SlideShare a Scribd company logo
1 of 23
Ms. Battle, Principal with Cincinnati Public Schools, and Ms.
Savage, a Mental Health Professional from Cincinnati
Children’s Hospital begin a conversation today regarding
Childhood Trauma and how it affects a child’s education.
Together, they shared that without question, no matter what
neighborhood you teach in, you will work with children who
have experienced trauma and who have had high Adverse
Childhood Experiences (ACE’s).
Unfortunately, there was only so much time and this was just
the beginning of the conversation. What was the most
important thread to take-away from this experience is the
awareness you must embrace regarding the power a teacher has
to develop a positive relationship with each student you serve.
One that allows you to hold hope and belief in your students,
and the willingness you must have to walk through these
struggles with them.
In the video (link below), Whole People: Childhood Trauma,
Resmaa Menaken shares that we may not have all of the
answers, but maybe if we approach children who have
experienced trauma, with a calm and settled response to their
unsettled and reactive nervous system, we can help them find
some calmness so they can recognize their need and ask for
help.
In her TEDTalk (link below), Dr. Allison Jackson states, “We’re
not powerful enough to know who has trauma and who doesn’t,
we’re not powerful enough to know who makes it and who
doesn’t. But we are powerful enough to do 2 things: 1-Teach
someone else about childhood trauma as a health issue, and 2-
Make that risk of connection. So, the next time someone gives
you the honor of walking their trauma, their pain story, in front
of you, answer that call with connection.”
For this extra credit assignment, please use the listed resources
and articles to discuss:
1- What you have learned about Childhood Trauma and the
effects of ACE’s
2 – Explore ideas about how you, as a teacher, will support the
children in your classroom and school community who may
have hidden trauma that is showing as difficult, inappropriate,
and/or scary behaviors,
3 - What are things you can do to create a relationship of
kindness and trust while supporting the child to get help.
2 typed pages: Times New Roman, 12 pt font, 1” margins,
double spaced (appx. 600 words), cite and list your references
20 points (see rubric)
RESOURCES:TEDxRVA: A Call to Connection: Making
Childhood Trauma Personal | Dr. Allison Jackson
https://www.youtube.com/watch?v=-HG8H4n2j9I
Whole People: Childhood Trauma
https://www.pbs.org/video/whole-people-101-childhood-trauma-
3swqgb/
How to Help a Traumatized Child in the Classroom
https://greatergood.berkeley.edu/article/item/the_silent_epidemi
c_in_our_classrooms
10 Things about Childhood Trauma Every Teacher Needs to
Know
https://www.weareteachers.com/10-things-about-childhood-
trauma-every-teacher-needs-to-know/
Trauma can make it hard for kids to learn. Here’s how teachers
learn to deal with that
https://www.chalkbeat.org/posts/chicago/2018/08/01/trauma-
can-make-it-hard-for-kids-to-learn-heres-how-teachers-learn-to-
deal-with-that/
Understanding Adverse Childhood Experiences (ACE’s)
https://www.menominee-
nsn.gov/CommunityPages/FosteringFutures/Documents/ACESH
andoutForParents.pdf
RUBRIC
1
2
3
4
Organization
Writing lacks logical organization. It shows some coherence but
ideas lack unity. Serious errors.
Writing is coherent and logically organized. Some points remain
misplaced and stray from the topic. Transitions evident but not
used throughout essay.
Writing is coherent and logically organized with transitions
used between ideas and paragraphs to create coherence. Overall
unity of ideas is present.
Writing shows high degree of attention to logic and reasoning
of points. Unity clearly leads the reader to the conclusion and
stirs thought regarding the topic
Content
Shows some thinking and reasoning but most ideas are
underdeveloped and unoriginal.
Content indicates thinking and reasoning applied with original
thought on a few ideas.
Content indicates original thinking and develops ideas with
sufficient and firm evidence.
Content indicates synthesis of ideas, in-depth analysis and
evidences original thought and support for the topic.
Development
Main points lack detailed development. Ideas are vague with
little evidence of critical thinking.
Main points are present with limited detail and development.
Some critical thinking is present.
Main points well developed with quality supporting details and
quantity. Critical thinking is weaved into points.
Main points well developed with high quality and quantity
support. Reveals high degree of critical thinking.
Grammar & Mechanics
Spelling, punctuation, and grammatical errors create distraction,
making reading difficult; fragments, comma splices, run-ons
evident. Errors are frequent.
Essay has some spelling, punctuation, and grammatical errors
allowing reader to follow ideas clearly. Very few fragments or
run-ons.
Essay is free of distracting spelling, punctuation, and
grammatical errors; absent of fragments, comma splices, and
run-ons.
Format & Style
Fails to follow format and assignment requirements; incorrect
margins, spacing and indentation; neatness of essay needs
attention.
Some college level usage of variety in sentence patterns,
diction, and rhetorical devices.
Meets most format and assignment requirements; generally
correct margins, spacing, and indentations; essay is neat but
may have some assembly errors.
Attains college level style; tone is appropriate and rhetorical
devices used to enhance content; sentence variety used
effectively.
Meets all format and assignment requirements; margins,
spacing, and indentations are correct; essay is neat and correctly
assembled.
References and citations
Errors/missing in references and in-text citations.
All references from course are used and are correctly listed.
All in-text citations are correctly used.
1
Copyright © 2012, Elsevier Inc.
All Rights Reserved
Chapter 7
Discretion
Cyber Attacks
Protecting National Infrastructure, 1st ed.
2
• Proprietary information will be exposed if discovered
by hackers
• National infrastructure protection initiatives most
prevent leaks
– Best approach: Avoid vulnerabilities in the first place
– More practically: Include a customized program focused
mainly on the most critical information
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Introduction
3
• A trusted computing base (TCB) is the totality of
hardware, software, processes, and individuals
considered essential to system security
• A national infrastructure security protection program
will include
– Mandatory controls
– Discretionary policy
• A smaller, less complext TCB is easier to protect
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Trusted Computing Base
4
Fig. 7.1 – Size comparison issues in a
trusted computing base
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
5
• Managing discretion is critical; questions about the
following should be asked when information is being
considered for disclosure
– Assistance
– Fixes
– Limits
– Legality
– Damage
– Need
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Trusted Computing Base
6
• Security through obscurity is often maligned and
misunderstood by security experts
– Long-term hiding of vulnerabilities
– Long-term suppression of information
• Security through obscurity is not recommended for
long-term protection, but it is an excellent
complementary control
– E.g., there’s no need to publish a system’s architecture
– E.g., revealing a flaw before it’s fixed can lead to rushed
work and an unnecessary complication of the situation
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Security Through Obscurity
7
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Fig. 7.2 – Knowledge lifecycle for
security through obscurity
8
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Fig. 7.3 – Vulnerability disclosure
lifecycle
9
• Information sharing may be inadvertent, secretive, or
willful
• Government most aggressive promoting information
sharing
• Government requests information from industry for
the following reasons
– Government assistance to industry
– Government situational awareness
– Politics
• Government and industry have conflicting
motivations
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Information Sharing
10
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Fig. 7.4 – Inverse value of information
sharing for government and industry
11
• Adversaries regularly scout ahead and plan before an
attack
• Reconnaissance planning levels
– Level #1: Broad, wide-reaching collection from a variety of
sources
– Level #2: Targeted collection, often involving automation
– Level #3: Directly accessing the target
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Information Reconnaissance
12
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Fig. 7.5 – Three stages of
reconnaissance for cyber security
13
• At each stage of reconnaissance, security engineers
can introduce information obscurity
• The specific types of information that should be
obscured are
– Attributes
– Protections
– Vulnerabilities
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Information Reconnaissance
14
• Layering methods of obscurity and discretion adds
depth to defensive security program
• Even with layered obscurity, asset information can
find a way out
– Public speaking
– Approved external site
– Search for leakage
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Obscurity Layers
15
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Fig. 7.6 – Obscurity layers to protect
asset information
16
• Governments have been successful at protecting
information by compartmentalizing information and
individuals
– Information is classified
– Groups of individuals are granted clearance
• Compartmentalization defines boundaries, which
helps guides decisions
• Private companies can benefit from this model
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Organizational Compartments
17
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Fig. 7.7 – Using clearances and
classifications to control information
disclosure
18
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Fig. 7.8 – Example commercial mapping
of clearances and classifications
19
• To implement a national discretion program will
require
– TCB definition
– Reduced emphasis on information sharing
– Coexistence with hacking community
– Obscurity layered model
– Commercial information protection models
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
National Discretion Program

More Related Content

Similar to Ms. Battle, Principal with Cincinnati Public Schools, and Ms. Sav.docx

Discussion 1 Use references and citations Research to find infor
Discussion 1 Use references and citations Research to find inforDiscussion 1 Use references and citations Research to find infor
Discussion 1 Use references and citations Research to find infor
VinaOconner450
 
An explanation of the Doing Ethics Technique Graham R Seach .docx
An explanation of the Doing Ethics Technique Graham R Seach .docxAn explanation of the Doing Ethics Technique Graham R Seach .docx
An explanation of the Doing Ethics Technique Graham R Seach .docx
nettletondevon
 
Thesis Statement Essays
Thesis Statement EssaysThesis Statement Essays
Thesis Statement Essays
Tracy Ocampo
 

Similar to Ms. Battle, Principal with Cincinnati Public Schools, and Ms. Sav.docx (13)

Ece 353 ash Motivated Minds/newtonhelp.com
Ece 353 ash Motivated Minds/newtonhelp.comEce 353 ash Motivated Minds/newtonhelp.com
Ece 353 ash Motivated Minds/newtonhelp.com
 
Ece 353 ash Education is Power/newtonhelp.com
Ece 353 ash Education is Power/newtonhelp.comEce 353 ash Education is Power/newtonhelp.com
Ece 353 ash Education is Power/newtonhelp.com
 
Ece 353 ash Extraordinary Success/newtonhelp.com
Ece 353 ash Extraordinary Success/newtonhelp.comEce 353 ash Extraordinary Success/newtonhelp.com
Ece 353 ash Extraordinary Success/newtonhelp.com
 
Ece 353 ash Your world/newtonhelp.com
Ece 353 ash Your world/newtonhelp.comEce 353 ash Your world/newtonhelp.com
Ece 353 ash Your world/newtonhelp.com
 
Discussion 1 Use references and citations Research to find infor
Discussion 1 Use references and citations Research to find inforDiscussion 1 Use references and citations Research to find infor
Discussion 1 Use references and citations Research to find infor
 
An explanation of the Doing Ethics Technique Graham R Seach .docx
An explanation of the Doing Ethics Technique Graham R Seach .docxAn explanation of the Doing Ethics Technique Graham R Seach .docx
An explanation of the Doing Ethics Technique Graham R Seach .docx
 
Steps To Writing A Persuasive Essay
Steps To Writing A Persuasive EssaySteps To Writing A Persuasive Essay
Steps To Writing A Persuasive Essay
 
IRJET- Learning Assistance System for Autistic Child
IRJET- Learning Assistance System for Autistic ChildIRJET- Learning Assistance System for Autistic Child
IRJET- Learning Assistance System for Autistic Child
 
Ece 353 Inspiring Innovation--tutorialrank.com
Ece 353 Inspiring Innovation--tutorialrank.comEce 353 Inspiring Innovation--tutorialrank.com
Ece 353 Inspiring Innovation--tutorialrank.com
 
Thesis Statement Essays
Thesis Statement EssaysThesis Statement Essays
Thesis Statement Essays
 
ECE 353 PAPERS Become Exceptional--ece353papers.com
ECE 353 PAPERS Become Exceptional--ece353papers.comECE 353 PAPERS Become Exceptional--ece353papers.com
ECE 353 PAPERS Become Exceptional--ece353papers.com
 
ECE 353 PAPERS Lessons in Excellence--ece353papers.com
ECE 353 PAPERS Lessons in Excellence--ece353papers.comECE 353 PAPERS Lessons in Excellence--ece353papers.com
ECE 353 PAPERS Lessons in Excellence--ece353papers.com
 
ECE 353 PAPERS Introduction Education--ece353papers.com
ECE 353 PAPERS Introduction Education--ece353papers.comECE 353 PAPERS Introduction Education--ece353papers.com
ECE 353 PAPERS Introduction Education--ece353papers.com
 

More from gemaherd

Need a reply 1Amy Simons is an aunt to my mum. Amy passed on.docx
Need a reply 1Amy Simons is an aunt to my mum. Amy passed on.docxNeed a reply 1Amy Simons is an aunt to my mum. Amy passed on.docx
Need a reply 1Amy Simons is an aunt to my mum. Amy passed on.docx
gemaherd
 
Need a one response for each discussion post in 50 to 75 words.docx
Need a one response for each discussion post in 50 to 75 words.docxNeed a one response for each discussion post in 50 to 75 words.docx
Need a one response for each discussion post in 50 to 75 words.docx
gemaherd
 
Nazi GermanyBrenda Thomas LaShuntae JacksonThe R.docx
Nazi GermanyBrenda Thomas LaShuntae JacksonThe R.docxNazi GermanyBrenda Thomas LaShuntae JacksonThe R.docx
Nazi GermanyBrenda Thomas LaShuntae JacksonThe R.docx
gemaherd
 
Nature GeNetics  VOLUME 46 NUMBER 10 OCTOBER 2014 1 0 8 9.docx
Nature GeNetics  VOLUME 46  NUMBER 10  OCTOBER 2014 1 0 8 9.docxNature GeNetics  VOLUME 46  NUMBER 10  OCTOBER 2014 1 0 8 9.docx
Nature GeNetics  VOLUME 46 NUMBER 10 OCTOBER 2014 1 0 8 9.docx
gemaherd
 
Nature VS NurtureResearch writing 310Joi Tucker.docx
Nature VS NurtureResearch writing 310Joi Tucker.docxNature VS NurtureResearch writing 310Joi Tucker.docx
Nature VS NurtureResearch writing 310Joi Tucker.docx
gemaherd
 

More from gemaherd (20)

Natural Selection and Patterns of Evolution WorksheetComplet.docx
Natural Selection and Patterns of Evolution WorksheetComplet.docxNatural Selection and Patterns of Evolution WorksheetComplet.docx
Natural Selection and Patterns of Evolution WorksheetComplet.docx
 
Navigate to the Pearson Assessment website. Identify an assessme.docx
Navigate to the Pearson Assessment website. Identify an assessme.docxNavigate to the Pearson Assessment website. Identify an assessme.docx
Navigate to the Pearson Assessment website. Identify an assessme.docx
 
Need a reply 1Amy Simons is an aunt to my mum. Amy passed on.docx
Need a reply 1Amy Simons is an aunt to my mum. Amy passed on.docxNeed a reply 1Amy Simons is an aunt to my mum. Amy passed on.docx
Need a reply 1Amy Simons is an aunt to my mum. Amy passed on.docx
 
Need a PowerPoint 12 pages on the following nursing theory   Peacefu.docx
Need a PowerPoint 12 pages on the following nursing theory   Peacefu.docxNeed a PowerPoint 12 pages on the following nursing theory   Peacefu.docx
Need a PowerPoint 12 pages on the following nursing theory   Peacefu.docx
 
Need 5 papers along with reference page Topic Delay in Phys.docx
Need 5 papers along with reference page Topic Delay in Phys.docxNeed 5 papers along with reference page Topic Delay in Phys.docx
Need 5 papers along with reference page Topic Delay in Phys.docx
 
Need 6 pages with APA format and referencesThere are several e.docx
Need 6 pages with APA format and referencesThere are several e.docxNeed 6 pages with APA format and referencesThere are several e.docx
Need 6 pages with APA format and referencesThere are several e.docx
 
need a research paper about leadership in 10 pages with 10 reference.docx
need a research paper about leadership in 10 pages with 10 reference.docxneed a research paper about leadership in 10 pages with 10 reference.docx
need a research paper about leadership in 10 pages with 10 reference.docx
 
Need a QUALITATIVE Journal, The topic is up to you as long as yo.docx
Need a QUALITATIVE Journal, The topic is up to you as long as yo.docxNeed a QUALITATIVE Journal, The topic is up to you as long as yo.docx
Need a QUALITATIVE Journal, The topic is up to you as long as yo.docx
 
Need a one response for each discussion post in 50 to 75 words.docx
Need a one response for each discussion post in 50 to 75 words.docxNeed a one response for each discussion post in 50 to 75 words.docx
Need a one response for each discussion post in 50 to 75 words.docx
 
Need 20 -25 pages Identify the key problems and issues in .docx
Need 20 -25 pages Identify the key problems and issues in .docxNeed 20 -25 pages Identify the key problems and issues in .docx
Need 20 -25 pages Identify the key problems and issues in .docx
 
Need a research paper with ANY ONE of the below topicsT.docx
Need a research paper with ANY ONE of the below topicsT.docxNeed a research paper with ANY ONE of the below topicsT.docx
Need a research paper with ANY ONE of the below topicsT.docx
 
Necesito un essay en espanolTema   Explique algunas de las inst.docx
Necesito un essay en espanolTema   Explique algunas de las inst.docxNecesito un essay en espanolTema   Explique algunas de las inst.docx
Necesito un essay en espanolTema   Explique algunas de las inst.docx
 
Need 400 wordsBy October of 2017, Yahoo estimated that 3 billion.docx
Need 400 wordsBy October of 2017, Yahoo estimated that 3 billion.docxNeed 400 wordsBy October of 2017, Yahoo estimated that 3 billion.docx
Need 400 wordsBy October of 2017, Yahoo estimated that 3 billion.docx
 
Need 1500 words  Dissertationresearch method on the impact of C.docx
Need 1500 words  Dissertationresearch method on the impact of C.docxNeed 1500 words  Dissertationresearch method on the impact of C.docx
Need 1500 words  Dissertationresearch method on the impact of C.docx
 
Need 250 words Initial Post and two replies of 100 words each. Will .docx
Need 250 words Initial Post and two replies of 100 words each. Will .docxNeed 250 words Initial Post and two replies of 100 words each. Will .docx
Need 250 words Initial Post and two replies of 100 words each. Will .docx
 
Nazi GermanyBrenda Thomas LaShuntae JacksonThe R.docx
Nazi GermanyBrenda Thomas LaShuntae JacksonThe R.docxNazi GermanyBrenda Thomas LaShuntae JacksonThe R.docx
Nazi GermanyBrenda Thomas LaShuntae JacksonThe R.docx
 
Need a paper with atleast 1000 - 1200 words.you can find the del.docx
Need a paper with atleast 1000 - 1200 words.you can find the del.docxNeed a paper with atleast 1000 - 1200 words.you can find the del.docx
Need a paper with atleast 1000 - 1200 words.you can find the del.docx
 
Necesito un Essay en español, alguien puede ayudarmeTema ¿Cuál.docx
Necesito un Essay en español, alguien puede ayudarmeTema ¿Cuál.docxNecesito un Essay en español, alguien puede ayudarmeTema ¿Cuál.docx
Necesito un Essay en español, alguien puede ayudarmeTema ¿Cuál.docx
 
Nature GeNetics  VOLUME 46 NUMBER 10 OCTOBER 2014 1 0 8 9.docx
Nature GeNetics  VOLUME 46  NUMBER 10  OCTOBER 2014 1 0 8 9.docxNature GeNetics  VOLUME 46  NUMBER 10  OCTOBER 2014 1 0 8 9.docx
Nature GeNetics  VOLUME 46 NUMBER 10 OCTOBER 2014 1 0 8 9.docx
 
Nature VS NurtureResearch writing 310Joi Tucker.docx
Nature VS NurtureResearch writing 310Joi Tucker.docxNature VS NurtureResearch writing 310Joi Tucker.docx
Nature VS NurtureResearch writing 310Joi Tucker.docx
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

Ms. Battle, Principal with Cincinnati Public Schools, and Ms. Sav.docx

  • 1. Ms. Battle, Principal with Cincinnati Public Schools, and Ms. Savage, a Mental Health Professional from Cincinnati Children’s Hospital begin a conversation today regarding Childhood Trauma and how it affects a child’s education. Together, they shared that without question, no matter what neighborhood you teach in, you will work with children who have experienced trauma and who have had high Adverse Childhood Experiences (ACE’s). Unfortunately, there was only so much time and this was just the beginning of the conversation. What was the most important thread to take-away from this experience is the awareness you must embrace regarding the power a teacher has to develop a positive relationship with each student you serve. One that allows you to hold hope and belief in your students, and the willingness you must have to walk through these struggles with them. In the video (link below), Whole People: Childhood Trauma, Resmaa Menaken shares that we may not have all of the answers, but maybe if we approach children who have experienced trauma, with a calm and settled response to their unsettled and reactive nervous system, we can help them find some calmness so they can recognize their need and ask for help. In her TEDTalk (link below), Dr. Allison Jackson states, “We’re not powerful enough to know who has trauma and who doesn’t, we’re not powerful enough to know who makes it and who doesn’t. But we are powerful enough to do 2 things: 1-Teach someone else about childhood trauma as a health issue, and 2- Make that risk of connection. So, the next time someone gives you the honor of walking their trauma, their pain story, in front of you, answer that call with connection.”
  • 2. For this extra credit assignment, please use the listed resources and articles to discuss: 1- What you have learned about Childhood Trauma and the effects of ACE’s 2 – Explore ideas about how you, as a teacher, will support the children in your classroom and school community who may have hidden trauma that is showing as difficult, inappropriate, and/or scary behaviors, 3 - What are things you can do to create a relationship of kindness and trust while supporting the child to get help. 2 typed pages: Times New Roman, 12 pt font, 1” margins, double spaced (appx. 600 words), cite and list your references 20 points (see rubric) RESOURCES:TEDxRVA: A Call to Connection: Making Childhood Trauma Personal | Dr. Allison Jackson https://www.youtube.com/watch?v=-HG8H4n2j9I Whole People: Childhood Trauma https://www.pbs.org/video/whole-people-101-childhood-trauma- 3swqgb/ How to Help a Traumatized Child in the Classroom https://greatergood.berkeley.edu/article/item/the_silent_epidemi c_in_our_classrooms 10 Things about Childhood Trauma Every Teacher Needs to Know https://www.weareteachers.com/10-things-about-childhood- trauma-every-teacher-needs-to-know/ Trauma can make it hard for kids to learn. Here’s how teachers learn to deal with that https://www.chalkbeat.org/posts/chicago/2018/08/01/trauma- can-make-it-hard-for-kids-to-learn-heres-how-teachers-learn-to-
  • 3. deal-with-that/ Understanding Adverse Childhood Experiences (ACE’s) https://www.menominee- nsn.gov/CommunityPages/FosteringFutures/Documents/ACESH andoutForParents.pdf RUBRIC 1 2 3 4 Organization Writing lacks logical organization. It shows some coherence but ideas lack unity. Serious errors. Writing is coherent and logically organized. Some points remain misplaced and stray from the topic. Transitions evident but not used throughout essay. Writing is coherent and logically organized with transitions used between ideas and paragraphs to create coherence. Overall unity of ideas is present. Writing shows high degree of attention to logic and reasoning of points. Unity clearly leads the reader to the conclusion and stirs thought regarding the topic Content Shows some thinking and reasoning but most ideas are underdeveloped and unoriginal. Content indicates thinking and reasoning applied with original thought on a few ideas. Content indicates original thinking and develops ideas with sufficient and firm evidence. Content indicates synthesis of ideas, in-depth analysis and evidences original thought and support for the topic. Development Main points lack detailed development. Ideas are vague with little evidence of critical thinking.
  • 4. Main points are present with limited detail and development. Some critical thinking is present. Main points well developed with quality supporting details and quantity. Critical thinking is weaved into points. Main points well developed with high quality and quantity support. Reveals high degree of critical thinking. Grammar & Mechanics Spelling, punctuation, and grammatical errors create distraction, making reading difficult; fragments, comma splices, run-ons evident. Errors are frequent. Essay has some spelling, punctuation, and grammatical errors allowing reader to follow ideas clearly. Very few fragments or run-ons. Essay is free of distracting spelling, punctuation, and grammatical errors; absent of fragments, comma splices, and run-ons. Format & Style Fails to follow format and assignment requirements; incorrect margins, spacing and indentation; neatness of essay needs attention. Some college level usage of variety in sentence patterns, diction, and rhetorical devices. Meets most format and assignment requirements; generally correct margins, spacing, and indentations; essay is neat but may have some assembly errors. Attains college level style; tone is appropriate and rhetorical devices used to enhance content; sentence variety used effectively. Meets all format and assignment requirements; margins, spacing, and indentations are correct; essay is neat and correctly assembled.
  • 5. References and citations Errors/missing in references and in-text citations. All references from course are used and are correctly listed. All in-text citations are correctly used. 1 Copyright © 2012, Elsevier Inc. All Rights Reserved Chapter 7 Discretion Cyber Attacks Protecting National Infrastructure, 1st ed. 2 • Proprietary information will be exposed if discovered by hackers • National infrastructure protection initiatives most prevent leaks – Best approach: Avoid vulnerabilities in the first place – More practically: Include a customized program focused mainly on the most critical information
  • 6. Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 7 – D is c re tio n Introduction 3 • A trusted computing base (TCB) is the totality of hardware, software, processes, and individuals considered essential to system security • A national infrastructure security protection program will include – Mandatory controls
  • 7. – Discretionary policy • A smaller, less complext TCB is easier to protect Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 7 – D is c re tio n Trusted Computing Base 4 Fig. 7.1 – Size comparison issues in a trusted computing base
  • 8. Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 7 – D is c re tio n 5 • Managing discretion is critical; questions about the following should be asked when information is being considered for disclosure – Assistance – Fixes – Limits – Legality
  • 9. – Damage – Need Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 7 – D is c re tio n Trusted Computing Base 6 • Security through obscurity is often maligned and misunderstood by security experts – Long-term hiding of vulnerabilities
  • 10. – Long-term suppression of information • Security through obscurity is not recommended for long-term protection, but it is an excellent complementary control – E.g., there’s no need to publish a system’s architecture – E.g., revealing a flaw before it’s fixed can lead to rushed work and an unnecessary complication of the situation Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 7 – D is c re tio n Security Through Obscurity
  • 11. 7 Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 7 – D is c re tio n Fig. 7.2 – Knowledge lifecycle for security through obscurity 8 Copyright © 2012, Elsevier Inc. All rights Reserved
  • 12. C h a p te r 7 – D is c re tio n Fig. 7.3 – Vulnerability disclosure lifecycle 9 • Information sharing may be inadvertent, secretive, or willful • Government most aggressive promoting information sharing • Government requests information from industry for the following reasons – Government assistance to industry – Government situational awareness
  • 13. – Politics • Government and industry have conflicting motivations Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 7 – D is c re tio n Information Sharing 10 Copyright © 2012, Elsevier Inc.
  • 14. All rights Reserved C h a p te r 7 – D is c re tio n Fig. 7.4 – Inverse value of information sharing for government and industry 11 • Adversaries regularly scout ahead and plan before an attack • Reconnaissance planning levels – Level #1: Broad, wide-reaching collection from a variety of sources – Level #2: Targeted collection, often involving automation
  • 15. – Level #3: Directly accessing the target Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 7 – D is c re tio n Information Reconnaissance 12 Copyright © 2012, Elsevier Inc. All rights Reserved C
  • 16. h a p te r 7 – D is c re tio n Fig. 7.5 – Three stages of reconnaissance for cyber security 13 • At each stage of reconnaissance, security engineers can introduce information obscurity • The specific types of information that should be obscured are – Attributes – Protections – Vulnerabilities Copyright © 2012, Elsevier Inc.
  • 17. All rights Reserved C h a p te r 7 – D is c re tio n Information Reconnaissance 14 • Layering methods of obscurity and discretion adds depth to defensive security program • Even with layered obscurity, asset information can find a way out – Public speaking – Approved external site
  • 18. – Search for leakage Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 7 – D is c re tio n Obscurity Layers 15 Copyright © 2012, Elsevier Inc. All rights Reserved C h
  • 19. a p te r 7 – D is c re tio n Fig. 7.6 – Obscurity layers to protect asset information 16 • Governments have been successful at protecting information by compartmentalizing information and individuals – Information is classified – Groups of individuals are granted clearance • Compartmentalization defines boundaries, which helps guides decisions • Private companies can benefit from this model Copyright © 2012, Elsevier Inc.
  • 20. All rights Reserved C h a p te r 7 – D is c re tio n Organizational Compartments 17 Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te
  • 21. r 7 – D is c re tio n Fig. 7.7 – Using clearances and classifications to control information disclosure 18 Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 7 – D
  • 22. is c re tio n Fig. 7.8 – Example commercial mapping of clearances and classifications 19 • To implement a national discretion program will require – TCB definition – Reduced emphasis on information sharing – Coexistence with hacking community – Obscurity layered model – Commercial information protection models Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te