups *Prevention solution Topic: Social Engineering. Thesis Statement: In today's digital world, social engineering attacks which include techniques like phishing, pretexting, and baiting—are becoming more and more common. Understanding the many strategies contained is vital for individuals to protect themselves against fraud and manipulation. Main Points: *Overview of Social Engineering. *Real Life Examples *Signs of a Social Engineering Attempts. *Overcome the problem and protective measures. Topic: Two Factor Authentication. Thesis Statement: Two-Factor Authentication (2FA), which provides an additional layer of protection for both personal and business accounts, develops as a powerful tool to improve online security in the face of growing cyber threats. Navigating the risks of the internet requires an understanding of the importance of 2FA. Main Points: *Explain two Factor Authentication *Vulnerabilities of Password-Only Security *How Two-Factor Authentication works. *Benefits of Two-Factor Authentication.
1. 2. For each of the three topics that you selected, explain why they would or would not be particularly appropriate for you, your audience, and the context in which this speech is being given. For me- I can offer important thoughts and information since this issue relates to my concerns about cybersecurity and digital safety. For Audience- Important to the audience because particularly if they work for companies that handle sensitive data or use digital platforms. For Context- Given the growing dependence on digital technology in today's society, attacks using ransomware are an important and impactful topic for a variety of circumstances, including business training and educational events. 3. Review the guidelines for this assignment in the textbook to refresh your memory on what the expectations are for this particular speech assignment. After re-reading those guidelines, choose which of your three topic ideas will lend itself to the strongest speech and explain why you are selecting that topic. Two-Factor Authentication follows a chronological pattern that traces its historical evolution, examines emerging techniques, and highlights present relevance and future developments. The cause-and-effect pattern works well for Social Engineering Attacks because it can be used to explain the underlying reasons, explore the methods employed, provide actual cases, and talk about the results and countermeasures. 4. 5. 6. What is one concept in your explanatory speech that will be difficult for your audience to understand? Which of the three reasons is this concept likely to be difficult to understand (the language or concepts are difficult, the structure or process is hard to envision, or the idea is difficult to believe)? What are the steps you can use to address that challenge? Write out what you will say when using these steps or this strategy in your speech. The technical aspect of ransomware crimes, which involve intrusion and encryption techniques, may make the concept difficult to understand. Consider the files on our computer as a hidden treasure. Ransomware may be compared to a burglar who locks up a chest with a magical spell in addition to stealing it. Without the appropriate decryption key, or spell breaker, we are unable to unlock it. It may seem complicated at first, but let's break it down even more. This is a brief demonstration or graphic illustration of how ransomware encrypts files and enters computers. It sometimes becomes obvious when you see it in action. By using these techniques, I hope to increase the audience's understanding and relatability of the technical aspects of ransomware attacks. The difficulty presented by the technical aspect of the idea can be overcome by emphasizing real-world connections, using connections, adding visual aids, and simplifying language. 7. Choose three of the strategies for helping your audience understand (definitions, humor, rewards, participation, signposts and repetition, use all of the senses). What is a specific way that you could use each of these three strategies in your upcoming speech?
I may use the following example to describe the technical aspects of ransomware: "Consider ransomware as a digital lock." It resembles a clever burglar who locks up our digital treasure chest (files) in addition to stealing them. The appropriate "key," which the attacker is holding hostage until we pay the ransom, is the only way to open it. While discussing the serious consequences of social engineering attacks, I can inject a light-hearted comment like, "It's like fishing, but instead of catching fish, they're trying to reel in your sensitive information. Quite the unconventional fishing trip, isn't it? I may use a slide or presentation to walk through the steps of Two-Factor Authentication (2FA). The images, which the audience can see and interact with while I explain the levels of protection, reinforce the idea through both visual and audio means. By using these techniques, I make difficult ideas like 2FA, social engineering consequences, and ransomware mechanics easier to understand, memorable, and interesting for the audience.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help