SlideShare a Scribd company logo
1 of 23
Ms. Battle, Principal with Cincinnati Public Schools, and Ms.
Savage, a Mental Health Professional from Cincinnati
Children’s Hospital begin a conversation today regarding
Childhood Trauma and how it affects a child’s education.
Together, they shared that without question, no matter what
neighborhood you teach in, you will work with children who
have experienced trauma and who have had high Adverse
Childhood Experiences (ACE’s).
Unfortunately, there was only so much time and this was just
the beginning of the conversation. What was the most
important thread to take-away from this experience is the
awareness you must embrace regarding the power a teacher has
to develop a positive relationship with each student you serve.
One that allows you to hold hope and belief in your students,
and the willingness you must have to walk through these
struggles with them.
In the video (link below), Whole People: Childhood Trauma,
Resmaa Menaken shares that we may not have all of the
answers, but maybe if we approach children who have
experienced trauma, with a calm and settled response to their
unsettled and reactive nervous system, we can help them find
some calmness so they can recognize their need and ask for
help.
In her TEDTalk (link below), Dr. Allison Jackson states, “We’re
not powerful enough to know who has trauma and who doesn’t,
we’re not powerful enough to know who makes it and who
doesn’t. But we are powerful enough to do 2 things: 1-Teach
someone else about childhood trauma as a health issue, and 2-
Make that risk of connection. So, the next time someone gives
you the honor of walking their trauma, their pain story, in front
of you, answer that call with connection.”
For this extra credit assignment, please use the listed resources
and articles to discuss:
1- What you have learned about Childhood Trauma and the
effects of ACE’s
2 – Explore ideas about how you, as a teacher, will support the
children in your classroom and school community who may
have hidden trauma that is showing as difficult, inappropriate,
and/or scary behaviors,
3 - What are things you can do to create a relationship of
kindness and trust while supporting the child to get help.
2 typed pages: Times New Roman, 12 pt font, 1” margins,
double spaced (appx. 600 words), cite and list your references
20 points (see rubric)
RESOURCES:TEDxRVA: A Call to Connection: Making
Childhood Trauma Personal | Dr. Allison Jackson
https://www.youtube.com/watch?v=-HG8H4n2j9I
Whole People: Childhood Trauma
https://www.pbs.org/video/whole-people-101-childhood-trauma-
3swqgb/
How to Help a Traumatized Child in the Classroom
https://greatergood.berkeley.edu/article/item/the_silent_epidemi
c_in_our_classrooms
10 Things about Childhood Trauma Every Teacher Needs to
Know
https://www.weareteachers.com/10-things-about-childhood-
trauma-every-teacher-needs-to-know/
Trauma can make it hard for kids to learn. Here’s how teachers
learn to deal with that
https://www.chalkbeat.org/posts/chicago/2018/08/01/trauma-
can-make-it-hard-for-kids-to-learn-heres-how-teachers-learn-to-
deal-with-that/
Understanding Adverse Childhood Experiences (ACE’s)
https://www.menominee-
nsn.gov/CommunityPages/FosteringFutures/Documents/ACESH
andoutForParents.pdf
RUBRIC
1
2
3
4
Organization
Writing lacks logical organization. It shows some coherence but
ideas lack unity. Serious errors.
Writing is coherent and logically organized. Some points remain
misplaced and stray from the topic. Transitions evident but not
used throughout essay.
Writing is coherent and logically organized with transitions
used between ideas and paragraphs to create coherence. Overall
unity of ideas is present.
Writing shows high degree of attention to logic and reasoning
of points. Unity clearly leads the reader to the conclusion and
stirs thought regarding the topic
Content
Shows some thinking and reasoning but most ideas are
underdeveloped and unoriginal.
Content indicates thinking and reasoning applied with original
thought on a few ideas.
Content indicates original thinking and develops ideas with
sufficient and firm evidence.
Content indicates synthesis of ideas, in-depth analysis and
evidences original thought and support for the topic.
Development
Main points lack detailed development. Ideas are vague with
little evidence of critical thinking.
Main points are present with limited detail and development.
Some critical thinking is present.
Main points well developed with quality supporting details and
quantity. Critical thinking is weaved into points.
Main points well developed with high quality and quantity
support. Reveals high degree of critical thinking.
Grammar & Mechanics
Spelling, punctuation, and grammatical errors create distraction,
making reading difficult; fragments, comma splices, run-ons
evident. Errors are frequent.
Essay has some spelling, punctuation, and grammatical errors
allowing reader to follow ideas clearly. Very few fragments or
run-ons.
Essay is free of distracting spelling, punctuation, and
grammatical errors; absent of fragments, comma splices, and
run-ons.
Format & Style
Fails to follow format and assignment requirements; incorrect
margins, spacing and indentation; neatness of essay needs
attention.
Some college level usage of variety in sentence patterns,
diction, and rhetorical devices.
Meets most format and assignment requirements; generally
correct margins, spacing, and indentations; essay is neat but
may have some assembly errors.
Attains college level style; tone is appropriate and rhetorical
devices used to enhance content; sentence variety used
effectively.
Meets all format and assignment requirements; margins,
spacing, and indentations are correct; essay is neat and correctly
assembled.
References and citations
Errors/missing in references and in-text citations.
All references from course are used and are correctly listed.
All in-text citations are correctly used.
1
Copyright © 2012, Elsevier Inc.
All Rights Reserved
Chapter 7
Discretion
Cyber Attacks
Protecting National Infrastructure, 1st ed.
2
• Proprietary information will be exposed if discovered
by hackers
• National infrastructure protection initiatives most
prevent leaks
– Best approach: Avoid vulnerabilities in the first place
– More practically: Include a customized program focused
mainly on the most critical information
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Introduction
3
• A trusted computing base (TCB) is the totality of
hardware, software, processes, and individuals
considered essential to system security
• A national infrastructure security protection program
will include
– Mandatory controls
– Discretionary policy
• A smaller, less complext TCB is easier to protect
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Trusted Computing Base
4
Fig. 7.1 – Size comparison issues in a
trusted computing base
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
5
• Managing discretion is critical; questions about the
following should be asked when information is being
considered for disclosure
– Assistance
– Fixes
– Limits
– Legality
– Damage
– Need
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Trusted Computing Base
6
• Security through obscurity is often maligned and
misunderstood by security experts
– Long-term hiding of vulnerabilities
– Long-term suppression of information
• Security through obscurity is not recommended for
long-term protection, but it is an excellent
complementary control
– E.g., there’s no need to publish a system’s architecture
– E.g., revealing a flaw before it’s fixed can lead to rushed
work and an unnecessary complication of the situation
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Security Through Obscurity
7
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Fig. 7.2 – Knowledge lifecycle for
security through obscurity
8
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Fig. 7.3 – Vulnerability disclosure
lifecycle
9
• Information sharing may be inadvertent, secretive, or
willful
• Government most aggressive promoting information
sharing
• Government requests information from industry for
the following reasons
– Government assistance to industry
– Government situational awareness
– Politics
• Government and industry have conflicting
motivations
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Information Sharing
10
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Fig. 7.4 – Inverse value of information
sharing for government and industry
11
• Adversaries regularly scout ahead and plan before an
attack
• Reconnaissance planning levels
– Level #1: Broad, wide-reaching collection from a variety of
sources
– Level #2: Targeted collection, often involving automation
– Level #3: Directly accessing the target
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Information Reconnaissance
12
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Fig. 7.5 – Three stages of
reconnaissance for cyber security
13
• At each stage of reconnaissance, security engineers
can introduce information obscurity
• The specific types of information that should be
obscured are
– Attributes
– Protections
– Vulnerabilities
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Information Reconnaissance
14
• Layering methods of obscurity and discretion adds
depth to defensive security program
• Even with layered obscurity, asset information can
find a way out
– Public speaking
– Approved external site
– Search for leakage
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Obscurity Layers
15
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Fig. 7.6 – Obscurity layers to protect
asset information
16
• Governments have been successful at protecting
information by compartmentalizing information and
individuals
– Information is classified
– Groups of individuals are granted clearance
• Compartmentalization defines boundaries, which
helps guides decisions
• Private companies can benefit from this model
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Organizational Compartments
17
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Fig. 7.7 – Using clearances and
classifications to control information
disclosure
18
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
Fig. 7.8 – Example commercial mapping
of clearances and classifications
19
• To implement a national discretion program will
require
– TCB definition
– Reduced emphasis on information sharing
– Coexistence with hacking community
– Obscurity layered model
– Commercial information protection models
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 7
–
D
is
c
re
tio
n
National Discretion Program

More Related Content

Similar to Ms. Battle, Principal with Cincinnati Public Schools, and Ms. Sav.docx

Ece 353 ash Motivated Minds/newtonhelp.com
Ece 353 ash Motivated Minds/newtonhelp.comEce 353 ash Motivated Minds/newtonhelp.com
Ece 353 ash Motivated Minds/newtonhelp.comamaranthbeg60
 
Ece 353 ash Education is Power/newtonhelp.com
Ece 353 ash Education is Power/newtonhelp.comEce 353 ash Education is Power/newtonhelp.com
Ece 353 ash Education is Power/newtonhelp.comamaranthbeg80
 
Ece 353 ash Extraordinary Success/newtonhelp.com
Ece 353 ash Extraordinary Success/newtonhelp.comEce 353 ash Extraordinary Success/newtonhelp.com
Ece 353 ash Extraordinary Success/newtonhelp.comamaranthbeg120
 
Ece 353 ash Your world/newtonhelp.com
Ece 353 ash Your world/newtonhelp.comEce 353 ash Your world/newtonhelp.com
Ece 353 ash Your world/newtonhelp.comamaranthbeg100
 
Discussion 1 Use references and citations Research to find infor
Discussion 1 Use references and citations Research to find inforDiscussion 1 Use references and citations Research to find infor
Discussion 1 Use references and citations Research to find inforVinaOconner450
 
An explanation of the Doing Ethics Technique Graham R Seach .docx
An explanation of the Doing Ethics Technique Graham R Seach .docxAn explanation of the Doing Ethics Technique Graham R Seach .docx
An explanation of the Doing Ethics Technique Graham R Seach .docxnettletondevon
 
Steps To Writing A Persuasive Essay
Steps To Writing A Persuasive EssaySteps To Writing A Persuasive Essay
Steps To Writing A Persuasive EssayDiana Meza
 
IRJET- Learning Assistance System for Autistic Child
IRJET- Learning Assistance System for Autistic ChildIRJET- Learning Assistance System for Autistic Child
IRJET- Learning Assistance System for Autistic ChildIRJET Journal
 
Ece 353 Inspiring Innovation--tutorialrank.com
Ece 353 Inspiring Innovation--tutorialrank.comEce 353 Inspiring Innovation--tutorialrank.com
Ece 353 Inspiring Innovation--tutorialrank.comPrescottLunt388
 
Thesis Statement Essays
Thesis Statement EssaysThesis Statement Essays
Thesis Statement EssaysTracy Ocampo
 
ECE 353 PAPERS Become Exceptional--ece353papers.com
ECE 353 PAPERS Become Exceptional--ece353papers.comECE 353 PAPERS Become Exceptional--ece353papers.com
ECE 353 PAPERS Become Exceptional--ece353papers.comagathachristie114
 
ECE 353 PAPERS Lessons in Excellence--ece353papers.com
ECE 353 PAPERS Lessons in Excellence--ece353papers.comECE 353 PAPERS Lessons in Excellence--ece353papers.com
ECE 353 PAPERS Lessons in Excellence--ece353papers.comthomashard86
 
ECE 353 PAPERS Introduction Education--ece353papers.com
ECE 353 PAPERS Introduction Education--ece353papers.comECE 353 PAPERS Introduction Education--ece353papers.com
ECE 353 PAPERS Introduction Education--ece353papers.comagathachristie267
 

Similar to Ms. Battle, Principal with Cincinnati Public Schools, and Ms. Sav.docx (13)

Ece 353 ash Motivated Minds/newtonhelp.com
Ece 353 ash Motivated Minds/newtonhelp.comEce 353 ash Motivated Minds/newtonhelp.com
Ece 353 ash Motivated Minds/newtonhelp.com
 
Ece 353 ash Education is Power/newtonhelp.com
Ece 353 ash Education is Power/newtonhelp.comEce 353 ash Education is Power/newtonhelp.com
Ece 353 ash Education is Power/newtonhelp.com
 
Ece 353 ash Extraordinary Success/newtonhelp.com
Ece 353 ash Extraordinary Success/newtonhelp.comEce 353 ash Extraordinary Success/newtonhelp.com
Ece 353 ash Extraordinary Success/newtonhelp.com
 
Ece 353 ash Your world/newtonhelp.com
Ece 353 ash Your world/newtonhelp.comEce 353 ash Your world/newtonhelp.com
Ece 353 ash Your world/newtonhelp.com
 
Discussion 1 Use references and citations Research to find infor
Discussion 1 Use references and citations Research to find inforDiscussion 1 Use references and citations Research to find infor
Discussion 1 Use references and citations Research to find infor
 
An explanation of the Doing Ethics Technique Graham R Seach .docx
An explanation of the Doing Ethics Technique Graham R Seach .docxAn explanation of the Doing Ethics Technique Graham R Seach .docx
An explanation of the Doing Ethics Technique Graham R Seach .docx
 
Steps To Writing A Persuasive Essay
Steps To Writing A Persuasive EssaySteps To Writing A Persuasive Essay
Steps To Writing A Persuasive Essay
 
IRJET- Learning Assistance System for Autistic Child
IRJET- Learning Assistance System for Autistic ChildIRJET- Learning Assistance System for Autistic Child
IRJET- Learning Assistance System for Autistic Child
 
Ece 353 Inspiring Innovation--tutorialrank.com
Ece 353 Inspiring Innovation--tutorialrank.comEce 353 Inspiring Innovation--tutorialrank.com
Ece 353 Inspiring Innovation--tutorialrank.com
 
Thesis Statement Essays
Thesis Statement EssaysThesis Statement Essays
Thesis Statement Essays
 
ECE 353 PAPERS Become Exceptional--ece353papers.com
ECE 353 PAPERS Become Exceptional--ece353papers.comECE 353 PAPERS Become Exceptional--ece353papers.com
ECE 353 PAPERS Become Exceptional--ece353papers.com
 
ECE 353 PAPERS Lessons in Excellence--ece353papers.com
ECE 353 PAPERS Lessons in Excellence--ece353papers.comECE 353 PAPERS Lessons in Excellence--ece353papers.com
ECE 353 PAPERS Lessons in Excellence--ece353papers.com
 
ECE 353 PAPERS Introduction Education--ece353papers.com
ECE 353 PAPERS Introduction Education--ece353papers.comECE 353 PAPERS Introduction Education--ece353papers.com
ECE 353 PAPERS Introduction Education--ece353papers.com
 

More from roushhsiu

Most women experience their closest friendships with those of th.docx
Most women experience their closest friendships with those of th.docxMost women experience their closest friendships with those of th.docx
Most women experience their closest friendships with those of th.docxroushhsiu
 
Morgan and Dunn JD have hired you to assist with a case involvin.docx
Morgan and Dunn JD have hired you to assist with a case involvin.docxMorgan and Dunn JD have hired you to assist with a case involvin.docx
Morgan and Dunn JD have hired you to assist with a case involvin.docxroushhsiu
 
Mortality rates vary between the Hispanic community and the gene.docx
Mortality rates vary between the Hispanic community and the gene.docxMortality rates vary between the Hispanic community and the gene.docx
Mortality rates vary between the Hispanic community and the gene.docxroushhsiu
 
Moreno Industries has adopted the following production budget for th.docx
Moreno Industries has adopted the following production budget for th.docxMoreno Industries has adopted the following production budget for th.docx
Moreno Industries has adopted the following production budget for th.docxroushhsiu
 
Most people have a blend of leadership styles that they use. Some le.docx
Most people have a blend of leadership styles that they use. Some le.docxMost people have a blend of leadership styles that they use. Some le.docx
Most people have a blend of leadership styles that they use. Some le.docxroushhsiu
 
Moral rights as opposed to legal rights are not dependent on a polit.docx
Moral rights as opposed to legal rights are not dependent on a polit.docxMoral rights as opposed to legal rights are not dependent on a polit.docx
Moral rights as opposed to legal rights are not dependent on a polit.docxroushhsiu
 
Montasari, R., & Hill, R. (2019). Next-Generation Digital Forens.docx
Montasari, R., & Hill, R. (2019). Next-Generation Digital Forens.docxMontasari, R., & Hill, R. (2019). Next-Generation Digital Forens.docx
Montasari, R., & Hill, R. (2019). Next-Generation Digital Forens.docxroushhsiu
 
Module Outcome  You will be able to describe the historical force.docx
Module Outcome  You will be able to describe the historical force.docxModule Outcome  You will be able to describe the historical force.docx
Module Outcome  You will be able to describe the historical force.docxroushhsiu
 
Molière believed that the duty of comedy is to correct human vices b.docx
Molière believed that the duty of comedy is to correct human vices b.docxMolière believed that the duty of comedy is to correct human vices b.docx
Molière believed that the duty of comedy is to correct human vices b.docxroushhsiu
 
Module One Making Budgetary DecisionsDirectionsBased on the i.docx
Module One Making Budgetary DecisionsDirectionsBased on the i.docxModule One Making Budgetary DecisionsDirectionsBased on the i.docx
Module One Making Budgetary DecisionsDirectionsBased on the i.docxroushhsiu
 
Monitoring Data and Quality ImprovementAnswer one of two que.docx
Monitoring Data and Quality ImprovementAnswer one of two que.docxMonitoring Data and Quality ImprovementAnswer one of two que.docx
Monitoring Data and Quality ImprovementAnswer one of two que.docxroushhsiu
 
Monitoring Global Supply Chains† Jodi L. Short Prof.docx
Monitoring Global Supply Chains†   Jodi L. Short Prof.docxMonitoring Global Supply Chains†   Jodi L. Short Prof.docx
Monitoring Global Supply Chains† Jodi L. Short Prof.docxroushhsiu
 
Morality Relativism & the Concerns it RaisesI want to g.docx
Morality Relativism & the Concerns it RaisesI want to g.docxMorality Relativism & the Concerns it RaisesI want to g.docx
Morality Relativism & the Concerns it RaisesI want to g.docxroushhsiu
 
Module 9 content You will perform a history of a cardiac pro.docx
Module 9 content You will perform a history of a cardiac pro.docxModule 9 content You will perform a history of a cardiac pro.docx
Module 9 content You will perform a history of a cardiac pro.docxroushhsiu
 
Module Assessment 4 TANM ApplicationsBUS2 190Last name, Fir.docx
Module Assessment 4 TANM ApplicationsBUS2 190Last name, Fir.docxModule Assessment 4 TANM ApplicationsBUS2 190Last name, Fir.docx
Module Assessment 4 TANM ApplicationsBUS2 190Last name, Fir.docxroushhsiu
 
Module Assignment Clinical Decision Support SystemsLearning Outcome.docx
Module Assignment Clinical Decision Support SystemsLearning Outcome.docxModule Assignment Clinical Decision Support SystemsLearning Outcome.docx
Module Assignment Clinical Decision Support SystemsLearning Outcome.docxroushhsiu
 
MONTCLAIR UNIVERSITYLAWS 362 LEGAL WRITING MIDTERM.docx
MONTCLAIR UNIVERSITYLAWS 362  LEGAL WRITING   MIDTERM.docxMONTCLAIR UNIVERSITYLAWS 362  LEGAL WRITING   MIDTERM.docx
MONTCLAIR UNIVERSITYLAWS 362 LEGAL WRITING MIDTERM.docxroushhsiu
 
MODULE 8You will perform a history of a respiratory problem th.docx
MODULE 8You will perform a history of a respiratory problem th.docxMODULE 8You will perform a history of a respiratory problem th.docx
MODULE 8You will perform a history of a respiratory problem th.docxroushhsiu
 
Most organizations, including hospitals, adopt both Mission and Visi.docx
Most organizations, including hospitals, adopt both Mission and Visi.docxMost organizations, including hospitals, adopt both Mission and Visi.docx
Most organizations, including hospitals, adopt both Mission and Visi.docxroushhsiu
 
More like this Abstract TranslateFull Text Translate.docx
More like this Abstract TranslateFull Text Translate.docxMore like this Abstract TranslateFull Text Translate.docx
More like this Abstract TranslateFull Text Translate.docxroushhsiu
 

More from roushhsiu (20)

Most women experience their closest friendships with those of th.docx
Most women experience their closest friendships with those of th.docxMost women experience their closest friendships with those of th.docx
Most women experience their closest friendships with those of th.docx
 
Morgan and Dunn JD have hired you to assist with a case involvin.docx
Morgan and Dunn JD have hired you to assist with a case involvin.docxMorgan and Dunn JD have hired you to assist with a case involvin.docx
Morgan and Dunn JD have hired you to assist with a case involvin.docx
 
Mortality rates vary between the Hispanic community and the gene.docx
Mortality rates vary between the Hispanic community and the gene.docxMortality rates vary between the Hispanic community and the gene.docx
Mortality rates vary between the Hispanic community and the gene.docx
 
Moreno Industries has adopted the following production budget for th.docx
Moreno Industries has adopted the following production budget for th.docxMoreno Industries has adopted the following production budget for th.docx
Moreno Industries has adopted the following production budget for th.docx
 
Most people have a blend of leadership styles that they use. Some le.docx
Most people have a blend of leadership styles that they use. Some le.docxMost people have a blend of leadership styles that they use. Some le.docx
Most people have a blend of leadership styles that they use. Some le.docx
 
Moral rights as opposed to legal rights are not dependent on a polit.docx
Moral rights as opposed to legal rights are not dependent on a polit.docxMoral rights as opposed to legal rights are not dependent on a polit.docx
Moral rights as opposed to legal rights are not dependent on a polit.docx
 
Montasari, R., & Hill, R. (2019). Next-Generation Digital Forens.docx
Montasari, R., & Hill, R. (2019). Next-Generation Digital Forens.docxMontasari, R., & Hill, R. (2019). Next-Generation Digital Forens.docx
Montasari, R., & Hill, R. (2019). Next-Generation Digital Forens.docx
 
Module Outcome  You will be able to describe the historical force.docx
Module Outcome  You will be able to describe the historical force.docxModule Outcome  You will be able to describe the historical force.docx
Module Outcome  You will be able to describe the historical force.docx
 
Molière believed that the duty of comedy is to correct human vices b.docx
Molière believed that the duty of comedy is to correct human vices b.docxMolière believed that the duty of comedy is to correct human vices b.docx
Molière believed that the duty of comedy is to correct human vices b.docx
 
Module One Making Budgetary DecisionsDirectionsBased on the i.docx
Module One Making Budgetary DecisionsDirectionsBased on the i.docxModule One Making Budgetary DecisionsDirectionsBased on the i.docx
Module One Making Budgetary DecisionsDirectionsBased on the i.docx
 
Monitoring Data and Quality ImprovementAnswer one of two que.docx
Monitoring Data and Quality ImprovementAnswer one of two que.docxMonitoring Data and Quality ImprovementAnswer one of two que.docx
Monitoring Data and Quality ImprovementAnswer one of two que.docx
 
Monitoring Global Supply Chains† Jodi L. Short Prof.docx
Monitoring Global Supply Chains†   Jodi L. Short Prof.docxMonitoring Global Supply Chains†   Jodi L. Short Prof.docx
Monitoring Global Supply Chains† Jodi L. Short Prof.docx
 
Morality Relativism & the Concerns it RaisesI want to g.docx
Morality Relativism & the Concerns it RaisesI want to g.docxMorality Relativism & the Concerns it RaisesI want to g.docx
Morality Relativism & the Concerns it RaisesI want to g.docx
 
Module 9 content You will perform a history of a cardiac pro.docx
Module 9 content You will perform a history of a cardiac pro.docxModule 9 content You will perform a history of a cardiac pro.docx
Module 9 content You will perform a history of a cardiac pro.docx
 
Module Assessment 4 TANM ApplicationsBUS2 190Last name, Fir.docx
Module Assessment 4 TANM ApplicationsBUS2 190Last name, Fir.docxModule Assessment 4 TANM ApplicationsBUS2 190Last name, Fir.docx
Module Assessment 4 TANM ApplicationsBUS2 190Last name, Fir.docx
 
Module Assignment Clinical Decision Support SystemsLearning Outcome.docx
Module Assignment Clinical Decision Support SystemsLearning Outcome.docxModule Assignment Clinical Decision Support SystemsLearning Outcome.docx
Module Assignment Clinical Decision Support SystemsLearning Outcome.docx
 
MONTCLAIR UNIVERSITYLAWS 362 LEGAL WRITING MIDTERM.docx
MONTCLAIR UNIVERSITYLAWS 362  LEGAL WRITING   MIDTERM.docxMONTCLAIR UNIVERSITYLAWS 362  LEGAL WRITING   MIDTERM.docx
MONTCLAIR UNIVERSITYLAWS 362 LEGAL WRITING MIDTERM.docx
 
MODULE 8You will perform a history of a respiratory problem th.docx
MODULE 8You will perform a history of a respiratory problem th.docxMODULE 8You will perform a history of a respiratory problem th.docx
MODULE 8You will perform a history of a respiratory problem th.docx
 
Most organizations, including hospitals, adopt both Mission and Visi.docx
Most organizations, including hospitals, adopt both Mission and Visi.docxMost organizations, including hospitals, adopt both Mission and Visi.docx
Most organizations, including hospitals, adopt both Mission and Visi.docx
 
More like this Abstract TranslateFull Text Translate.docx
More like this Abstract TranslateFull Text Translate.docxMore like this Abstract TranslateFull Text Translate.docx
More like this Abstract TranslateFull Text Translate.docx
 

Recently uploaded

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 

Recently uploaded (20)

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Ms. Battle, Principal with Cincinnati Public Schools, and Ms. Sav.docx

  • 1. Ms. Battle, Principal with Cincinnati Public Schools, and Ms. Savage, a Mental Health Professional from Cincinnati Children’s Hospital begin a conversation today regarding Childhood Trauma and how it affects a child’s education. Together, they shared that without question, no matter what neighborhood you teach in, you will work with children who have experienced trauma and who have had high Adverse Childhood Experiences (ACE’s). Unfortunately, there was only so much time and this was just the beginning of the conversation. What was the most important thread to take-away from this experience is the awareness you must embrace regarding the power a teacher has to develop a positive relationship with each student you serve. One that allows you to hold hope and belief in your students, and the willingness you must have to walk through these struggles with them. In the video (link below), Whole People: Childhood Trauma, Resmaa Menaken shares that we may not have all of the answers, but maybe if we approach children who have experienced trauma, with a calm and settled response to their unsettled and reactive nervous system, we can help them find some calmness so they can recognize their need and ask for help. In her TEDTalk (link below), Dr. Allison Jackson states, “We’re not powerful enough to know who has trauma and who doesn’t, we’re not powerful enough to know who makes it and who doesn’t. But we are powerful enough to do 2 things: 1-Teach someone else about childhood trauma as a health issue, and 2- Make that risk of connection. So, the next time someone gives you the honor of walking their trauma, their pain story, in front of you, answer that call with connection.”
  • 2. For this extra credit assignment, please use the listed resources and articles to discuss: 1- What you have learned about Childhood Trauma and the effects of ACE’s 2 – Explore ideas about how you, as a teacher, will support the children in your classroom and school community who may have hidden trauma that is showing as difficult, inappropriate, and/or scary behaviors, 3 - What are things you can do to create a relationship of kindness and trust while supporting the child to get help. 2 typed pages: Times New Roman, 12 pt font, 1” margins, double spaced (appx. 600 words), cite and list your references 20 points (see rubric) RESOURCES:TEDxRVA: A Call to Connection: Making Childhood Trauma Personal | Dr. Allison Jackson https://www.youtube.com/watch?v=-HG8H4n2j9I Whole People: Childhood Trauma https://www.pbs.org/video/whole-people-101-childhood-trauma- 3swqgb/ How to Help a Traumatized Child in the Classroom https://greatergood.berkeley.edu/article/item/the_silent_epidemi c_in_our_classrooms 10 Things about Childhood Trauma Every Teacher Needs to Know https://www.weareteachers.com/10-things-about-childhood- trauma-every-teacher-needs-to-know/ Trauma can make it hard for kids to learn. Here’s how teachers learn to deal with that https://www.chalkbeat.org/posts/chicago/2018/08/01/trauma- can-make-it-hard-for-kids-to-learn-heres-how-teachers-learn-to-
  • 3. deal-with-that/ Understanding Adverse Childhood Experiences (ACE’s) https://www.menominee- nsn.gov/CommunityPages/FosteringFutures/Documents/ACESH andoutForParents.pdf RUBRIC 1 2 3 4 Organization Writing lacks logical organization. It shows some coherence but ideas lack unity. Serious errors. Writing is coherent and logically organized. Some points remain misplaced and stray from the topic. Transitions evident but not used throughout essay. Writing is coherent and logically organized with transitions used between ideas and paragraphs to create coherence. Overall unity of ideas is present. Writing shows high degree of attention to logic and reasoning of points. Unity clearly leads the reader to the conclusion and stirs thought regarding the topic Content Shows some thinking and reasoning but most ideas are underdeveloped and unoriginal. Content indicates thinking and reasoning applied with original thought on a few ideas. Content indicates original thinking and develops ideas with sufficient and firm evidence. Content indicates synthesis of ideas, in-depth analysis and evidences original thought and support for the topic. Development Main points lack detailed development. Ideas are vague with little evidence of critical thinking.
  • 4. Main points are present with limited detail and development. Some critical thinking is present. Main points well developed with quality supporting details and quantity. Critical thinking is weaved into points. Main points well developed with high quality and quantity support. Reveals high degree of critical thinking. Grammar & Mechanics Spelling, punctuation, and grammatical errors create distraction, making reading difficult; fragments, comma splices, run-ons evident. Errors are frequent. Essay has some spelling, punctuation, and grammatical errors allowing reader to follow ideas clearly. Very few fragments or run-ons. Essay is free of distracting spelling, punctuation, and grammatical errors; absent of fragments, comma splices, and run-ons. Format & Style Fails to follow format and assignment requirements; incorrect margins, spacing and indentation; neatness of essay needs attention. Some college level usage of variety in sentence patterns, diction, and rhetorical devices. Meets most format and assignment requirements; generally correct margins, spacing, and indentations; essay is neat but may have some assembly errors. Attains college level style; tone is appropriate and rhetorical devices used to enhance content; sentence variety used effectively. Meets all format and assignment requirements; margins, spacing, and indentations are correct; essay is neat and correctly assembled.
  • 5. References and citations Errors/missing in references and in-text citations. All references from course are used and are correctly listed. All in-text citations are correctly used. 1 Copyright © 2012, Elsevier Inc. All Rights Reserved Chapter 7 Discretion Cyber Attacks Protecting National Infrastructure, 1st ed. 2 • Proprietary information will be exposed if discovered by hackers • National infrastructure protection initiatives most prevent leaks – Best approach: Avoid vulnerabilities in the first place – More practically: Include a customized program focused mainly on the most critical information
  • 6. Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 7 – D is c re tio n Introduction 3 • A trusted computing base (TCB) is the totality of hardware, software, processes, and individuals considered essential to system security • A national infrastructure security protection program will include – Mandatory controls
  • 7. – Discretionary policy • A smaller, less complext TCB is easier to protect Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 7 – D is c re tio n Trusted Computing Base 4 Fig. 7.1 – Size comparison issues in a trusted computing base
  • 8. Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 7 – D is c re tio n 5 • Managing discretion is critical; questions about the following should be asked when information is being considered for disclosure – Assistance – Fixes – Limits – Legality
  • 9. – Damage – Need Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 7 – D is c re tio n Trusted Computing Base 6 • Security through obscurity is often maligned and misunderstood by security experts – Long-term hiding of vulnerabilities
  • 10. – Long-term suppression of information • Security through obscurity is not recommended for long-term protection, but it is an excellent complementary control – E.g., there’s no need to publish a system’s architecture – E.g., revealing a flaw before it’s fixed can lead to rushed work and an unnecessary complication of the situation Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 7 – D is c re tio n Security Through Obscurity
  • 11. 7 Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 7 – D is c re tio n Fig. 7.2 – Knowledge lifecycle for security through obscurity 8 Copyright © 2012, Elsevier Inc. All rights Reserved
  • 12. C h a p te r 7 – D is c re tio n Fig. 7.3 – Vulnerability disclosure lifecycle 9 • Information sharing may be inadvertent, secretive, or willful • Government most aggressive promoting information sharing • Government requests information from industry for the following reasons – Government assistance to industry – Government situational awareness
  • 13. – Politics • Government and industry have conflicting motivations Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 7 – D is c re tio n Information Sharing 10 Copyright © 2012, Elsevier Inc.
  • 14. All rights Reserved C h a p te r 7 – D is c re tio n Fig. 7.4 – Inverse value of information sharing for government and industry 11 • Adversaries regularly scout ahead and plan before an attack • Reconnaissance planning levels – Level #1: Broad, wide-reaching collection from a variety of sources – Level #2: Targeted collection, often involving automation
  • 15. – Level #3: Directly accessing the target Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 7 – D is c re tio n Information Reconnaissance 12 Copyright © 2012, Elsevier Inc. All rights Reserved C
  • 16. h a p te r 7 – D is c re tio n Fig. 7.5 – Three stages of reconnaissance for cyber security 13 • At each stage of reconnaissance, security engineers can introduce information obscurity • The specific types of information that should be obscured are – Attributes – Protections – Vulnerabilities Copyright © 2012, Elsevier Inc.
  • 17. All rights Reserved C h a p te r 7 – D is c re tio n Information Reconnaissance 14 • Layering methods of obscurity and discretion adds depth to defensive security program • Even with layered obscurity, asset information can find a way out – Public speaking – Approved external site
  • 18. – Search for leakage Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 7 – D is c re tio n Obscurity Layers 15 Copyright © 2012, Elsevier Inc. All rights Reserved C h
  • 19. a p te r 7 – D is c re tio n Fig. 7.6 – Obscurity layers to protect asset information 16 • Governments have been successful at protecting information by compartmentalizing information and individuals – Information is classified – Groups of individuals are granted clearance • Compartmentalization defines boundaries, which helps guides decisions • Private companies can benefit from this model Copyright © 2012, Elsevier Inc.
  • 20. All rights Reserved C h a p te r 7 – D is c re tio n Organizational Compartments 17 Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te
  • 21. r 7 – D is c re tio n Fig. 7.7 – Using clearances and classifications to control information disclosure 18 Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 7 – D
  • 22. is c re tio n Fig. 7.8 – Example commercial mapping of clearances and classifications 19 • To implement a national discretion program will require – TCB definition – Reduced emphasis on information sharing – Coexistence with hacking community – Obscurity layered model – Commercial information protection models Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te