SlideShare a Scribd company logo
1 of 17
Assignment 1: Designing Compliance within the LAN-to-WAN
Domain
Note: Review the page requirements and formatting instructions
for this assignment closely. Graphically depicted solutions, as
well as the standardized formatting requirements, do NOT count
toward the overall page length.
Imagine you are an Information Systems Security Officer for a
medium-sized financial services firm that has operations in four
(4) states (Virginia, Florida, Arizona, and California). Due to
the highly sensitive data created, stored, and transported by
your organization, the CIO is concerned with implementing
proper security controls for the LAN-to-WAN domain.
Specifically, the CIO is concerned with the following areas:
· Protecting data privacy across the WAN
· Filtering undesirable network traffic from the Internet
· Filtering the traffic to the Internet that does not adhere to the
organizational acceptable use policy (AUP) for the Web
· Having a zone that allows access for anonymous users but
aggressively controls information exchange with internal
resources
· Having an area designed to trap attackers in order to monitor
attacker activities
· Allowing a means to monitor network traffic in real time as a
means to identify and block unusual activity
· Hiding internal IP addresses
· Allowing operating system and application patch management
The CIO has tasked you with proposing a series of hardware and
software controls designed to provide security for the LAN-to-
WAN domain. The CIO anticipates receiving both a written
report and diagram(s) to support your recommendations.
Write a three to five page paper in which you:
1. Use MS Visio or an open source equivalent to graphically
depict a solution for the provided scenario that will:
a. filter undesirable network traffic from the Internet
b. filter Web traffic to the Internet that does not adhere to the
organizational AUP for the Web
c. allow for a zone for anonymous users but aggressively
controls information exchange with internal resources
d. allow for an area designed to trap attackers in order to
monitor attacker activities
e. offer a means to monitor network traffic in real time as a
means to identify and block unusual activity
f. hide internal IP addresses
2. Identify the fundamentals of public key infrastructure (PKI).
3. Describe the manner in which your solution will protect the
privacy of data transmitted across the WAN.
4. Analyze the requirements necessary to allow for proper
operating system and application patch management and
describe a solution that would be effective.
5. Use at least three quality resources in this
assignment. Note: Wikipedia and similar Websites do not
qualify as quality resources.
Note: The graphically depicted solution is not included in the
required page length.
Your assignment must follow these formatting requirements:
· This course requires use of Strayer Writing Standards (SWS).
The format is different than other Strayer University courses.
Please take a moment to review the SWS documentation for
details.
· Include a cover page containing the title of the assignment, the
student's name, the professor's name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
· Include charts or diagrams created in Visio or an equivalent
such as Dia or OpenOffice. The completed diagrams / charts
must be imported into the Word document before the paper is
submitted.
The specific course learning outcomes associated with this
assignment are:
· Analyze information security systems compliance
requirements within the Workstation and LAN Domains.
· Use technology and information resources to research issues in
security strategy and policy formation.
· Write clearly and concisely about topics related to information
technology audit and control using proper writing mechanics
and technical style conventions.
Assignment 4: Designing Compliance within the LAN-to-WAN
Domain
Criteria
Unacceptable
Below 60% F
Meets Minimum Expectations
60-69% D
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Use MS Visio or an open source equivalent to graphically
depict a solution for the provided scenario.
Weight: 30%
Did not submit or incompletely used MS Visio or an open
source equivalent to graphically depict a solution for the
provided scenario.
Insufficiently used MS Visio or an open source equivalent to
graphically depict a solution for the provided scenario.
Partially used MS Visio or an open source equivalent to
graphically depict a solution for the provided scenario.
Satisfactorily used MS Visio or an open source equivalent to
graphically depict a solution for the provided scenario.
Thoroughly used MS Visio or an open source equivalent to
graphically depict a solution for the provided scenario.
2. Identify the fundamentals of public key infrastructure (PKI).
Weight: 15%
Did not submit or incompletelyidentified the fundamentals of
public key infrastructure (PKI).
Insufficiently identified the fundamentals of public key
infrastructure (PKI).
Partially identified the fundamentals of public key
infrastructure (PKI).
Satisfactorily identified the fundamentals of public key
infrastructure (PKI).
Thoroughly identified the fundamentals of public key
infrastructure (PKI).
3. Describe the manner in which your solution will protect the
privacy of data transmitted across the WAN.
Weight: 20%
Did not submit or incompletelydescribed the manner in which
your solution will protect the privacy of data transmitted across
the WAN.
Insufficiently described the manner in which your solution will
protect the privacy of data transmitted across the WAN.
Partially described the manner in which your solution will
protect the privacy of data transmitted across the WAN.
Satisfactorily described the manner in which your solution will
protect the privacy of data transmitted across the WAN.
Thoroughly described the manner in which your solution will
protect the privacy of data transmitted across the WAN.
4. Analyze the requirements necessary to allow for proper
operating system and application patch management and
describe a solution that would be effective.
Weight: 20%
Did not submit or incompletelyanalyzed the requirements
necessary to allow for proper operating system and application
patch management and did not submit or incompletelydescribed
a solution that would be effective.
Insufficiently analyzed the requirements necessary to allow for
proper operating system and application patch management and
insufficiently described a solution that would be effective.
Partially analyzed the requirements necessary to allow for
proper operating system and application patch management and
partially described a solution that would be effective.
Satisfactorily analyzed the requirements necessary to allow for
proper operating system and application patch management and
satisfactorily described a solution that would be effective.
Thoroughly analyzed the requirements necessary to allow for
proper operating system and application patch management and
thoroughly described a solution that would be effective.
5. Three references
Weight: 5%
No references provided
Does not meet the required number of references; all references
poor quality choices.
Does not meet the required number of references; some
references poor quality choices.
Meets number of required references; all references high quality
choices.
Exceeds number of required references; all references high
quality choices.
6. Clarity, writing mechanics, and formatting requirements
Weight: 10%
More than eight errors present
Seven to eight errors present
Five to six errors present
Three to four errors present
Zero to two errors present
9 discussions: around 200 words each one
1
"Security Challenges"
· Distributed applications and cloud computing have become a
viable option within the LAN-to-WAN Domain. Discuss the
primary challenges related to maintaining the security of both
applications and data in such an environment.
· Describe the controls that are needed to ensure the security of
distributed applications and data. Identify the auditing approach
that you believe is best suited to this arrangement. Provide a
rationale for your response.
2
"Remote Access"
· Remote access via Virtual Private Networks (VPN's) to
corporate resources for the purposes of e-commerce, telework
and remote administration is becoming commonplace. From an
auditing perspective, suggest two or more controls that should
be in place to prevent the loss or theft of confidential
information.
· Give your opinion on what you believe are the essential
elements of an acceptable use policy for remote access.
Elaborate on each item and justify its importance.
3
"Data Center Management"
· Imagine you are an IT security specialist of a large
organization which is opening a new data center. Recommend a
minimum of three controls, other than door locks, you would
utilize to secure the new data center physically. Support your
recommendations.
· Recommend a process to govern obtaining, testing, and
distributing patches for operating systems and applications
within the new data center. Provide your rationale.
4
"DR…What Is It Good for?" Please respond to the following:
· From the first and second e-Activities, Consider the following
scenario: Your employer, a small-business owner, has indicated
she believes that rather than planning to recover from a disaster,
it makes more sense to simply open a new business and start
anew. As a security professional and proponent of disaster
recovery, formulate a list of your top five concerns with this
statement and explain each. Be sure to indicate how and why
you believe these concerns are relevant for a small business.
Justify your response.
· Suppose you received pushback from your Board of Directors
while trying to explain the necessity of a disaster recovery plan
(e.g., due to costs, administrative overheard, etc.). Outline the
main points and with a rationale for each that can be used to
persuade the Board of Directors into believing that a plan really
is necessary.
5
"Preparing for Different Disasters" Please respond to the
following:
· Select two disaster scenarios (e.g., large-scale power outage,
flood, earthquake, etc.) to compare and contrast, and explain
how an implemented DR plan would differentiate when
preparing for and dealing with these disasters.
· Explain how the report structure and organization could help
the overall recovery efforts in a disaster, and determine whether
or not you believe the organization of large plans is a key
consideration for plan creators and management. Provide a
rationale for your answer.
6
"IRS Disaster Recovery Plan (DRP)" Please respond to the
following:
· From the first e-Activity, select one portion of the IRS
disaster recovery plan that you found interesting. Explain why
this portion was interesting to you, and determine whether or
not you believe this portion is critical to the overall contingency
planning efforts of the agency. Provide a rationale to support
your answer.
· Determine whether or not you believe the IRS DRP would be
comparable to that of large enterprises in the private sector
(e.g., ConocoPhillips, General Motors, etc.), and explain
whether or not you consider this to be the case.
7
"Hurricane Sandy DR Adaptation" Please respond to the
following:
· From the second e-Activity, determine whether or not you
believe the ability to dynamically adapt to the extreme
conditions was crucial for disaster response personnel when
faced with the challenges caused by Hurricane Sandy. Use
examples to support your answer.
· Explain how dynamic disaster plans can be created and tested.
Determine whether or not you think these plans have the ability
to be truly dynamic and assist personnel when amidst a disaster
situation.
8
"BCP versus DRP Revisited" Please respond to the following:
· Expanding on what you’ve learned since Week 2 when a
similar question was posed, explain in your own words the
difference between business continuity planning and disaster
recovery planning, and where you believe these two processes
differ and overlap.
· Take a position on whether BC or DR can survive without the
other. Use a real-world example to support your position.
9
"BCP by FEMA" Please respond to the following:
· From the e-Activity, determine what you believe is the most
critical component of BCP from FEMA’s implementation /
suggestions for the BCP process. Justify your answer.
· Determine whether or not you believe the BCP process would
be successful without proper BIA processes being conducted.
Explain why or why not.
Running head: Research Prospectus 1
Research Prospectus 6
Research Prospectus
Name:
Course:
Instructor’s Name:
Date:
Proposal 1 (First choice)
Topic- The superstar factor: Celebrity influence on American
political campaigns.
Introduction
In the 2016 American Presidential elections, the job of political
influencing was, in part, at the hands of a body of individuals
lacking political experience; the celebrities. Each of the two
candidates, Donald Trump and Hillary Clinton, enjoyed the
support of a large number of celebrities, with each celebrity
cashing in on their fan base to endorse the candidate of their
choice. Besides that, one of the candidates, Donald Trump, had
acquired celebrity status owing to his career in reality
television. Therefore, celebrity politics was a significant factor
in the 2016 presidential campaigns.
The proposed study considers the impact that celebrities have
on political campaigns, especially their influence on the quality
of the political discourse around the elections. It considers
questions such as: what value do celebrities bring to political
campaigns?, and where do celebrities derive their political
influence despite lacking political experience? However, the
primary research question addressed by the proposed research is
“to what extent do the celebrities enhance or dilute the political
discourse?” The preliminary thesis statement based on the
review of existing literature on “celebrity politics” is:
“celebrities are formidable campaign machinery used by
politicians to sway voters because of their large following, but
to a significant extent, they dilute rather than enhance the
political discourse owing to the tendency of the celebrities to
convert the political conversation from an issue-based one to a
populist contest, their lack of political experience and the fact
that they subjugate the average voices in the political
discourse.”
Upon further research, this thesis statement will be revised to
reflect the extent to which the detriment to the political
discourse manifests.
Literature Review
The proposed research examines the impact of celebrities on the
political discourse when the celebrities either participate
directly in politics or when the influence the political outcome
through the endorsement of their favored candidates. First, the
key constructs of the research will be defined. Secondly, the
research on the sources of influence for the celebrity politicians
and political influencers, as well as the value that the influential
celebrities bring to the political campaigns will be discussed.
Finally, the relevant research on the perceived effect of the
celebrity politics on the political discourse, both the positive
and the negative, will be outlined.
Definition of terms
The primary construct that the proposed research relies on
is “celebrity politics.” Most literature on celebrity politics
focuses on the various roles that the “celebrity” can take in the
political sphere. Street (2004) in his typology of celebrity
politicians describes celebrity politics as either the practice
where a person whose background is entertainment, show
business or sports trades on his background to get elected e.g.
Arnold Schwarzenegger, or a practice where a politician uses
the “forms and associations of the celebrity to enhance their
image and communicate their message” (p. 437). These two
practices are construed to comprise celebrity politics. Marsh, ‘t
Hart, and Tindall (2010) adopt a similar but broader typology of
celebrity politics to encompass the roles of celebrity advocate,
celebrity endorser, celebrity politician, politician celebrity, and
politician who uses other’s celebrity.
The sources of influence for celebrities
Literature on celebrity politics examines the role of
celebrities in politics by first characterizing the context from
which the celebrities derive their influence. According to Ribke
(2015), celebrity power is superficial and it derives from the
public image of the celebrities. This public image, according to
Ribke (2015) is a prefabricated one, forged by PR agents and
talent agents, who shape the celebrity as a commodity
depending on what the audience wants to see in the celebrities.
In an alternative description of celebrity power, Lindenberg,
Joly, and Stapel (2011) theorize that the influence of the
celebrities derives from their ability to influence behavior by
“activating bundles of social norms,” and that they can only do
this if they have prestige. This “prestige,” according to
Lindenberg, Joly, and Stapel (2011), only exists for as long as
the public considers the celebrities to be successful. This
characterization of prestige affirms the view by Ribke (2015)
that the public image of the celebrities is the source of their
influence. For political influence, Lindenberg, Joly, and Stapel
(2011) are of the view that the celebrities reinforce the views
that people already own by taking advantage of the
psychological connections with their audiences to endorse what
they consider ought to be.
Effect of celebrity politics on the political discourse
Scholars of celebrity politics differ in what they consider to be
the effect of celebrity politics on the political discourse. On one
side, there are those that posit that celebrities enrich or enhance
the political discourse. For instance, according to Austin, Vord,
Pinkleton, and Epstein (2008), the endorsement of political
candidates by celebrities are positively related to the political
engagement of the younger citizenry. This suggests that
celebrity politics enhances the political discourse by facilitating
the engagement of individuals who would otherwise be left out.
In agreement, Wheeler (2013) argues that celebrities invigorate
democracy with new ideas. According to Wheeler (2013), the
celebrities represent a new form of political agency, and their
utility in the reconfiguration of the discourse surrounding
economic, political and social change cannot be underestimated.
On the other hand, some scholars believe that celebrity politics
is detrimental to the political discourse. For instance, according
to Nolan and Brookes (2013), celebrity politics is largely
superficial in that “offers only a temporary intensity of feeling
that ultimately is empty and devoid of meaning” (p. 374). This
argument suggests that the fact that the celebrities take
advantage of their fame to influence the electorate eliminates
substance from the political discourse. Another similar
argument is that the celebrities do not have the requisite
qualifications and political experience to engage in political
discourse. According to Street (2004), the celebrities have
“irrelevant qualities and superficial knowledge that does not
justify their claim to ‘represent’” (p. 439). Finally, there is the
argument that celebrity politics drowns out the average voice in
the political discourse. Marsh, ‘t Hart, and Tindall (2010) argue
that “the focus on the policies that celebrities endorse can
devalue the social problems and unpopular, controversial or
unglamorous causes to which celebrities pay little attention” (p.
332). What this means is that celebrity politics creates an
uneven ground in politics by subjugating the average voices in
the political discourse.
Proposal 2 (Second Choice)
Topic- Obamacare: Is it time to lay ACA to rest?
Introduction
As the most popular legacy of President Barack Obama, the
Affordable Care Act (ACA) (popularly known as Obamacare)
has been a target for repealing efforts by his opponents. Most
recently, Obama’s successor, President Donald Trump,
promised his supporters during the 2016 presidential campaigns
that he would “repeal and replace” Obamacare. The proposed
research is a policy analysis that evaluates whether Obamacare
has been successful in achieving what it set to achieve. Given
its performance record, are the calls to repeal and replace
Obamacare justified? The preliminary thesis statement is
“Overwhelming evidence suggests that Obamacare needs radical
restructuring because while the Affordable Care Act has been
effactive in reducing the cost of healthcare, it has not
accomplished improved access and quality of care as envisaged
during its conception.” This remains a tentative thesis statement
and it is subject to change to reflect the perspectives that
emerge during the research.
Literature Review
The proposed research will examine the success, or failure, of
the Affordable Care Act in achieving its primary goals. First,
the proposed research will discuss the primary goals of the
Obamacare healthcare policy. Then, the proposed research will
evaluate the Affordable Care Act based on its performance on
each of its primary goals. There were three primary objectives
for the Affordable Care Act when it was conceived. First, ACA
was meant to increase the number of the insured people in the
United States (Manchikanti, Helm, Benyamin, & Hirsch, 2017).
The second objective of the ACA was improving the quality of
healthcare (Manchikanti et al., 2017). Finally, the third
objective of the ACA was to reduce the costs of healthcare in
the United States.
Increasing the number of insured Americans
Existing literature on the performance of the ACA suggests
that the policy has not significantly increased the number of
people covered by medical insurance in the United States. There
are differing views on the actual success of the ACA in
increasing the number of the Americans covered by medical
insurance. It would appear that Obamacare reduced the number
of uninsured Americans. According to Dalen, Waterbrook, &
Alpert (2015), more than 10 million Americans acquired
medical insurance in 2014 thanks to ACA, bringing down the
percentage of the uninsured Americans from 18% in July 2013
to 18% in June 2013. In agreement, Manchikanti et al. (2017)
argues that between 2010 and 2015, the percentage of uninsured
Americans reduced by 43%. However, this reduction is not
necessarily as significant as the numbers show because 13
million of the 20 million newly insured Americans were
enrolled under Medicare. According to Butler (2016), ACA
missed the projected enrollments by 10 million and it should
have been labeled as “Medicaid Expansion Act”.
Improving the quality of health care
Existing evidence-based research puts it forward that the
ACA has not improved the quality of healthcare as it set to do.
According to Manchikanti et al. (2017), while the quality of
healthcare was expected to improve on the passage of ACA, this
has not been the case due to the failure of the Act to provide
preventative services. Another aspect of health care that has not
changed is the waiting times. According to Rhodes et al (2014),
even after the passing of the ACA, elderly Medicare patients
seeking new appointments with a PCP were less successful in
obtaining appointments compared to those with private
insurance. In addition, some of the patients had to wait for over
2 weeks.
Reducing the cost of health care
Unlike the case with quality of care and the number of insured
American, research suggests that the ACA has managed to lower
the cost of healthcare in the United States in the years that it
has been in operation. According to Manchikanti et al. (2017), it
was projected that the healthcare expenditures would increase at
an average annual rate of 5.6% up to 2025 if ACA was not
passed. However, after the passage of ACA, the reform of the
health care delivery system achieved a constant out-of-pocket
spending as a percentage of the total health care spending
(Manchikanti et al., 2017). In agreement, Herrera et al. (2013)
points out that “Growth in out-of-pocket prescription spending
was effectively flat (p. 1722). According to Burger (2011), the
reduced costs are due to the IMR provision in the ACA, which
provides for more transparency and discourages the less
transparent mechanisms that MCOs use to charge the patients
more. Predicts that the individual mandate as well as the
accompanying minimum essential coverage provisions will
continue to significantly reduce error costs and decision costs,
to the effect of making health care in the United States even
more affordable.
Bibliography of sources
Topic 1
Austin, E. W., Vord, R. V. de, Pinkleton, B. E., & Epstein, E.
(2008). Celebrity Endorsements and Their Potential to Motivate
Young Voters. Mass Communication & Society, 11(4), 420–436.
Lindenberg, S., Joly, J., & Stapel, D. (2011). The Norm-
Activating Power of Celebrity: The Dynamics of Success and
Influence. Social Psychology Quarterly,74(1), 98-120.
Marsh, D., ‘t Hart, P., & Tindall, K. (2010). Celebrity Politics:
The Politics of the Late Modernity? Political Studies Review,
8(3), 322–340.
Nolan, D., & Brookes, S. (2013). Populism in theory and
practice: Analysing celebrity politics. Media Asia, 40(4), 373–
383.
Ribke, N. (2015). A genre approach to celebrity politics: Global
patterns of passage from media to politics. Springer.
Street, J. (2004) ‘Celebrity politicians: Popular culture and
political representation. The British Journal of Politics and
International Relations, 6(4), 435–452.
Wheeler, M. (2013). Celebrity politics: Image and identity in
contemporary political communications. Cambridge, UK :
Polity.
Topic 2
Burger, D. D. (2011). The management of health care costs:
Independent medical review after “ObamaCare.” University of
Memphis Law Review, 42(2), 255–301.
Butler, S. M. (2016). The future of the Affordable Care Act:
Reassessment and revision. Jama, 316(5), 495-497.
Dalen, J. E., Waterbrook, K., & Alpert, J. S. (2015). Why do so
many Americans oppose the Affordable Care Act?. The
American journal of medicine, 128(8), 807-810.
Herrera, C. N., Gaynor, M., Newman, D., Town, R. J., &
Parente, S. T. (2013). Trends underlying employer-sponsored
health insurance growth for Americans younger than age sixty-
five. Health Affairs, 32(10), 1715-1722.
Manchikanti, L., Helm, I. S., Benyamin, R. M., & Hirsch, J. A.
(2017). A Critical Analysis of Obamacare: Affordable Care or
Insurance for Many and Coverage for Few?. Pain physician,
20(3), 111.
Moncrieff, A. R., & Padi, M. (2014). Beyond payment and
delivery reform: The individual mandate’s cost-control
potential. American Journal of Law & Medicine, 40(2/3), 185–
194.
Rhodes, K. V., Kenney, G. M., Friedman, A. B., Saloner, B.,
Lawson, C. C., Chearo, D., ... & Polsky, D. (2014). Primary
care access for new patients on the eve of health care reform.
JAMA internal medicine, 174(6), 861-869.
THE RESEARCH PAPER PROCESS
Topic Selection
You will need to formally propose (as part of your written
prospectus) two political science research topics. Designate
your first and second preference. Your topic choice will in all
likelihood combine a personal interest on your part with a
relevant topic in one of the political science subfields
(American politics and government, public policy, public
administration, comparative politics, international relations,
public law, or political philosophy). A relevant topic may
overlap two or more subfields.
The criteria of “relevance” will in part be decided by your
instructor, and in part based upon your ability to convince him
that a relevant scholarly literature exists with regard to your
topic. The key to the successful adoption of a topic, thesis, and
overall paper will be your ability to identify a robust,
professional literature on your topic.
If you pitch a topic that is highly subjective (you have a clear
personal interest and are a true believer in your topic and the
conclusion is a done deal before you do any research) it will
likely be rejected as too biased. Your senior seminar research
paper cannot be some kind of quasi-personal political
biography. You are writing a professional political science
paper (emphasis upon science), not a personal or ideological
advocacy paper or blog, nor an interest group or political party
platform or manifesto.
Topics;
1/Trump decision to pull US troops from Syria lowers risks and
costs,
Change the words to like trump and the benefits and
disadvantages from pulling the us army from Syria
2/politics and religion.. Is politics always rational?

More Related Content

Similar to Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx

Note Review the page requirements and formatting instructions for.docx
Note Review the page requirements and formatting instructions for.docxNote Review the page requirements and formatting instructions for.docx
Note Review the page requirements and formatting instructions for.docxcarlibradley31429
 
Note Review the page requirements and formatting instructions for.docx
Note Review the page requirements and formatting instructions for.docxNote Review the page requirements and formatting instructions for.docx
Note Review the page requirements and formatting instructions for.docxjuliennehar
 
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docxAssignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docxdanielfoster65629
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxastonrenna
 
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domainUop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domainuopassignment
 
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domainUop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domaineyavagal
 
Imagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docxImagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docxgordienaysmythe
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woeleanorabarrington
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxmanningchassidy
 
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docxProject Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docxwoodruffeloisa
 
Imagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docxImagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docxnolanalgernon
 
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docxAssignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docxrosemariebrayshaw
 
erm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docxerm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docxmealsdeidre
 
Cst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.comCst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.comamaranthbeg113
 
Cst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comCst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comamaranthbeg53
 
Cst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.comCst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.comamaranthbeg73
 
1606662359-chapter-1-top-down-network-design.pptx
1606662359-chapter-1-top-down-network-design.pptx1606662359-chapter-1-top-down-network-design.pptx
1606662359-chapter-1-top-down-network-design.pptxHaniYousef8
 
Executive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docxExecutive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docxrhetttrevannion
 
 risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docxodiliagilby
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worogglili
 

Similar to Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx (20)

Note Review the page requirements and formatting instructions for.docx
Note Review the page requirements and formatting instructions for.docxNote Review the page requirements and formatting instructions for.docx
Note Review the page requirements and formatting instructions for.docx
 
Note Review the page requirements and formatting instructions for.docx
Note Review the page requirements and formatting instructions for.docxNote Review the page requirements and formatting instructions for.docx
Note Review the page requirements and formatting instructions for.docx
 
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docxAssignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
 
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domainUop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
 
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domainUop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
 
Imagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docxImagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docx
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
 
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docxProject Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
 
Imagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docxImagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docx
 
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docxAssignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docx
 
erm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docxerm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docx
 
Cst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.comCst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.com
 
Cst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comCst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.com
 
Cst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.comCst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.com
 
1606662359-chapter-1-top-down-network-design.pptx
1606662359-chapter-1-top-down-network-design.pptx1606662359-chapter-1-top-down-network-design.pptx
1606662359-chapter-1-top-down-network-design.pptx
 
Executive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docxExecutive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docx
 
 risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
 

More from carlibradley31429

Assignment 1 Discussion—Integration of TechnologyTechnology has c.docx
Assignment 1 Discussion—Integration of TechnologyTechnology has c.docxAssignment 1 Discussion—Integration of TechnologyTechnology has c.docx
Assignment 1 Discussion—Integration of TechnologyTechnology has c.docxcarlibradley31429
 
Assignment 1 Discussion—Critical Leadership Competencies Needed in .docx
Assignment 1 Discussion—Critical Leadership Competencies Needed in .docxAssignment 1 Discussion—Critical Leadership Competencies Needed in .docx
Assignment 1 Discussion—Critical Leadership Competencies Needed in .docxcarlibradley31429
 
Assignment 1 Discussion—Cultural Influences on Work and Leisure Tim.docx
Assignment 1 Discussion—Cultural Influences on Work and Leisure Tim.docxAssignment 1 Discussion—Cultural Influences on Work and Leisure Tim.docx
Assignment 1 Discussion—Cultural Influences on Work and Leisure Tim.docxcarlibradley31429
 
Assignment 1 Discussion—Communicating Negative InformationAs you .docx
Assignment 1 Discussion—Communicating Negative InformationAs you .docxAssignment 1 Discussion—Communicating Negative InformationAs you .docx
Assignment 1 Discussion—Communicating Negative InformationAs you .docxcarlibradley31429
 
Assignment 1 Discussion—Biomes, Development, Pollution, and YouEa.docx
Assignment 1 Discussion—Biomes, Development, Pollution, and YouEa.docxAssignment 1 Discussion—Biomes, Development, Pollution, and YouEa.docx
Assignment 1 Discussion—Biomes, Development, Pollution, and YouEa.docxcarlibradley31429
 
Assignment 1 Discussion—An Official LanguageCurrently the United .docx
Assignment 1 Discussion—An Official LanguageCurrently the United .docxAssignment 1 Discussion—An Official LanguageCurrently the United .docx
Assignment 1 Discussion—An Official LanguageCurrently the United .docxcarlibradley31429
 
Assignment 1 Discussion—A Life in ReviewIn late adulthood, most p.docx
Assignment 1 Discussion—A Life in ReviewIn late adulthood, most p.docxAssignment 1 Discussion—A Life in ReviewIn late adulthood, most p.docx
Assignment 1 Discussion—A Life in ReviewIn late adulthood, most p.docxcarlibradley31429
 
Assignment 1 DiscussionThere are two parts to this assignme.docx
Assignment 1 DiscussionThere are two parts to this assignme.docxAssignment 1 DiscussionThere are two parts to this assignme.docx
Assignment 1 DiscussionThere are two parts to this assignme.docxcarlibradley31429
 
Assignment 1 Discussion—Employee Impact on the Plan An organizati.docx
Assignment 1 Discussion—Employee Impact on the Plan An organizati.docxAssignment 1 Discussion—Employee Impact on the Plan An organizati.docx
Assignment 1 Discussion—Employee Impact on the Plan An organizati.docxcarlibradley31429
 
Assignment 1 Discussion QuestionWhy should an organization be c.docx
Assignment 1 Discussion QuestionWhy should an organization be c.docxAssignment 1 Discussion QuestionWhy should an organization be c.docx
Assignment 1 Discussion QuestionWhy should an organization be c.docxcarlibradley31429
 
Assignment 1 Discussion QuestionTo extend its international prese.docx
Assignment 1 Discussion QuestionTo extend its international prese.docxAssignment 1 Discussion QuestionTo extend its international prese.docx
Assignment 1 Discussion QuestionTo extend its international prese.docxcarlibradley31429
 
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art f.docx
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art f.docxAssignment 1 Discussion QuestionThe Mexican ceramics folk-art f.docx
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art f.docxcarlibradley31429
 
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art fir.docx
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art fir.docxAssignment 1 Discussion QuestionThe Mexican ceramics folk-art fir.docx
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art fir.docxcarlibradley31429
 
Assignment 1 Discussion QuestionsCase study Shaking up Oxf.docx
Assignment 1 Discussion QuestionsCase study Shaking up Oxf.docxAssignment 1 Discussion QuestionsCase study Shaking up Oxf.docx
Assignment 1 Discussion QuestionsCase study Shaking up Oxf.docxcarlibradley31429
 
Assignment 1 Discussion QuestionsCase Study Inside Intel. For y.docx
Assignment 1 Discussion QuestionsCase Study Inside Intel. For y.docxAssignment 1 Discussion QuestionsCase Study Inside Intel. For y.docx
Assignment 1 Discussion QuestionsCase Study Inside Intel. For y.docxcarlibradley31429
 
Assignment 1 Discussion QuestionsCase Study How Failure Breeds S.docx
Assignment 1 Discussion QuestionsCase Study How Failure Breeds S.docxAssignment 1 Discussion QuestionsCase Study How Failure Breeds S.docx
Assignment 1 Discussion QuestionsCase Study How Failure Breeds S.docxcarlibradley31429
 
Assignment 1 Discussion QuestionConsider a team that you have bee.docx
Assignment 1 Discussion QuestionConsider a team that you have bee.docxAssignment 1 Discussion QuestionConsider a team that you have bee.docx
Assignment 1 Discussion QuestionConsider a team that you have bee.docxcarlibradley31429
 
Assignment 1 Discussion Question Prosocial Behavior and Altruism.docx
Assignment 1 Discussion Question Prosocial Behavior and Altruism.docxAssignment 1 Discussion Question Prosocial Behavior and Altruism.docx
Assignment 1 Discussion Question Prosocial Behavior and Altruism.docxcarlibradley31429
 
Assignment 1 Discussion Questions Read the Bloomberg Bu.docx
Assignment 1 Discussion Questions Read the Bloomberg Bu.docxAssignment 1 Discussion Questions Read the Bloomberg Bu.docx
Assignment 1 Discussion Questions Read the Bloomberg Bu.docxcarlibradley31429
 
Assignment 1 Difficulties of Defining TerrorismDue Week 2 a.docx
Assignment 1 Difficulties of Defining TerrorismDue Week 2 a.docxAssignment 1 Difficulties of Defining TerrorismDue Week 2 a.docx
Assignment 1 Difficulties of Defining TerrorismDue Week 2 a.docxcarlibradley31429
 

More from carlibradley31429 (20)

Assignment 1 Discussion—Integration of TechnologyTechnology has c.docx
Assignment 1 Discussion—Integration of TechnologyTechnology has c.docxAssignment 1 Discussion—Integration of TechnologyTechnology has c.docx
Assignment 1 Discussion—Integration of TechnologyTechnology has c.docx
 
Assignment 1 Discussion—Critical Leadership Competencies Needed in .docx
Assignment 1 Discussion—Critical Leadership Competencies Needed in .docxAssignment 1 Discussion—Critical Leadership Competencies Needed in .docx
Assignment 1 Discussion—Critical Leadership Competencies Needed in .docx
 
Assignment 1 Discussion—Cultural Influences on Work and Leisure Tim.docx
Assignment 1 Discussion—Cultural Influences on Work and Leisure Tim.docxAssignment 1 Discussion—Cultural Influences on Work and Leisure Tim.docx
Assignment 1 Discussion—Cultural Influences on Work and Leisure Tim.docx
 
Assignment 1 Discussion—Communicating Negative InformationAs you .docx
Assignment 1 Discussion—Communicating Negative InformationAs you .docxAssignment 1 Discussion—Communicating Negative InformationAs you .docx
Assignment 1 Discussion—Communicating Negative InformationAs you .docx
 
Assignment 1 Discussion—Biomes, Development, Pollution, and YouEa.docx
Assignment 1 Discussion—Biomes, Development, Pollution, and YouEa.docxAssignment 1 Discussion—Biomes, Development, Pollution, and YouEa.docx
Assignment 1 Discussion—Biomes, Development, Pollution, and YouEa.docx
 
Assignment 1 Discussion—An Official LanguageCurrently the United .docx
Assignment 1 Discussion—An Official LanguageCurrently the United .docxAssignment 1 Discussion—An Official LanguageCurrently the United .docx
Assignment 1 Discussion—An Official LanguageCurrently the United .docx
 
Assignment 1 Discussion—A Life in ReviewIn late adulthood, most p.docx
Assignment 1 Discussion—A Life in ReviewIn late adulthood, most p.docxAssignment 1 Discussion—A Life in ReviewIn late adulthood, most p.docx
Assignment 1 Discussion—A Life in ReviewIn late adulthood, most p.docx
 
Assignment 1 DiscussionThere are two parts to this assignme.docx
Assignment 1 DiscussionThere are two parts to this assignme.docxAssignment 1 DiscussionThere are two parts to this assignme.docx
Assignment 1 DiscussionThere are two parts to this assignme.docx
 
Assignment 1 Discussion—Employee Impact on the Plan An organizati.docx
Assignment 1 Discussion—Employee Impact on the Plan An organizati.docxAssignment 1 Discussion—Employee Impact on the Plan An organizati.docx
Assignment 1 Discussion—Employee Impact on the Plan An organizati.docx
 
Assignment 1 Discussion QuestionWhy should an organization be c.docx
Assignment 1 Discussion QuestionWhy should an organization be c.docxAssignment 1 Discussion QuestionWhy should an organization be c.docx
Assignment 1 Discussion QuestionWhy should an organization be c.docx
 
Assignment 1 Discussion QuestionTo extend its international prese.docx
Assignment 1 Discussion QuestionTo extend its international prese.docxAssignment 1 Discussion QuestionTo extend its international prese.docx
Assignment 1 Discussion QuestionTo extend its international prese.docx
 
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art f.docx
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art f.docxAssignment 1 Discussion QuestionThe Mexican ceramics folk-art f.docx
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art f.docx
 
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art fir.docx
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art fir.docxAssignment 1 Discussion QuestionThe Mexican ceramics folk-art fir.docx
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art fir.docx
 
Assignment 1 Discussion QuestionsCase study Shaking up Oxf.docx
Assignment 1 Discussion QuestionsCase study Shaking up Oxf.docxAssignment 1 Discussion QuestionsCase study Shaking up Oxf.docx
Assignment 1 Discussion QuestionsCase study Shaking up Oxf.docx
 
Assignment 1 Discussion QuestionsCase Study Inside Intel. For y.docx
Assignment 1 Discussion QuestionsCase Study Inside Intel. For y.docxAssignment 1 Discussion QuestionsCase Study Inside Intel. For y.docx
Assignment 1 Discussion QuestionsCase Study Inside Intel. For y.docx
 
Assignment 1 Discussion QuestionsCase Study How Failure Breeds S.docx
Assignment 1 Discussion QuestionsCase Study How Failure Breeds S.docxAssignment 1 Discussion QuestionsCase Study How Failure Breeds S.docx
Assignment 1 Discussion QuestionsCase Study How Failure Breeds S.docx
 
Assignment 1 Discussion QuestionConsider a team that you have bee.docx
Assignment 1 Discussion QuestionConsider a team that you have bee.docxAssignment 1 Discussion QuestionConsider a team that you have bee.docx
Assignment 1 Discussion QuestionConsider a team that you have bee.docx
 
Assignment 1 Discussion Question Prosocial Behavior and Altruism.docx
Assignment 1 Discussion Question Prosocial Behavior and Altruism.docxAssignment 1 Discussion Question Prosocial Behavior and Altruism.docx
Assignment 1 Discussion Question Prosocial Behavior and Altruism.docx
 
Assignment 1 Discussion Questions Read the Bloomberg Bu.docx
Assignment 1 Discussion Questions Read the Bloomberg Bu.docxAssignment 1 Discussion Questions Read the Bloomberg Bu.docx
Assignment 1 Discussion Questions Read the Bloomberg Bu.docx
 
Assignment 1 Difficulties of Defining TerrorismDue Week 2 a.docx
Assignment 1 Difficulties of Defining TerrorismDue Week 2 a.docxAssignment 1 Difficulties of Defining TerrorismDue Week 2 a.docx
Assignment 1 Difficulties of Defining TerrorismDue Week 2 a.docx
 

Recently uploaded

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 

Recently uploaded (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 

Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx

  • 1. Assignment 1: Designing Compliance within the LAN-to-WAN Domain Note: Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized formatting requirements, do NOT count toward the overall page length. Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas: · Protecting data privacy across the WAN · Filtering undesirable network traffic from the Internet · Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web · Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources · Having an area designed to trap attackers in order to monitor attacker activities · Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity · Hiding internal IP addresses · Allowing operating system and application patch management The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to- WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations. Write a three to five page paper in which you: 1. Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will: a. filter undesirable network traffic from the Internet
  • 2. b. filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web c. allow for a zone for anonymous users but aggressively controls information exchange with internal resources d. allow for an area designed to trap attackers in order to monitor attacker activities e. offer a means to monitor network traffic in real time as a means to identify and block unusual activity f. hide internal IP addresses 2. Identify the fundamentals of public key infrastructure (PKI). 3. Describe the manner in which your solution will protect the privacy of data transmitted across the WAN. 4. Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective. 5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Note: The graphically depicted solution is not included in the required page length. Your assignment must follow these formatting requirements: · This course requires use of Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details. · Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. · Include charts or diagrams created in Visio or an equivalent such as Dia or OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted. The specific course learning outcomes associated with this assignment are: · Analyze information security systems compliance
  • 3. requirements within the Workstation and LAN Domains. · Use technology and information resources to research issues in security strategy and policy formation. · Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions. Assignment 4: Designing Compliance within the LAN-to-WAN Domain Criteria Unacceptable Below 60% F Meets Minimum Expectations 60-69% D Fair 70-79% C Proficient 80-89% B Exemplary 90-100% A 1. Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario. Weight: 30% Did not submit or incompletely used MS Visio or an open source equivalent to graphically depict a solution for the provided scenario. Insufficiently used MS Visio or an open source equivalent to graphically depict a solution for the provided scenario. Partially used MS Visio or an open source equivalent to graphically depict a solution for the provided scenario. Satisfactorily used MS Visio or an open source equivalent to
  • 4. graphically depict a solution for the provided scenario. Thoroughly used MS Visio or an open source equivalent to graphically depict a solution for the provided scenario. 2. Identify the fundamentals of public key infrastructure (PKI). Weight: 15% Did not submit or incompletelyidentified the fundamentals of public key infrastructure (PKI). Insufficiently identified the fundamentals of public key infrastructure (PKI). Partially identified the fundamentals of public key infrastructure (PKI). Satisfactorily identified the fundamentals of public key infrastructure (PKI). Thoroughly identified the fundamentals of public key infrastructure (PKI). 3. Describe the manner in which your solution will protect the privacy of data transmitted across the WAN. Weight: 20% Did not submit or incompletelydescribed the manner in which your solution will protect the privacy of data transmitted across the WAN. Insufficiently described the manner in which your solution will protect the privacy of data transmitted across the WAN. Partially described the manner in which your solution will protect the privacy of data transmitted across the WAN. Satisfactorily described the manner in which your solution will protect the privacy of data transmitted across the WAN. Thoroughly described the manner in which your solution will protect the privacy of data transmitted across the WAN. 4. Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective. Weight: 20% Did not submit or incompletelyanalyzed the requirements necessary to allow for proper operating system and application patch management and did not submit or incompletelydescribed
  • 5. a solution that would be effective. Insufficiently analyzed the requirements necessary to allow for proper operating system and application patch management and insufficiently described a solution that would be effective. Partially analyzed the requirements necessary to allow for proper operating system and application patch management and partially described a solution that would be effective. Satisfactorily analyzed the requirements necessary to allow for proper operating system and application patch management and satisfactorily described a solution that would be effective. Thoroughly analyzed the requirements necessary to allow for proper operating system and application patch management and thoroughly described a solution that would be effective. 5. Three references Weight: 5% No references provided Does not meet the required number of references; all references poor quality choices. Does not meet the required number of references; some references poor quality choices. Meets number of required references; all references high quality choices. Exceeds number of required references; all references high quality choices. 6. Clarity, writing mechanics, and formatting requirements Weight: 10% More than eight errors present Seven to eight errors present Five to six errors present Three to four errors present Zero to two errors present 9 discussions: around 200 words each one 1 "Security Challenges"
  • 6. · Distributed applications and cloud computing have become a viable option within the LAN-to-WAN Domain. Discuss the primary challenges related to maintaining the security of both applications and data in such an environment. · Describe the controls that are needed to ensure the security of distributed applications and data. Identify the auditing approach that you believe is best suited to this arrangement. Provide a rationale for your response. 2 "Remote Access" · Remote access via Virtual Private Networks (VPN's) to corporate resources for the purposes of e-commerce, telework and remote administration is becoming commonplace. From an auditing perspective, suggest two or more controls that should be in place to prevent the loss or theft of confidential information. · Give your opinion on what you believe are the essential elements of an acceptable use policy for remote access. Elaborate on each item and justify its importance. 3 "Data Center Management" · Imagine you are an IT security specialist of a large organization which is opening a new data center. Recommend a minimum of three controls, other than door locks, you would utilize to secure the new data center physically. Support your recommendations. · Recommend a process to govern obtaining, testing, and distributing patches for operating systems and applications within the new data center. Provide your rationale. 4 "DR…What Is It Good for?" Please respond to the following: · From the first and second e-Activities, Consider the following scenario: Your employer, a small-business owner, has indicated she believes that rather than planning to recover from a disaster, it makes more sense to simply open a new business and start anew. As a security professional and proponent of disaster
  • 7. recovery, formulate a list of your top five concerns with this statement and explain each. Be sure to indicate how and why you believe these concerns are relevant for a small business. Justify your response. · Suppose you received pushback from your Board of Directors while trying to explain the necessity of a disaster recovery plan (e.g., due to costs, administrative overheard, etc.). Outline the main points and with a rationale for each that can be used to persuade the Board of Directors into believing that a plan really is necessary. 5 "Preparing for Different Disasters" Please respond to the following: · Select two disaster scenarios (e.g., large-scale power outage, flood, earthquake, etc.) to compare and contrast, and explain how an implemented DR plan would differentiate when preparing for and dealing with these disasters. · Explain how the report structure and organization could help the overall recovery efforts in a disaster, and determine whether or not you believe the organization of large plans is a key consideration for plan creators and management. Provide a rationale for your answer. 6 "IRS Disaster Recovery Plan (DRP)" Please respond to the following: · From the first e-Activity, select one portion of the IRS disaster recovery plan that you found interesting. Explain why this portion was interesting to you, and determine whether or not you believe this portion is critical to the overall contingency planning efforts of the agency. Provide a rationale to support your answer. · Determine whether or not you believe the IRS DRP would be comparable to that of large enterprises in the private sector (e.g., ConocoPhillips, General Motors, etc.), and explain whether or not you consider this to be the case. 7
  • 8. "Hurricane Sandy DR Adaptation" Please respond to the following: · From the second e-Activity, determine whether or not you believe the ability to dynamically adapt to the extreme conditions was crucial for disaster response personnel when faced with the challenges caused by Hurricane Sandy. Use examples to support your answer. · Explain how dynamic disaster plans can be created and tested. Determine whether or not you think these plans have the ability to be truly dynamic and assist personnel when amidst a disaster situation. 8 "BCP versus DRP Revisited" Please respond to the following: · Expanding on what you’ve learned since Week 2 when a similar question was posed, explain in your own words the difference between business continuity planning and disaster recovery planning, and where you believe these two processes differ and overlap. · Take a position on whether BC or DR can survive without the other. Use a real-world example to support your position. 9 "BCP by FEMA" Please respond to the following: · From the e-Activity, determine what you believe is the most critical component of BCP from FEMA’s implementation / suggestions for the BCP process. Justify your answer. · Determine whether or not you believe the BCP process would be successful without proper BIA processes being conducted. Explain why or why not. Running head: Research Prospectus 1 Research Prospectus 6
  • 9. Research Prospectus Name: Course: Instructor’s Name: Date: Proposal 1 (First choice) Topic- The superstar factor: Celebrity influence on American political campaigns. Introduction In the 2016 American Presidential elections, the job of political influencing was, in part, at the hands of a body of individuals lacking political experience; the celebrities. Each of the two candidates, Donald Trump and Hillary Clinton, enjoyed the support of a large number of celebrities, with each celebrity cashing in on their fan base to endorse the candidate of their choice. Besides that, one of the candidates, Donald Trump, had acquired celebrity status owing to his career in reality television. Therefore, celebrity politics was a significant factor in the 2016 presidential campaigns. The proposed study considers the impact that celebrities have on political campaigns, especially their influence on the quality of the political discourse around the elections. It considers questions such as: what value do celebrities bring to political campaigns?, and where do celebrities derive their political influence despite lacking political experience? However, the primary research question addressed by the proposed research is “to what extent do the celebrities enhance or dilute the political discourse?” The preliminary thesis statement based on the review of existing literature on “celebrity politics” is: “celebrities are formidable campaign machinery used by
  • 10. politicians to sway voters because of their large following, but to a significant extent, they dilute rather than enhance the political discourse owing to the tendency of the celebrities to convert the political conversation from an issue-based one to a populist contest, their lack of political experience and the fact that they subjugate the average voices in the political discourse.” Upon further research, this thesis statement will be revised to reflect the extent to which the detriment to the political discourse manifests. Literature Review The proposed research examines the impact of celebrities on the political discourse when the celebrities either participate directly in politics or when the influence the political outcome through the endorsement of their favored candidates. First, the key constructs of the research will be defined. Secondly, the research on the sources of influence for the celebrity politicians and political influencers, as well as the value that the influential celebrities bring to the political campaigns will be discussed. Finally, the relevant research on the perceived effect of the celebrity politics on the political discourse, both the positive and the negative, will be outlined. Definition of terms The primary construct that the proposed research relies on is “celebrity politics.” Most literature on celebrity politics focuses on the various roles that the “celebrity” can take in the political sphere. Street (2004) in his typology of celebrity politicians describes celebrity politics as either the practice where a person whose background is entertainment, show business or sports trades on his background to get elected e.g. Arnold Schwarzenegger, or a practice where a politician uses the “forms and associations of the celebrity to enhance their image and communicate their message” (p. 437). These two practices are construed to comprise celebrity politics. Marsh, ‘t Hart, and Tindall (2010) adopt a similar but broader typology of celebrity politics to encompass the roles of celebrity advocate,
  • 11. celebrity endorser, celebrity politician, politician celebrity, and politician who uses other’s celebrity. The sources of influence for celebrities Literature on celebrity politics examines the role of celebrities in politics by first characterizing the context from which the celebrities derive their influence. According to Ribke (2015), celebrity power is superficial and it derives from the public image of the celebrities. This public image, according to Ribke (2015) is a prefabricated one, forged by PR agents and talent agents, who shape the celebrity as a commodity depending on what the audience wants to see in the celebrities. In an alternative description of celebrity power, Lindenberg, Joly, and Stapel (2011) theorize that the influence of the celebrities derives from their ability to influence behavior by “activating bundles of social norms,” and that they can only do this if they have prestige. This “prestige,” according to Lindenberg, Joly, and Stapel (2011), only exists for as long as the public considers the celebrities to be successful. This characterization of prestige affirms the view by Ribke (2015) that the public image of the celebrities is the source of their influence. For political influence, Lindenberg, Joly, and Stapel (2011) are of the view that the celebrities reinforce the views that people already own by taking advantage of the psychological connections with their audiences to endorse what they consider ought to be. Effect of celebrity politics on the political discourse Scholars of celebrity politics differ in what they consider to be the effect of celebrity politics on the political discourse. On one side, there are those that posit that celebrities enrich or enhance the political discourse. For instance, according to Austin, Vord, Pinkleton, and Epstein (2008), the endorsement of political candidates by celebrities are positively related to the political engagement of the younger citizenry. This suggests that celebrity politics enhances the political discourse by facilitating
  • 12. the engagement of individuals who would otherwise be left out. In agreement, Wheeler (2013) argues that celebrities invigorate democracy with new ideas. According to Wheeler (2013), the celebrities represent a new form of political agency, and their utility in the reconfiguration of the discourse surrounding economic, political and social change cannot be underestimated. On the other hand, some scholars believe that celebrity politics is detrimental to the political discourse. For instance, according to Nolan and Brookes (2013), celebrity politics is largely superficial in that “offers only a temporary intensity of feeling that ultimately is empty and devoid of meaning” (p. 374). This argument suggests that the fact that the celebrities take advantage of their fame to influence the electorate eliminates substance from the political discourse. Another similar argument is that the celebrities do not have the requisite qualifications and political experience to engage in political discourse. According to Street (2004), the celebrities have “irrelevant qualities and superficial knowledge that does not justify their claim to ‘represent’” (p. 439). Finally, there is the argument that celebrity politics drowns out the average voice in the political discourse. Marsh, ‘t Hart, and Tindall (2010) argue that “the focus on the policies that celebrities endorse can devalue the social problems and unpopular, controversial or unglamorous causes to which celebrities pay little attention” (p. 332). What this means is that celebrity politics creates an uneven ground in politics by subjugating the average voices in the political discourse. Proposal 2 (Second Choice) Topic- Obamacare: Is it time to lay ACA to rest? Introduction As the most popular legacy of President Barack Obama, the Affordable Care Act (ACA) (popularly known as Obamacare) has been a target for repealing efforts by his opponents. Most recently, Obama’s successor, President Donald Trump, promised his supporters during the 2016 presidential campaigns
  • 13. that he would “repeal and replace” Obamacare. The proposed research is a policy analysis that evaluates whether Obamacare has been successful in achieving what it set to achieve. Given its performance record, are the calls to repeal and replace Obamacare justified? The preliminary thesis statement is “Overwhelming evidence suggests that Obamacare needs radical restructuring because while the Affordable Care Act has been effactive in reducing the cost of healthcare, it has not accomplished improved access and quality of care as envisaged during its conception.” This remains a tentative thesis statement and it is subject to change to reflect the perspectives that emerge during the research. Literature Review The proposed research will examine the success, or failure, of the Affordable Care Act in achieving its primary goals. First, the proposed research will discuss the primary goals of the Obamacare healthcare policy. Then, the proposed research will evaluate the Affordable Care Act based on its performance on each of its primary goals. There were three primary objectives for the Affordable Care Act when it was conceived. First, ACA was meant to increase the number of the insured people in the United States (Manchikanti, Helm, Benyamin, & Hirsch, 2017). The second objective of the ACA was improving the quality of healthcare (Manchikanti et al., 2017). Finally, the third objective of the ACA was to reduce the costs of healthcare in the United States. Increasing the number of insured Americans Existing literature on the performance of the ACA suggests that the policy has not significantly increased the number of people covered by medical insurance in the United States. There are differing views on the actual success of the ACA in increasing the number of the Americans covered by medical insurance. It would appear that Obamacare reduced the number of uninsured Americans. According to Dalen, Waterbrook, & Alpert (2015), more than 10 million Americans acquired medical insurance in 2014 thanks to ACA, bringing down the
  • 14. percentage of the uninsured Americans from 18% in July 2013 to 18% in June 2013. In agreement, Manchikanti et al. (2017) argues that between 2010 and 2015, the percentage of uninsured Americans reduced by 43%. However, this reduction is not necessarily as significant as the numbers show because 13 million of the 20 million newly insured Americans were enrolled under Medicare. According to Butler (2016), ACA missed the projected enrollments by 10 million and it should have been labeled as “Medicaid Expansion Act”. Improving the quality of health care Existing evidence-based research puts it forward that the ACA has not improved the quality of healthcare as it set to do. According to Manchikanti et al. (2017), while the quality of healthcare was expected to improve on the passage of ACA, this has not been the case due to the failure of the Act to provide preventative services. Another aspect of health care that has not changed is the waiting times. According to Rhodes et al (2014), even after the passing of the ACA, elderly Medicare patients seeking new appointments with a PCP were less successful in obtaining appointments compared to those with private insurance. In addition, some of the patients had to wait for over 2 weeks. Reducing the cost of health care Unlike the case with quality of care and the number of insured American, research suggests that the ACA has managed to lower the cost of healthcare in the United States in the years that it has been in operation. According to Manchikanti et al. (2017), it was projected that the healthcare expenditures would increase at an average annual rate of 5.6% up to 2025 if ACA was not passed. However, after the passage of ACA, the reform of the health care delivery system achieved a constant out-of-pocket spending as a percentage of the total health care spending (Manchikanti et al., 2017). In agreement, Herrera et al. (2013) points out that “Growth in out-of-pocket prescription spending was effectively flat (p. 1722). According to Burger (2011), the
  • 15. reduced costs are due to the IMR provision in the ACA, which provides for more transparency and discourages the less transparent mechanisms that MCOs use to charge the patients more. Predicts that the individual mandate as well as the accompanying minimum essential coverage provisions will continue to significantly reduce error costs and decision costs, to the effect of making health care in the United States even more affordable. Bibliography of sources Topic 1 Austin, E. W., Vord, R. V. de, Pinkleton, B. E., & Epstein, E. (2008). Celebrity Endorsements and Their Potential to Motivate Young Voters. Mass Communication & Society, 11(4), 420–436. Lindenberg, S., Joly, J., & Stapel, D. (2011). The Norm- Activating Power of Celebrity: The Dynamics of Success and Influence. Social Psychology Quarterly,74(1), 98-120. Marsh, D., ‘t Hart, P., & Tindall, K. (2010). Celebrity Politics: The Politics of the Late Modernity? Political Studies Review, 8(3), 322–340. Nolan, D., & Brookes, S. (2013). Populism in theory and practice: Analysing celebrity politics. Media Asia, 40(4), 373– 383. Ribke, N. (2015). A genre approach to celebrity politics: Global patterns of passage from media to politics. Springer. Street, J. (2004) ‘Celebrity politicians: Popular culture and political representation. The British Journal of Politics and International Relations, 6(4), 435–452. Wheeler, M. (2013). Celebrity politics: Image and identity in contemporary political communications. Cambridge, UK : Polity. Topic 2 Burger, D. D. (2011). The management of health care costs: Independent medical review after “ObamaCare.” University of Memphis Law Review, 42(2), 255–301. Butler, S. M. (2016). The future of the Affordable Care Act:
  • 16. Reassessment and revision. Jama, 316(5), 495-497. Dalen, J. E., Waterbrook, K., & Alpert, J. S. (2015). Why do so many Americans oppose the Affordable Care Act?. The American journal of medicine, 128(8), 807-810. Herrera, C. N., Gaynor, M., Newman, D., Town, R. J., & Parente, S. T. (2013). Trends underlying employer-sponsored health insurance growth for Americans younger than age sixty- five. Health Affairs, 32(10), 1715-1722. Manchikanti, L., Helm, I. S., Benyamin, R. M., & Hirsch, J. A. (2017). A Critical Analysis of Obamacare: Affordable Care or Insurance for Many and Coverage for Few?. Pain physician, 20(3), 111. Moncrieff, A. R., & Padi, M. (2014). Beyond payment and delivery reform: The individual mandate’s cost-control potential. American Journal of Law & Medicine, 40(2/3), 185– 194. Rhodes, K. V., Kenney, G. M., Friedman, A. B., Saloner, B., Lawson, C. C., Chearo, D., ... & Polsky, D. (2014). Primary care access for new patients on the eve of health care reform. JAMA internal medicine, 174(6), 861-869. THE RESEARCH PAPER PROCESS Topic Selection You will need to formally propose (as part of your written prospectus) two political science research topics. Designate your first and second preference. Your topic choice will in all likelihood combine a personal interest on your part with a relevant topic in one of the political science subfields (American politics and government, public policy, public administration, comparative politics, international relations, public law, or political philosophy). A relevant topic may overlap two or more subfields. The criteria of “relevance” will in part be decided by your instructor, and in part based upon your ability to convince him
  • 17. that a relevant scholarly literature exists with regard to your topic. The key to the successful adoption of a topic, thesis, and overall paper will be your ability to identify a robust, professional literature on your topic. If you pitch a topic that is highly subjective (you have a clear personal interest and are a true believer in your topic and the conclusion is a done deal before you do any research) it will likely be rejected as too biased. Your senior seminar research paper cannot be some kind of quasi-personal political biography. You are writing a professional political science paper (emphasis upon science), not a personal or ideological advocacy paper or blog, nor an interest group or political party platform or manifesto. Topics; 1/Trump decision to pull US troops from Syria lowers risks and costs, Change the words to like trump and the benefits and disadvantages from pulling the us army from Syria 2/politics and religion.. Is politics always rational?