Assignment 3: Incident Response (IR) Strategic Decisions
Suppose that you have been alerted of a potential incident involving a suspected worm spreading via buffer overflow techniques, compromising Microsoft IIS Web servers. As the IR Team leader, it is your responsibility to determine the next steps.
Write a two to three (2-3) page paper in which you:
Explain in detail the initial steps that would need to be made by you and the IR team in order to respond to this potential incident.
Construct a process-flow diagram that illustrates the process of determining the incident containment strategy that would be used in this scenario, and identify which containment strategy would be appropriate in this case, through the use of graphical tools in Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
Construct a process flow diagram to illustrate the process(es) for determining if / when notification of the incident should be relayed to upper management, and explain how those communications should be structured and relayed through the use of graphical tools in Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
Detail the incident recovery processes for the resolution of this incident.
Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Summarize the various types of disasters, response and recovery methods.
Develop techniques for different disaster scenarios.
Use technology and information resources to research issues in disaster recovery.
Write clearly and concisely about disaster recovery topics using proper writing mechanics and technical style conventions.
Points: 75
Assignment 3: Incident Response (IR) Strategic Decisions
Criteria
Unacceptable
Below 60% F
Meets Minimum Expectations
60-69% D
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Explain in detail the initial steps that would need to be made by you and the IR team in order to respond to this potential incident.
Weight: 15%
Did not submit or incompletely explained in detail the initial steps that would need to be made by you and the IR team in order to respond to this potential incident.
Insufficiently explained in detail the initial steps that would n.
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docxmattinsonjanel
Technical Paper: Risk Assessment
Global Finance, Inc. Network Diagram
Above is the Global Finance, Inc. (GFI) network diagram. GFI has grown rapidly this past year and acquired many network devices as displayed in the diagram. The company invested in the network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its network security has not kept up with the company growth.
GFI’s network is fairly stabilized as it has not experienced many outages due to network failures. GFI has hired three (3) network engineers to keep up with the network growth and the bandwidth demand by the company employees and the clients. However, the company has not hired any security personnel who can take care of the operational security responsibility.
The trusted computing base (TCB) internal network in the Global Finance, Inc. Network Diagram hosts the company’s mission critical systems without which the company’s operations and financial situation would suffer. The Oracle database and email systems are among the most intensively used application servers in the company. GFI cannot afford system outages because its cash flow and financial systems heavily depend on the network stability. GFI has experienced DOS network attacks twice this year and its Oracle database and email servers had been down for a week. The recovery process required GFI to use $25,000 to restore its operations back to normal. GFI estimated the loss from these network attacks at more than $100,000 including lost customer confidence.
Write a twelve to fifteen (12-15) page formal risk assessment proposal and redraw the above diagram of a secure and risk-mitigating model in which you:
1. Describe the company network, interconnection, and communication environment.
2. Assess risk based on the Global Finance, Inc. Network Diagram scenario. Note: Your risk assessment should cover all the necessary details for your client, GFI Inc., to understand the risk factors of the organization and risk posture of the current environment. The company management will decide what to mitigate based on your risk assessment. Your risk assessment must be comprehensive for the organization to make data-driven decisions.
a. Describe and defend your assumptions as there is no further information from this company. The company does not wish to release any security-related information per company policy.
b. Assess security vulnerabilities, including the possibility of faulty network design, and recommend mitigation procedures for each vulnerability.
c. Justify your cryptography recommendations based on data-driven decision making and objective opinions.
3. Examine whether your risk assessment methodology is quantitative, qualitative, hybrid, or a combination of these.
4. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify a ...
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docxbfingarjcmc
Project Deliverable 1: Project Plan Inception
Due Week 2 and worth 50 points
This assignment consists of two (2) sections: a project introduction and a Gantt chart or project plan.
You must submit both sections as separate files for the completion of this assignment.
Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
You have been made the Chief Information Officer and Chief Technology Officer (CIO / CTO) of an innovative e-Commerce start-up company that a venture capital group has funded. The CEO has given you sixty (60) days to deliver an information technology project plan in anticipation of the company locating to a new facility. Since this is a start-up company, there is currently no building or technology infrastructure to support the business. All information technology (hardware and software) must be implemented in either a hosted solution, on-site solution or a hybrid model. The CEO is expecting you to integrate different technologies from different partners and incorporate industry best practices in connection with the development of technological systems. The new facility is a two-story stand-alone building. The company currently consists of
ten (10) employees
with revenues of $5 million but is expected to grow to
thirty (30) employees
with revenue of $30 million over the next two (2) years.
Section 1: Project Introduction
1.Write a two to four (2-4) page project introduction that includes the following:
a.Background information of the company.
b.The type of business in which the company is involved.
c.A description of the information systems that the company should have to support the business. The description should include the following:
i.databases
ii.systems analysis
iii.security
iv.networking
v.computer infrastructure
vi.human computer interaction
vii.Web design
d.The use of at least two (2) quality resources in this assignment.
Note:
Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Section 2: Gantt Chart / Project Plan
Use Microsoft Project or an open source alternative, such as Open Project, to:
2.Create a Gantt chart or project plan (summary and detailed) template. The Gantt chart or project plan should:
a.Record all tasks, subtasks, resources, and time related to the project.
b.Outline the planning, analysis, design, and implementatio.
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docxbfingarjcmc
Project Deliverable 5: Network Infrastructure and Security
Due Week 8 and worth 120 points
This assignment consists of two (2) sections: an infrastructure document and a revised project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
With the parameters set forth at the onset of the project, present the infrastructure and security policy that will support the expected development and growth of the organization. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. Since the company will be merging with a multinational company, virtualization and cloud technology should be taken into consideration. In addition, access paths for Internet access should be depicted. A narrative should be included to explain all the nodes of the network and the rationale for the design. Lastly, using the Confidentiality, Integrity and Availability (CIA) Triangle, define the organizational security policy.
Section 1: Infrastructure Document
Write a five to ten (5-10) page infrastructure document in which you:
Identify possible network infrastructure vulnerabilities. Address network vulnerabilities with the appropriate security measures. Ensure that consideration is given to virtualization and cloud technology.
Design a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Explain the rationale for the logical and physical topographical layout of the planned network. Note: The graphically depicted solution is not included in the required page length.
Illustrate the possible placement of servers, including access paths to the Internet and firewalls. Note: facility limitations, workstations, printers, routers, switches, bridges, and access points should be considered in the illustration.
Create and describe a comprehensive security policy for the company that will:
Protect the company infrastructure and assets by applying the principals of CIA. Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three (3) core goals of confidentiality, integrity, and availability of information.
Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific .
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docxsagarlesley
Due 12 10 2016
Week 10 Term Paper
Click the link above to submit your assignment.
Students, please view the "Submit a Clickable Rubric Assignment" in the Student Center.
Instructors, training on how to grade is within the Instructor Center.
Term Paper: Penetration Testing
Due Week 10 and worth 120 points
As a penetration tester, you are hired as a consultant by a small- to mid-sized business that is interested in calculating its overall security risk today, January 1, 2012. The business specializes in providing private loans to college students. This business uses both an e-Commerce site and point-of-sales devices (credit card swipes) to collect payment. Also, there exist a number of file transfer operations where sensitive and confidential data is transferred to and from several external partnering companies. The typical volume of payment transactions totals is approximately $100 million. You decide that the risk assessments are to take into account the entire network of workstations, VoIP phone sets, servers, routers, switches and other networking gear. During your interview with one of the business’s IT staff members, you are told that many external vendors want to sell security networking products and software solutions. The staff member also claimed that their network was too “flat.” During the initial onsite visit, you captured the following pertinent data to use in creation of the Penetration Test Plan.
· Non-stateful packet firewall separates the business’s internal network from its DMZ.
· All departments--including Finance, Marketing, Development, and IT--connect into the same enterprise switch and are therefore on the same LAN. Senior management (CEO, CIO, President, etc.) and the Help Desk are not on that LAN; they are connected via a common Ethernet hub and then to the switched LAN.
· All of the workstations used by employees are either Windows 98 or Windows XP. None of the workstations have service packs or updates beyond service pack one.
· Two (2) Web servers containing customer portals for logging in and ordering products exist on the DMZ running Windows 2000 Server SP1, and IIS v5.
· One (1) internal server containing Active Directory (AD) services to authenticate users, a DB where all data for the company is stored (i.e. HR, financial, product design, customer, transactions). The AD server is using LM instead of NTLM.
Write a six to eight (6-8) page paper in which you:
1. Explain the tests you would run and the reason(s) for running them (e.g. to support the risk assessment plan).
2. Determine the expected results from tests and research based on the specific informational details provided. (i.e., IIS v5, Windows Server 2000, AD server not using NTLM)
3. Analyze the software tools you would use for your investigation and reasons for choosing them.
4. Describe the legal requirements and ethical issues involved.
5. Using Visio or its open source alternative, provide a diagram of how you would redesign this business’ netwo ...
Risk Management Plan Project NameLast UpdatedOverviewPro.docxhealdkathaleen
Risk Management Plan
Project Name
Last Updated
Overview
Provide an overview of the process you plan to employ to manage risk, what roles will be involved, what the procedures will be and how you will measure the impacts of risk. Include the name of your project, and indicate the version of plan and illustrate how each new version will be indicated.
‹#›
PGMT 530 Risk, Procurement and Contracts
Risk Management Plan
Process
Describe the process you plan to employ to manage risks. Will existing meetings/groups be leveraged in order to alleviate meetings? What will be the escalation procedures.
‹#›
PGMT 530 Risk, Procurement and Contracts
Risk Management Plan
Roles and Responsibilities
Describe who will be involved with the risk management process. What roles and teams are required? Are meetings required? If so, how often?
‹#›
PGMT 530 Risk, Procurement and Contracts
Risk management Plan
Communications Strategy
Describe what methods will be used to communicate on issues. Will existing meetings be used? What will the escalation procedures be?
‹#›
PGMT 530 Risk, Procurement and Contracts
Risk Management Plan
Rules/Procedures
Describe the rules or procedures the team must follow when logging, managing, and assessing risk. Should all risks be submitted to the project manager? What mechanism will be used to log risks?
‹#›
PGMT 530 Risk, Procurement and Contracts
Risk Management Plan
Risk Impact Analysis Approach
Describe the process that will be used to assess the impact of each risk. Who will be involved in this impact analysis?
ImpactTimeOccurrence Probability Rank
(Impact x Occurrence probability = RankHigh – 3Greater than 3 months delay of schedule (3)Very likely greater than 70% or 53x70%=2.1Medium - 21-3 month delay in implementation (2)Probable – 30 to 70%Low – 11 week to 1 month delay in implementation (1)Unlikely
‹#›
PGMT 530 Risk, Procurement and Contracts
Risk Management Plan
Reporting Format
Describe the elements of your reporting format. Describe the elements of the format to provide approval of the plan
‹#›
PGMT 530 Risk, Procurement and Contracts
<Project Name> Risk Management Plan
Version: 1.0 Error! Unknown document property name.<Project Name>Risk Management Plan
Version Number: 1.0
Version Date: <mm/dd/yyyy>
Notes to the Author
This document is a template of a Risk Management Plan document for a project. The template includes instructions for the proper preparation of your complete risk management plan. Failure to address all of the sections will result in a deduction of points.
Project
Description
Please describe the project that will be the subject of your risk management plan.VERSION HISTORY
Provide information on how the development and distribution of the Risk Management Plan will be controlled and tracked. Use the table below to provide the version number, the author implementing the version, the date of the version, the name of the person approving the version, the date tha ...
erm Paper Penetration TestingDue Week 10 and worth 120 points.docxmealsdeidre
erm Paper: Penetration Testing
Due Week 10 and worth 120 points
As a penetration tester, you are hired as a consultant by a small- to mid-sized business that is interested in calculating its overall security risk today, January 1, 2012. The business specializes in providing private loans to college students. This business uses both an e-Commerce site and point-of-sales devices (credit card swipes) to collect payment. Also, there exist a number of file transfer operations where sensitive and confidential data is transferred to and from several external partnering companies. The typical volume of payment transactions totals is approximately $100 million. You decide that the risk assessments are to take into account the entire network of workstations, VoIP phone sets, servers, routers, switches and other networking gear. During your interview with one of the business’s IT staff members, you are told that many external vendors want to sell security networking products and software solutions. The staff member also claimed that their network was too “flat.” During the initial onsite visit, you captured the following pertinent data to use in creation of the Penetration Test Plan.
Non-stateful packet firewall separates the business’s internal network from its DMZ.
All departments--including Finance, Marketing, Development, and IT--connect into the same enterprise switch and are therefore on the same LAN. Senior management (CEO, CIO, President, etc.) and the Help Desk are not on that LAN; they are connected via a common Ethernet hub and then to the switched LAN.
All of the workstations used by employees are either Windows 98 or Windows XP. None of the workstations have service packs or updates beyond service pack one.
Two (2) Web servers containing customer portals for logging in and ordering products exist on the DMZ running Windows 2000 Server SP1, and IIS v5.
One (1) internal server containing Active Directory (AD) services to authenticate users, a DB where all data for the company is stored (i.e. HR, financial, product design, customer, transactions). The AD server is using LM instead of NTLM.
Write a six to eight (6-8) page paper in which you:
Explain the tests you would run and the reason(s) for running them (e.g. to support the risk assessment plan).
Determine the expected results from tests and research based on the specific informational details provided. (i.e., IIS v5, Windows Server 2000, AD server not using NTLM)
Analyze the software tools you would use for your investigation and reasons for choosing them.
Describe the legal requirements and ethical issues involved.
Using Visio or its open source alternative, provide a diagram of how you would redesign this business’ network. Include a description of your drawing.
Note
: The graphically depicted solution is not included in the required page length.
Propose your final recommendations and reporting. Explain what risks exist and ways to either eliminate or reduce the risk.
Use at least t.
Term Paper Contingency Planning in ActionDue Week 10 and worth 20.docxjohniemcm5zt
Term Paper: Contingency Planning in Action
Due Week 10 and worth 200 points
Create a hypothetical organization with details including geographic location(s), number of employees in each location, primary business functions, operational and technology details, potential threats to the business and its technology, and anything else that you believe is relevant to the business.
Assume this organization is lacking in its contingency planning efforts and requires assistance in ensuring these efforts are appropriately addressed to increase its overall security and preparedness posture.
Write a ten to fifteen (10-15) page paper in which you:
Provide an overview of the organization and indicate why contingency planning efforts are needed and how these efforts could benefit the business.
Develop a full contingency plan for the organization. Include all subordinate functions / sub plans, including BIA, IRP, DRP, and BCP efforts.
Determine the policies and procedures that would be needed for all contingency planning efforts. Detail the role of the policy / procedure, and explain how each would help achieve the goals of these efforts.
Detail the processes to utilize in order to fully implement the contingency plan and its components, and explain the efforts to consider in maintaining the plans.
Create a hypothetical incident scenario where the contingency planning efforts would need to be utilized and detail: a. How the plan is sufficiently equipped to handle the incident. b. a timeline for the incident response and recovery efforts.
Identify any ethical concerns that are specific to this organization and its incident response personnel (especially the CP Team Leader), and explain how to plan for these concerns.
Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Explain risk management in the context of information security.
Develop a disaster recovery plan for an organization.
Summarize the various types of disasters, response and recovery methods.
Compare and contrast the methods of disaster recovery and bu.
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docxmattinsonjanel
Technical Paper: Risk Assessment
Global Finance, Inc. Network Diagram
Above is the Global Finance, Inc. (GFI) network diagram. GFI has grown rapidly this past year and acquired many network devices as displayed in the diagram. The company invested in the network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its network security has not kept up with the company growth.
GFI’s network is fairly stabilized as it has not experienced many outages due to network failures. GFI has hired three (3) network engineers to keep up with the network growth and the bandwidth demand by the company employees and the clients. However, the company has not hired any security personnel who can take care of the operational security responsibility.
The trusted computing base (TCB) internal network in the Global Finance, Inc. Network Diagram hosts the company’s mission critical systems without which the company’s operations and financial situation would suffer. The Oracle database and email systems are among the most intensively used application servers in the company. GFI cannot afford system outages because its cash flow and financial systems heavily depend on the network stability. GFI has experienced DOS network attacks twice this year and its Oracle database and email servers had been down for a week. The recovery process required GFI to use $25,000 to restore its operations back to normal. GFI estimated the loss from these network attacks at more than $100,000 including lost customer confidence.
Write a twelve to fifteen (12-15) page formal risk assessment proposal and redraw the above diagram of a secure and risk-mitigating model in which you:
1. Describe the company network, interconnection, and communication environment.
2. Assess risk based on the Global Finance, Inc. Network Diagram scenario. Note: Your risk assessment should cover all the necessary details for your client, GFI Inc., to understand the risk factors of the organization and risk posture of the current environment. The company management will decide what to mitigate based on your risk assessment. Your risk assessment must be comprehensive for the organization to make data-driven decisions.
a. Describe and defend your assumptions as there is no further information from this company. The company does not wish to release any security-related information per company policy.
b. Assess security vulnerabilities, including the possibility of faulty network design, and recommend mitigation procedures for each vulnerability.
c. Justify your cryptography recommendations based on data-driven decision making and objective opinions.
3. Examine whether your risk assessment methodology is quantitative, qualitative, hybrid, or a combination of these.
4. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify a ...
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docxbfingarjcmc
Project Deliverable 1: Project Plan Inception
Due Week 2 and worth 50 points
This assignment consists of two (2) sections: a project introduction and a Gantt chart or project plan.
You must submit both sections as separate files for the completion of this assignment.
Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
You have been made the Chief Information Officer and Chief Technology Officer (CIO / CTO) of an innovative e-Commerce start-up company that a venture capital group has funded. The CEO has given you sixty (60) days to deliver an information technology project plan in anticipation of the company locating to a new facility. Since this is a start-up company, there is currently no building or technology infrastructure to support the business. All information technology (hardware and software) must be implemented in either a hosted solution, on-site solution or a hybrid model. The CEO is expecting you to integrate different technologies from different partners and incorporate industry best practices in connection with the development of technological systems. The new facility is a two-story stand-alone building. The company currently consists of
ten (10) employees
with revenues of $5 million but is expected to grow to
thirty (30) employees
with revenue of $30 million over the next two (2) years.
Section 1: Project Introduction
1.Write a two to four (2-4) page project introduction that includes the following:
a.Background information of the company.
b.The type of business in which the company is involved.
c.A description of the information systems that the company should have to support the business. The description should include the following:
i.databases
ii.systems analysis
iii.security
iv.networking
v.computer infrastructure
vi.human computer interaction
vii.Web design
d.The use of at least two (2) quality resources in this assignment.
Note:
Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Section 2: Gantt Chart / Project Plan
Use Microsoft Project or an open source alternative, such as Open Project, to:
2.Create a Gantt chart or project plan (summary and detailed) template. The Gantt chart or project plan should:
a.Record all tasks, subtasks, resources, and time related to the project.
b.Outline the planning, analysis, design, and implementatio.
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docxbfingarjcmc
Project Deliverable 5: Network Infrastructure and Security
Due Week 8 and worth 120 points
This assignment consists of two (2) sections: an infrastructure document and a revised project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
With the parameters set forth at the onset of the project, present the infrastructure and security policy that will support the expected development and growth of the organization. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. Since the company will be merging with a multinational company, virtualization and cloud technology should be taken into consideration. In addition, access paths for Internet access should be depicted. A narrative should be included to explain all the nodes of the network and the rationale for the design. Lastly, using the Confidentiality, Integrity and Availability (CIA) Triangle, define the organizational security policy.
Section 1: Infrastructure Document
Write a five to ten (5-10) page infrastructure document in which you:
Identify possible network infrastructure vulnerabilities. Address network vulnerabilities with the appropriate security measures. Ensure that consideration is given to virtualization and cloud technology.
Design a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Explain the rationale for the logical and physical topographical layout of the planned network. Note: The graphically depicted solution is not included in the required page length.
Illustrate the possible placement of servers, including access paths to the Internet and firewalls. Note: facility limitations, workstations, printers, routers, switches, bridges, and access points should be considered in the illustration.
Create and describe a comprehensive security policy for the company that will:
Protect the company infrastructure and assets by applying the principals of CIA. Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three (3) core goals of confidentiality, integrity, and availability of information.
Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific .
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docxsagarlesley
Due 12 10 2016
Week 10 Term Paper
Click the link above to submit your assignment.
Students, please view the "Submit a Clickable Rubric Assignment" in the Student Center.
Instructors, training on how to grade is within the Instructor Center.
Term Paper: Penetration Testing
Due Week 10 and worth 120 points
As a penetration tester, you are hired as a consultant by a small- to mid-sized business that is interested in calculating its overall security risk today, January 1, 2012. The business specializes in providing private loans to college students. This business uses both an e-Commerce site and point-of-sales devices (credit card swipes) to collect payment. Also, there exist a number of file transfer operations where sensitive and confidential data is transferred to and from several external partnering companies. The typical volume of payment transactions totals is approximately $100 million. You decide that the risk assessments are to take into account the entire network of workstations, VoIP phone sets, servers, routers, switches and other networking gear. During your interview with one of the business’s IT staff members, you are told that many external vendors want to sell security networking products and software solutions. The staff member also claimed that their network was too “flat.” During the initial onsite visit, you captured the following pertinent data to use in creation of the Penetration Test Plan.
· Non-stateful packet firewall separates the business’s internal network from its DMZ.
· All departments--including Finance, Marketing, Development, and IT--connect into the same enterprise switch and are therefore on the same LAN. Senior management (CEO, CIO, President, etc.) and the Help Desk are not on that LAN; they are connected via a common Ethernet hub and then to the switched LAN.
· All of the workstations used by employees are either Windows 98 or Windows XP. None of the workstations have service packs or updates beyond service pack one.
· Two (2) Web servers containing customer portals for logging in and ordering products exist on the DMZ running Windows 2000 Server SP1, and IIS v5.
· One (1) internal server containing Active Directory (AD) services to authenticate users, a DB where all data for the company is stored (i.e. HR, financial, product design, customer, transactions). The AD server is using LM instead of NTLM.
Write a six to eight (6-8) page paper in which you:
1. Explain the tests you would run and the reason(s) for running them (e.g. to support the risk assessment plan).
2. Determine the expected results from tests and research based on the specific informational details provided. (i.e., IIS v5, Windows Server 2000, AD server not using NTLM)
3. Analyze the software tools you would use for your investigation and reasons for choosing them.
4. Describe the legal requirements and ethical issues involved.
5. Using Visio or its open source alternative, provide a diagram of how you would redesign this business’ netwo ...
Risk Management Plan Project NameLast UpdatedOverviewPro.docxhealdkathaleen
Risk Management Plan
Project Name
Last Updated
Overview
Provide an overview of the process you plan to employ to manage risk, what roles will be involved, what the procedures will be and how you will measure the impacts of risk. Include the name of your project, and indicate the version of plan and illustrate how each new version will be indicated.
‹#›
PGMT 530 Risk, Procurement and Contracts
Risk Management Plan
Process
Describe the process you plan to employ to manage risks. Will existing meetings/groups be leveraged in order to alleviate meetings? What will be the escalation procedures.
‹#›
PGMT 530 Risk, Procurement and Contracts
Risk Management Plan
Roles and Responsibilities
Describe who will be involved with the risk management process. What roles and teams are required? Are meetings required? If so, how often?
‹#›
PGMT 530 Risk, Procurement and Contracts
Risk management Plan
Communications Strategy
Describe what methods will be used to communicate on issues. Will existing meetings be used? What will the escalation procedures be?
‹#›
PGMT 530 Risk, Procurement and Contracts
Risk Management Plan
Rules/Procedures
Describe the rules or procedures the team must follow when logging, managing, and assessing risk. Should all risks be submitted to the project manager? What mechanism will be used to log risks?
‹#›
PGMT 530 Risk, Procurement and Contracts
Risk Management Plan
Risk Impact Analysis Approach
Describe the process that will be used to assess the impact of each risk. Who will be involved in this impact analysis?
ImpactTimeOccurrence Probability Rank
(Impact x Occurrence probability = RankHigh – 3Greater than 3 months delay of schedule (3)Very likely greater than 70% or 53x70%=2.1Medium - 21-3 month delay in implementation (2)Probable – 30 to 70%Low – 11 week to 1 month delay in implementation (1)Unlikely
‹#›
PGMT 530 Risk, Procurement and Contracts
Risk Management Plan
Reporting Format
Describe the elements of your reporting format. Describe the elements of the format to provide approval of the plan
‹#›
PGMT 530 Risk, Procurement and Contracts
<Project Name> Risk Management Plan
Version: 1.0 Error! Unknown document property name.<Project Name>Risk Management Plan
Version Number: 1.0
Version Date: <mm/dd/yyyy>
Notes to the Author
This document is a template of a Risk Management Plan document for a project. The template includes instructions for the proper preparation of your complete risk management plan. Failure to address all of the sections will result in a deduction of points.
Project
Description
Please describe the project that will be the subject of your risk management plan.VERSION HISTORY
Provide information on how the development and distribution of the Risk Management Plan will be controlled and tracked. Use the table below to provide the version number, the author implementing the version, the date of the version, the name of the person approving the version, the date tha ...
erm Paper Penetration TestingDue Week 10 and worth 120 points.docxmealsdeidre
erm Paper: Penetration Testing
Due Week 10 and worth 120 points
As a penetration tester, you are hired as a consultant by a small- to mid-sized business that is interested in calculating its overall security risk today, January 1, 2012. The business specializes in providing private loans to college students. This business uses both an e-Commerce site and point-of-sales devices (credit card swipes) to collect payment. Also, there exist a number of file transfer operations where sensitive and confidential data is transferred to and from several external partnering companies. The typical volume of payment transactions totals is approximately $100 million. You decide that the risk assessments are to take into account the entire network of workstations, VoIP phone sets, servers, routers, switches and other networking gear. During your interview with one of the business’s IT staff members, you are told that many external vendors want to sell security networking products and software solutions. The staff member also claimed that their network was too “flat.” During the initial onsite visit, you captured the following pertinent data to use in creation of the Penetration Test Plan.
Non-stateful packet firewall separates the business’s internal network from its DMZ.
All departments--including Finance, Marketing, Development, and IT--connect into the same enterprise switch and are therefore on the same LAN. Senior management (CEO, CIO, President, etc.) and the Help Desk are not on that LAN; they are connected via a common Ethernet hub and then to the switched LAN.
All of the workstations used by employees are either Windows 98 or Windows XP. None of the workstations have service packs or updates beyond service pack one.
Two (2) Web servers containing customer portals for logging in and ordering products exist on the DMZ running Windows 2000 Server SP1, and IIS v5.
One (1) internal server containing Active Directory (AD) services to authenticate users, a DB where all data for the company is stored (i.e. HR, financial, product design, customer, transactions). The AD server is using LM instead of NTLM.
Write a six to eight (6-8) page paper in which you:
Explain the tests you would run and the reason(s) for running them (e.g. to support the risk assessment plan).
Determine the expected results from tests and research based on the specific informational details provided. (i.e., IIS v5, Windows Server 2000, AD server not using NTLM)
Analyze the software tools you would use for your investigation and reasons for choosing them.
Describe the legal requirements and ethical issues involved.
Using Visio or its open source alternative, provide a diagram of how you would redesign this business’ network. Include a description of your drawing.
Note
: The graphically depicted solution is not included in the required page length.
Propose your final recommendations and reporting. Explain what risks exist and ways to either eliminate or reduce the risk.
Use at least t.
Term Paper Contingency Planning in ActionDue Week 10 and worth 20.docxjohniemcm5zt
Term Paper: Contingency Planning in Action
Due Week 10 and worth 200 points
Create a hypothetical organization with details including geographic location(s), number of employees in each location, primary business functions, operational and technology details, potential threats to the business and its technology, and anything else that you believe is relevant to the business.
Assume this organization is lacking in its contingency planning efforts and requires assistance in ensuring these efforts are appropriately addressed to increase its overall security and preparedness posture.
Write a ten to fifteen (10-15) page paper in which you:
Provide an overview of the organization and indicate why contingency planning efforts are needed and how these efforts could benefit the business.
Develop a full contingency plan for the organization. Include all subordinate functions / sub plans, including BIA, IRP, DRP, and BCP efforts.
Determine the policies and procedures that would be needed for all contingency planning efforts. Detail the role of the policy / procedure, and explain how each would help achieve the goals of these efforts.
Detail the processes to utilize in order to fully implement the contingency plan and its components, and explain the efforts to consider in maintaining the plans.
Create a hypothetical incident scenario where the contingency planning efforts would need to be utilized and detail: a. How the plan is sufficiently equipped to handle the incident. b. a timeline for the incident response and recovery efforts.
Identify any ethical concerns that are specific to this organization and its incident response personnel (especially the CP Team Leader), and explain how to plan for these concerns.
Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Explain risk management in the context of information security.
Develop a disaster recovery plan for an organization.
Summarize the various types of disasters, response and recovery methods.
Compare and contrast the methods of disaster recovery and bu.
JNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docxdonnajames55
JNR NON-PERMANENCE RISK REPORT: VCS Version 3
VCS JNR Non-Permanence Risk Report Template
This report template is for analyzing the non-permanence risk of VCS jurisdictional REDD+ programs. VCS projects, including nested projects, must use the VCS Non-Permanence Risk Report Template.
Instructions for completing the JNR Non-Permanence Risk Report:
TITLE PAGE: All items in the box at the bottom of the title page must be completed using Arial 10pt, black, regular (non-italic) font. This box must appear on the title page of the final document. The JNR non-permanence risk report may also feature the report title and preparer’s name and logo more prominently on the title page, using the format below (Arial 24pt and Arial 11pt, black, regular font).
JNR NON-PERMANENCE RISK REPORT: Instructions for completing the JNR non-permanence risk report can be found under the section headings in this template. All instructions must be followed. Instructions relate back to the rules and requirements set out in the JNR Requirements, VCS Standard and accompanying program documents. As such, this template must be completed in accordance with such documents, and the preparer will need to refer to the VCS program documents and in order to complete the template. It is also expected that relevant guidance is followed. Note that the instructions in this template are intended to serve as a guide and do not necessarily represent an exhaustive list of the information the preparer should provide under each section of the template.
All sections must be completed using Arial 10pt, black, regular (non-italic) font. Where a section is not applicable, same must be stated under the section (the section must not be deleted from the final document).
This document may be included as an annex to the JNR program description or JNR monitoring report, as applicable, or provided as a stand-alone document. Where submitted as an annex, the cover page may be deleted and where submitting as a stand-alone document, the cover page must be completed.
Where a jurisdiction is stratified due to different risk profiles, the whole document must be filled out for each area (either as separate documents, or by repeating all of the steps/tables).
All instructions, including this introductory text, should be deleted from the final document.
JNR NON-PERMANENCE RISK REPORT TITLE
Logo (optional)
Document Prepared By (individual or entity)
Jurisdictional REDD+ Program Title
Name of jurisdictional REDD+ program
Version
Version number of this document
Date of Issue
DD-Month-YYYY this version of the document issued
Program ID
VCS project database ID, if registered
Monitoring Period
DD-Month-YYYY to DD-Month-YYYY
Prepared By
Individual or entity that prepared the document
Contact
Physical address, telephone, email, website
Document and substantiate the risk and/or mitigation for each risk factor applicable to the jurisdictional program. Include any relevant documentary evidence. Where a risk or.
JNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docxvrickens
JNR NON-PERMANENCE RISK REPORT: VCS Version 3
VCS JNR Non-Permanence Risk Report Template
This report template is for analyzing the non-permanence risk of VCS jurisdictional REDD+ programs. VCS projects, including nested projects, must use the VCS Non-Permanence Risk Report Template.
Instructions for completing the JNR Non-Permanence Risk Report:
TITLE PAGE: All items in the box at the bottom of the title page must be completed using Arial 10pt, black, regular (non-italic) font. This box must appear on the title page of the final document. The JNR non-permanence risk report may also feature the report title and preparer’s name and logo more prominently on the title page, using the format below (Arial 24pt and Arial 11pt, black, regular font).
JNR NON-PERMANENCE RISK REPORT: Instructions for completing the JNR non-permanence risk report can be found under the section headings in this template. All instructions must be followed. Instructions relate back to the rules and requirements set out in the JNR Requirements, VCS Standard and accompanying program documents. As such, this template must be completed in accordance with such documents, and the preparer will need to refer to the VCS program documents and in order to complete the template. It is also expected that relevant guidance is followed. Note that the instructions in this template are intended to serve as a guide and do not necessarily represent an exhaustive list of the information the preparer should provide under each section of the template.
All sections must be completed using Arial 10pt, black, regular (non-italic) font. Where a section is not applicable, same must be stated under the section (the section must not be deleted from the final document).
This document may be included as an annex to the JNR program description or JNR monitoring report, as applicable, or provided as a stand-alone document. Where submitted as an annex, the cover page may be deleted and where submitting as a stand-alone document, the cover page must be completed.
Where a jurisdiction is stratified due to different risk profiles, the whole document must be filled out for each area (either as separate documents, or by repeating all of the steps/tables).
All instructions, including this introductory text, should be deleted from the final document.
JNR NON-PERMANENCE RISK REPORT TITLE
Logo (optional)
Document Prepared By (individual or entity)
Jurisdictional REDD+ Program Title
Name of jurisdictional REDD+ program
Version
Version number of this document
Date of Issue
DD-Month-YYYY this version of the document issued
Program ID
VCS project database ID, if registered
Monitoring Period
DD-Month-YYYY to DD-Month-YYYY
Prepared By
Individual or entity that prepared the document
Contact
Physical address, telephone, email, website
Document and substantiate the risk and/or mitigation for each risk factor applicable to the jurisdictional program. Include any relevant documentary evidence. Where a risk or ...
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docxstarkeykellye
G
Assignment 4: Designing Compliance within the LAN-to-WAN Domain
Due Week 8 and worth 100 points
Note:
Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized formatting requirements, do NOT count toward the overall page length.
Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas:
Protecting data privacy across the WAN
Filtering undesirable network traffic from the Internet
Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web
Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources
Having an area designed to trap attackers in order to monitor attacker activities
Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity
Hiding internal IP addresses
Allowing operating system and application patch management
The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to-WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations.
Write a three to five page paper in which you:
Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will:
filter undesirable network traffic from the Internet
filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web
allow for a zone for anonymous users but aggressively controls information exchange with internal resources
allow for an area designed to trap attackers in order to monitor attacker activities
offer a means to monitor network traffic in real time as a means to identify and block unusual activity
hide internal IP addresses
Identify the fundamentals of public key infrastructure (PKI).
Describe the manner in which your solution will protect the privacy of data transmitted across the WAN.
Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective.
Use at least three quality resources in this assignment.
Note:
Wikipedia and similar Websites do not qualify as quality resources.
Note:
The graphically depicted solution is not included in the required page length.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Ch ...
Assignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docxssuser562afc1
Assignment 4: VoIP Part 4 (Risk Register)
Utilizing the Delphi technique, your team constructed the following risks register the VoIP project containing the risk, the likelihood of its occurrence on a scale of 1 (least likely) to 5 (most likely), and the potential negative impact on the project on the same scale. In addition, they recommended the appropriate response and identified its type for one of the risks identified.
#
Risk
Likelihood (1-5)
Impact
(1-5)
Response Type
Response
1
Project Delayed due to lack of resources
3
5
2
Project runs out of funds before completion
1
5
3
Users reject new system
2
2
4
Defective Hardware
1
5
5
New government regulations introduced during deployment increase the cost of running VoIP
2
3
6
Yearly renewal fee issued on the legacy system due to delay of over 30 days in deployment of the new system
1
4
Mitigation
Schedule check 30 days before project deadline to determine if action needs to be taken to avoid delay. Decision tree will be utilized.
Write a three to five (3-5) page paper in which you:
1. Explain risk management and its associated activities and defend the need for a risk management plan.
2. Describe the Delphi technique used to identify risks and infer on types of projects where this technique is most accurate.
3. Examine the four (4) types of risk response (i.e., avoidance, acceptance, transference, and mitigation) and determine the appropriate situation where each should be used.
4. Complete the table with the risk response type (i.e., avoidance, acceptance, transference, and mitigation) and a description of the response.
5. Create a decision tree with the software of your choice to address risk number 6. Assume that when you check the schedule on day 60 of the project, it becomes evident that two (2) additional engineers are needed to ensure on-time completion of the project. The engineers cost $25,000 each and a fee of $120,000 is issued by the legacy provider. The probability of completing the project on time is as follows: With the current personnel – 60%; With one (1) engineer – 80%; With both engineers – 98%.
6. Explain the methodology utilized to create a decision tree and recommend the appropriate action to take based on your decision tree from criterion 5.
7. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
· Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
· Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
· Include the decision tree created in your chosen software. The complete ...
Disaster Recovery PlanThis assignment consists of two (2) part.docxduketjoy27252
Disaster Recovery Plan
This assignment consists of two (2) parts: a written paper and a PowerPoint presentation. You must submit both parts as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
In recent years, organizations have witnessed the impact of having effective and non-effective business continuity plans and disaster recovery plans. In today’s environment, with significant potential natural disasters, terrorist threats, and other man-made threats, it is critical that organizations develop effective business continuity plans and disaster recovery plans. Select an organization that you are familiar with, such as where you currently or previously have worked, contact a local organization, or search on the Internet for the needed detail of an organization you are interested in. Prepare a disaster recovery plan policy for that organization.
Part 1: Written Paper1.
1. Write a six pages paper in which you:
a. Provide an overview of the organization that will be delivered to senior management, defining the business goals and objectives and the size, layout, and structure of the organization.
b. Include a diagram of the organization’s network architecture and the proposed network architecture of an alternate computing facility in the event of a disaster (or the actual network architecture of the alternate computing facility if one already exists) through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
c. Develop the DRP Policy, including:
i. Disaster declaration
ii. Assessment of security
iii. Potential disaster scenarios and methods of dealing with the disaster
iv. Disaster recovery procedures
d. Develop an Incident Response Team (IRT) charter, which includes the following sections:
i. Executive summary
ii. Mission statement
iii. Incident declaration
iv. Organizational structure
v. Roles and responsibilities
vi. Information flow and methods of communication
vii. Methods and services provided by the IRT
viii. Authority and reporting procedures
Your assignment must follow these formatting requirements:
· Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
· Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
· Include charts or diagrams created in MS Visio or Dia as an appendix of the infrastructure document. All references to these diagrams must be included in .
Project Risk Management - Week 2: Individual Assignment
Overview and Rationale
In order to demonstrate proficiency with the content in this course we will complete a number of different assignments to validate your learning – and allow you to implement relevant practices a real-world setting.
Program Level - Student Learning Outcomes:
Create a risk management plan to determine how both positive and negative risks will be identified, analyzed and managedArticulate the value and benefits of creating an effective approach to planning for project risk managementIdentify project related risks and their drivers by integrating best practices, tools and techniques
Analyze risks using qualitative methods for the purpose of risk exposure and prioritization and communicate their impact to the stakeholdersAnalyze risks using quantitative methods for the purpose of risk exposure and prioritization and communicate their impact to the stakeholdersRecommend risks for risk response planning or watch listDevise a risk response plan based on appropriate techniques and strategies that would meetStakeholders’ expectationsExecute the risk management plan to continuously monitor risks and risk responsesDescribe how organizational and cultural factors may undermine implementation of effective risk management and develop strategies to overcome these factors
Week 2 Learning Objectives
Integrate best practices, tools and techniques to identify project related risks
Perform Stakeholders analysis to identify stakeholders to include in Risk Identification (and how)
Identify Risk identification tools &techniques
Craftqualityriskstatementsthatclarifyriskdrivers,eventsandimpacts
CreateariskregisterthatalignstoRiskManagementPlanandstakeholderneeds
Explain the process of using-Delphi technique, brainstorming, nominal group, affinity diagramming (group creativity) to identify risks
The next step in risk management is identifying the risks that may impact the progress or success of your project. For this assignment, you will begin to populate the risk register and identify the risks that may occur in the project. For this assignment you will complete and submit:
RiskRegisterthatincludesacomprehensivelistofidentifiedrisks.
A minimum (“meets requirements”) of 15 risks should beidentified
Toensuretheriskidentificationincludesthebreadthanddepthnecessaryforsuccess,besuretoincludeatleast2risksfrom:
1 project-level/ businessrisks
2risksperphaseoftheproject(so,iftheprojecthas5phases,thiswouldbetwoperphaseor10risks)
1 project-specific resourcerisks
1 schedule risks (criticalpath)
1 project-specific costrisks
2 implementationrisks
2opportunities
Risk statements must be written in the cause-condition-conclusion format. Additionally, you should identify the risk owner and the trigger event for eachrisk.
For this assignment, do not work to analyze or determine handling actions for the risks – this assignment is to identify the risks only- later weeks will analyze and plan for how to ...
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docxastonrenna
Assignment 4: Designing Compliance within the LAN-to-WAN Domain
Note:
Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized formatting requirements, do NOT count toward the overall page length.
Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas:
Protecting data privacy across the WAN
Filtering undesirable network traffic from the Internet
Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web
Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources
Having an area designed to trap attackers in order to monitor attacker activities
Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity
Hiding internal IP addresses
Allowing operating system and application patch management
The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to-WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations.
Write a three to five (3-5) page paper in which you:
Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will:
filter undesirable network traffic from the Internet
filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web
allow for a zone for anonymous users but aggressively controls information exchange with internal resources
allow for an area designed to trap attackers in order to monitor attacker activities
offer a means to monitor network traffic in real time as a means to identify and block unusual activity
hide internal IP addresses
Identify the fundamentals of public key infrastructure (PKI).
Describe the manner in which your solution will protect the privacy of data transmitted across the WAN.
Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective.
Use at least three (3) quality resources in this assignment.
Note:
Wikipedia and similar Websites do not qualify as quality resources.
Note:
The graphically depicted solution is not included in the required page length.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor.
Points 160Technical Paper Risk AssessmentCriteriaUna.docxLeilaniPoolsy
Points: 160
Technical Paper: Risk Assessment
Criteria
Unacceptable
Below 70% F
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Describe the company network, interconnection, and communication environment.
Weight: 15%
Did not submit or incompletely described the company network, interconnection, and communication environment.
Partially described the company network, interconnection, and communication environment.
Satisfactorily described the company network, interconnection, and communication environment.
Thoroughly described the company network, interconnection, and communication environment.
2a. Defend your assumptions where pertinent information from the scenario isn’t available.
Weight: 5%
Did not submit or incompletely defended your assumptions where pertinent information from the scenario isn’t available.
Partially defended your assumptions where pertinent information from the scenario isn’t available.
Satisfactorily defended your assumptions where pertinent information from the scenario isn’t available.
Thoroughly defended your assumptions where pertinent information from the scenario isn’t available.
2b. Ascertain apparent security vulnerabilities, and analyze at least three (3) such vulnerabilities. Such analysis should entertain the possibility of faulty network design. Recommend mitigation processes and procedures for each of the identified vulnerabilities.
Weight: 5%
Did not submit or incompletely ascertained apparent security vulnerabilities; did not submit or incompletely analyzed at least three (3) such vulnerabilities. Did not submit or incompletely entertained the possibility of faulty network design. Did not submit or incompletely recommended mitigation processes and procedures for each of the identified vulnerabilities.
Partially ascertained apparent security vulnerabilities; partially analyzed at least three (3) such vulnerabilities. Partially entertained the possibility of faulty network design. Partially recommended mitigation processes and procedures for each of the identified vulnerabilities.
Satisfactorily ascertained apparent security vulnerabilities; satisfactorily analyzed at least three (3) such vulnerabilities Satisfactorily entertained the possibility of faulty network design. Satisfactorily recommended mitigation processes and procedures for each of the identified vulnerabilities.
Thoroughly ascertained apparent security vulnerabilities; thoroughly analyzed at least three (3) such vulnerabilities. Thoroughly entertained the possibility of faulty network design. Thoroughly recommended mitigation processes and procedures for each of the identified vulnerabilities.
2c. Justify your cryptography recommendations, based on security concerns and requirements, data-driven decision-making, and objective opinions.
Weight: 5%
Did not submit or incompletely justified your cryptography recommendations, based on security concerns and requirements, data-driven decision making, and objecti.
Running head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docxrtodd599
Running head: VOIP WORK BREAKDOWN STRUCTURE
1
VOIP WORK BREAKDOWN STRUCTURE
4
Student Name
Professor
University Name
Class Name
Week 5VoIP Part 1 Work Breakdown Structure
08/12/2018
Project Requirements and Assumptions for the new VoIP Phone System
Budget
The budget for the deployment of the new VoIP phone system is estimated to be $25,000. The budget covers all the equipment required, the installation operations as well as commercial software and licensing needed in operating and maintaining the VoIP system.
Human Resources/project team
The project team would include and not limited to the organization’s CEO, Chief Information Officer, the IT manager/Administrator, the Network Engineer and the Chief Financial Officer. The team will ensure the implementation of the system within the allocated budget and time.
Workload
The workload for the project includes all the hardware utilized in the deployment, installation and maintenance of the VoIP systems in the organization.
Dependencies
The components of the VoIP phone system comprise of servers, and phones whose implementation would require completion of some tasks as well as depend on initiation of other associated activities.
A work breakdown structure forms a major project deliverable that put in order the project team's work into subtasks. By so doing the work breakdown structure describes the scope into tasks that a project team can fully understand. At each level of the WBS further task description and details are provided. It begins with the project at the top as the main deliverable followed by further decomposition into sub-deliverables utilizing an outline hierarchy. Such sub-deliverables are further decomposed in a manner that a single individual is assigned where the particular work packages needed to create the sub- deliverable are determined and clustered together (Norman, Brotherton, & Fried, 2011). The work package embodies the list of tasks in creating a given distinct unit of work. The work packages are defined on the WBS and assigned a budget and thus easy to track financial progress of the project as well as performance.
References
Collins, D., & Swale, R. (2014). Carrier-grade VoIP. New York: McGraw-Hill Education
Norman, E. S., Brotherton, S. A., & Fried, R. T. (2011). Work Breakdown Structures: The Foundation for Project Management Excellence. Chichester: Wiley.
Week 9 Assignment 6 - Submit Here
Using the Delphi technique, your team constructed the following risks register for the VoIP project containing the risk, the likelihood of its occurrence on a scale of 1 (least likely) to 5 (most likely), and the potential negative impact on the project on the same scale. In addition, they recommended the appropriate response and identified its type for one of the risks identified.
#
Risk
Likelihood (1-5)
Impact (1-5)
Response Type
Response
1
Project Delay due to lack of resources
3
5
2
Project .
Econ 421Subsidies Problem SetSpring 20151. Suppose low-in.docxjack60216
Econ 421
Subsidies: Problem Set
Spring 2015
1. Suppose low-income people are given vouchers worth 200 dollars per month that they can use only to pay rent on housing.
a. Use indifference curve analysis to show how the person could be made as well off with a 200 dollar case transfer.
b. Would the consumer's choice of the amount of housing to rent be any different if he receives cash instead of housing vouchers?
c. Use indifference curve analysis to show under what circumstance the 200 dollar per month housing voucher would cause the recipient to increase the amount of housing rented compared to what would be rented if the recipient received 200 dollars in cash each month in lieu of the housing vouchers.
d. Would this recipient be as well off under the housing voucher scheme as he would be with a cash transfer of equal value?
2. A needy family consisting of a mother and three children currently receives cash benefits that average 12 dollars per day. The mother of this family is allowed to earn an average of 4 dollars per day before her benefits begin to decline. After that, for each dollar earned cash benefits decline by 67 cents.
a. Plot the recipients money income-leisure tradeoff (budget) line under these circumstances.
b. Assume that she can find work at 4 dollars per hour. How many hours will she have to work per day before her benefits are eliminated?
c. Assuming that her indifference curves for work and leisure are convex, show her equilibrium allocation of time between work and leisure per day. Show that it is possible to have more than one most preferred outcome.
3. Go to http://www.irs.gov to obtain the tables for the earned income tax credit (EITC) for the current year.
a. Explain how the program increases earnings for low-income workers and affects their incentives.
b. Draw a curve for single workers filing jointly, and single parents show how the EITC will vary with earnings.
c. Why does the EITC encourage low-income workers to work? Use indifference curve analysis to show the income and substitution effects results from the EITC up to the point at which the maximum credit level of earnings is reached.
4. Explain why the negative income tax plan is likely to be more expensive than the currnet system of assistance to the poor. What are the advantages of wage rate subsidies?
CDS344 & CIS344 FINAL
Chapter 6
1. What name is given to a method of developing software that is based on small project iterations, or sprints, instead of long project schedules?
A. baseline
B. waterfall model
C. agile development
D. sprint
2. What is meant by authorizing official (AO)?
A. An individual to enact changes in response to reported problems.
B. The process of managing changes to computer/device configuration or application software.
C. A senior manager who reviews a certification report and makes the decision to approve the system for implementation.
D. A mandated requirement for a hardware or software solution that is used t ...
Read Chapters 5, 6, and 7 in our textbook. After reviewing this week.docxleonorepour284
Read Chapters 5, 6, and 7 in our textbook. After reviewing this week’s required reading, consider the following scenario: You are the lead of the risk management team that has been assigned to evaluate an incident that has occurred. You will be preparing a report for the CEO of the hospital that includes all system failures that contributed to the adverse event as well as utilizing a CQI tool (pareto, fishbone, flowchart). You will be using the
Adverse Event template
document to complete the three parts to the assignment. Note: If you have responded substantively to each of the content items within the three parts of the assignment, the paper should be between six and seven pages.
Part One: Description of Adverse Event
(Complete Part One of the
Adverse Event template
)
Choose an adverse event from the following list:
Medication error
Patient falls
Post-operative hemorrhage
The number of Discharges indicates the total number of patients who have been admitted and discharged in the hospital
Using the data listed below for your selected adverse event only, analyze and describe what the data is telling you. Make sure to include the graph in your template document.
Data -
Patient Safety Event for XYZ Hospital for the year 20XX through 20YY
# of Discharges
# of Surgical Cases
# of Medication Errors
# of Patient Falls
# of Post Operative Hemorrhage
20XX
20YY
20XX
20YY
20XX
20YY
20XX
20YY
20XX
20YY
Jan
1200
1400
200
240
300
350
38
35
1
3
Feb
1278
1450
213
250
289
370
42
40
1
2
Mar
1389
1540
250
300
300
385
37
45
3
2
Apr
1199
1800
200
245
289
412
36
65
2
3
May
900
1768
159
289
215
404
40
70
1
3
Jun
1000
1690
173
285
215
398
46
65
1
2
Jul
1200
1100
215
200
278
246
50
45
2
1
Aug
1239
978
240
158
301
241
53
40
2
3
Sep
1000
1089
198
200
275
215
48
51
3
2
Oct
789
978
150
248
241
251
38
52
2
1
Nov
980
1000
175
209
230
231
42
47
2
1
Dec
700
980
145
215
200
235
25
43
3
1
Note
: The number of beds and operating rooms increased effective 1/1/20YY.
List the advent chosen and include background such as prevalence of the incident.
Describe the adverse event in detail. You can make-up the scenario on the event topic chosen from the list or you can research an actual story on one of the events and utilize it for this assignment.
List who was involved in the event and their role in the event.
List the stakeholders on your CQI team. Discuss the differences among the stakeholders that might cause issues when working as a CQI team. Include barriers to their communicating effectively as a team and the communication techniques/methods utilized to inform the organization's staff of the adverse event improvement plan.
Describe at least two operational or safety processes that might not have been followed that contributed or caused this event to take place. For instance, describe any regulations or proc.
Points 200 Term Paper The Rookie Chief Information Security .docxLeilaniPoolsy
Points: 200 Term Paper: The Rookie Chief Information Security Officer
Criteria
Unacceptable
Below 60% F
Meets
Minimum
Expectations
60-69% D
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
Part 1: Organization Chart
1ai. Use Visio or an
Open Source
alternative, such as
Dia, to create an
organization chart in
which you illustrate
the roles that will be
required to ensure
design, evaluation,
implementation, and
management of
security programs for
the organization.
Weight: 5%
Did not submit or
incompletely
used Visio or an
Open Source
alternative, such
as Dia, to create
an organization
chart in which
you illustrated the
roles that will be
required to
ensure design,
evaluation,
implementation,
and management
of security
programs for the
organization.
Insufficiently
used Visio or
an Open
Source
alternative,
such as Dia, to
create an
organization
chart in which
you illustrated
the roles that
will be required
to ensure
design,
evaluation,
implementation,
and
management of
security
programs for
the
organization.
Partially used
Visio or an
Open Source
alternative,
such as Dia, to
create an
organization
chart in which
you illustrated
the roles that
will be required
to ensure
design,
evaluation,
implementation,
and
management of
security
programs for
the
organization.
Satisfactorily
used Visio or
an Open
Source
alternative,
such as Dia, to
create an
organization
chart in which
you illustrated
the roles that
will be required
to ensure
design,
evaluation,
implementation,
and
management of
security
programs for
the
organization.
Thoroughly
used Visio or
an Open
Source
alternative,
such as Dia, to
create an
organization
chart in which
you illustrated
the roles that
will be required
to ensure
design,
evaluation,
implementation,
and
management of
security
programs for
the
organization.
1aii. Use Visio or an
Open Source
alternative, such as
Dia, to create an
organization chart in
which you clearly
identify the reporting
structure for roles
such as IT Security
Compliance Officer,
Security Manager,
CIO, CISO, IT
Security Engineer,
Privacy Security
Professional, and IT
Procurement
Specialist.
Weight: 5%
Did not submit or
incompletely
used Visio or an
Open Source
alternative, such
as Dia, to create
an organization
chart in which
you clearly
identified the
reporting
structure for roles
such as IT
Security
Compliance
Officer, Security
Manager, CIO,
CISO, IT Security
Engineer, Privacy
Security
Professional, and
IT Procurement
Specialist.
Insufficiently
used Visio or
an Open
Source
alternative,
such as Dia, to
create an
organization
chart in which
you clearly
identified the
reporting
structure for
roles such as IT
Security
Compliance
Officer,
Security
Manager, CIO,
CISO, IT
Security
Engineer,
Privacy
Security
Professional,
and IT
Procureme.
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxcarlibradley31429
Assignment 1: Designing Compliance within the LAN-to-WAN Domain
Note: Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized formatting requirements, do NOT count toward the overall page length.
Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas:
· Protecting data privacy across the WAN
· Filtering undesirable network traffic from the Internet
· Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web
· Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources
· Having an area designed to trap attackers in order to monitor attacker activities
· Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity
· Hiding internal IP addresses
· Allowing operating system and application patch management
The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to-WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations.
Write a three to five page paper in which you:
1. Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will:
a. filter undesirable network traffic from the Internet
b. filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web
c. allow for a zone for anonymous users but aggressively controls information exchange with internal resources
d. allow for an area designed to trap attackers in order to monitor attacker activities
e. offer a means to monitor network traffic in real time as a means to identify and block unusual activity
f. hide internal IP addresses
2. Identify the fundamentals of public key infrastructure (PKI).
3. Describe the manner in which your solution will protect the privacy of data transmitted across the WAN.
4. Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective.
5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Note: The graphically depicted solution is not included in the required page length.
Your assignment must follow these formatting requirements:
· This course requires use of Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review t.
Assignment 5Hi Prof. Dan,This assignment is just a continuat.docxssuser562afc1
Assignment 5
Hi Prof. Dan,
This assignment is just a continuation of assignment 3 & 4 that you completed for me on Repeat Offenders and the solutions that I am incorporating which are education, treatment, and guaranteed job placement. I also thought about incorporating an alternative sentencing home which could be an alternative to prison while the offender completes the three phases. This assignment focuses on the financial aspect of the project and is a power point. If you do not have copies of the past assignments you’ve done and need to see them let me know. Thank you so much for your help.
As the Finance Director of the local police department, you are requested to prepare a presentation for the funding of your solution during the annual budget hearing of the city council. It is important that you include all costs associated with the solution as the city council does not provide additional funding if the actual cost would exceed the proposed cost. If additional costs would arise, it could result in the failure of the solution. Estimate the costs associated with the implementation of your proposed solution and focus on the following:
· Provide a cost estimate for the solution. Use a table or spreadsheet format to display your numerical estimates.
· Identify factors that could increase the estimated costs.
· Present examples why your proposal is cost effective.
· Research state and federal sources of funding for your solution.
Incorporate appropriate animations, photos, tables, spread sheets and graphics for each slide.
Support your presentation with at least three (3) scholarly resources. In addition to these specified resources, other appropriate scholarly resources may be included.
Length: 12-15 slides (with a separate reference slide), plus chart or Excel spreadsheet
Notes Length: 100-150 words for each slide
Adverse Event Reporting
Read Chapters 5, 6, and 7 in our textbook. After reviewing this week’s required reading, consider the following scenario: You are the lead of the risk management team that has been assigned to evaluate an incident that has occurred. You will be preparing a report for the CEO of the hospital that includes all system failures that contributed to the adverse event as well as utilizing a CQI tool. You will be using the Adverse Event template to complete the three parts to the assignment. Note: If you have responded substantively to each of the content items within the three parts of the assignment, the paper should be between six and seven pages.
Part One: Description of Adverse Event (Complete Part One of the Adverse Event template)
· Choose an adverse event from the following list:
· Medication error
· Patient falls
· Post-operative hemorrhage
· Data - Patient Safety Event For XYZ Hospital for 20XX through 20YY
# of Discharges
# of Surgical Cases
# of Medication Errors
# of Patient Falls
# of Post Operative Hemorrhage
20XX
20YY
20XX
20YY
20XX
20YY
20XX
20YY
20XX
20YY
Jan ...
Maximo Oil and Gas 7.6.1 HSE: Incident Management overviewHelen Fisher
The Incidents application has a full service capability for use by supervisory personnel and HSE professionals. Create Incident and View Incident can be used by less frequent users who want to simply enter an incident. The Incident Reporter supports a disconnected mobile environment with a simple user interface to report any type of incident using a mobile device. Ticket Template supports the creation of Incident templates.
publicsynchronizedclass RandomSeq {
private String id;
private String seq;
public void RandomSeq();
public void RandomSeq(String, String);
public void setSeqID(String);
public void setSeq(String);
public String getSeqID();
public String getSeq();
public String getRandomSeq(long);
public void formatSeq(int);
}
Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing
skills, using the following rubric.
Points: 80 Assignment 6: VoIP Part 4 (Risk Register)
Criteria
Unacceptable
Below 70% F
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Explain risk
management and its
associated activities
and defend the need
for a risk management
plan.
Weight: 10%
Did not submit or
incompletely
explained risk
management and its
associated activities
and did not submit
or incompletely
defended the need
for a risk
management plan.
Partially explained
risk management
and its associated
activities and
partially defended
the need for a risk
management plan.
Satisfactorily
explained risk
management and
its associated
activities and
satisfactorily
defended the need
for a risk
management plan.
Thoroughly
explained risk
management and
its associated
activities and
thoroughly
defended the need
for a risk
management plan.
2. Describe the Delphi
technique used to
identify risks and infer
on types of projects
where this technique is
most accurate.
Weight: 10%
Did not submit or
incompletely
described the Delphi
technique used to
identify risks and did
not submit or
incompletely inferred
on types of projects
where this technique
is most accurate.
Partially described
the Delphi
technique used to
identify risks and
partially inferred on
types of projects
where this
technique is most
accurate.
Satisfactorily
described the
Delphi technique
used to identify
risks and
satisfactorily
inferred on types of
projects where this
technique is most
accurate.
Thoroughly
described the
Delphi technique
used to identify
risks and thoroughly
inferred on types of
projects where this
technique is most
accurate.
3. Examine the four (4)
types of risk response
(i.e., avoidance,
acceptance,
transference, and
mitigation) and
determine the
appropriate situation
where each should be
used.
Weight: 10%
Did not submit or
incompletely
examined the four
(4) types of risk
response and did
not submit or
incompletely
determined the
appropriate situation
where each should
be used.
Partially examined
the four (4) types of
risk response and
partially determined
the appropriate
situation where
each should be
used.
Satisfactorily
examined the four
(4) types of risk
response and
satisfactorily
determined the
appropriate
situation where
each should be
used.
Thoroughly
examined the four
(4) types of risk
response and
thoroughly
determined the
appropriate
situation where
each should be
used.
4. Complete the table
with the risk response
type (i.e., avoidance,
acceptance,
transfer ...
The security consulting firm that you work for has been awarded a co.docxjoshua2345678
The security consulting firm that you work for has been awarded a contract to implement a new IT Security Infrastructure to secure the Information Technology data assets of a local government agency. This agency has many remote workers that are in the field and need to connect back to the agency’s system servers. The remote workers use a wireless network infrastructure to connect their electronic pads to servers located within the local government’s facility. The remote workers have needs to access property records, cite zoning violations electronically, and validate building permits. The public demand to expand IT services has grown faster than its ability to provide an adequately secured infrastructure. In fact, this government entity was previously featured on the news for having minimal security controls and methods for accessing property tax information of citizens. The inadequate security allowed many construction trade businesses to illegally access property records and zoning violations. Your role in this project is to enhance and optimize the security mechanisms for accessing these systems.
Write a four to five (4-5) page paper in which you:
1. Create an information flow diagram, using Visio or Dia, which:
a. Illustrates how remote users will securely connect to the government agency’s network.
b. Illustrates the patch of network devices that data packets must travel to get from server to remote user’s device and back to
server.
Note: The graphically depicted solution is not included in the required page length.
2. Provide an equipment list of network security devices that would be needed to ensure the integrity and sensitivity of private
information. In this list:
a. Propose at least two (2) vendor brands per each device and the associate costs required to procure these items.
b. Identify the functionality each device serves and the expected benefits the government agency should experience upon the
successful installation of this equipment.
3. Develop a maintenance plan that should be recommended to the government agency to ensure having the latest security measures
available within the network in which you:
a. Describe the risks associated with not fulfilling the activities outlined within your maintenance plan.
b. Indicate specific activities, personnel / resources required, and frequency of execution.
4. Recommend at least four (4) physical security measures that could be developed to ensure the electronic perimeter of electronic
assets.
5. Recommend at least two (2) physical security vendors that could achieve the four (4) security measures you identified. Justify your
recommendations with your response.
6. Evaluate and consider activities that the Human Resources Department could perform in order to complement and instill security
from within the organization. Provide a rationale with your response.
7. Use at least three (3) quality resources in th.
Assignment #1VoIP Part 3 (Quality)Suppose the VoIP project spo.docxfredharris32
Assignment #1
VoIP Part 3 (Quality)
Suppose the VoIP project sponsor wants you to present the project to the board of directors. Particularly, the sponsor would like you to discuss the quality of the project. It is worth noting that during the deployment of the VoIP system the quality control team tracked forty (40) of the deployments. The following problems were documented:
· Five (5) of the deployments experienced delays due to the unique configuration of the office space which required modification to install the proper wiring.
· Twelve (12) of the users called the help desk to get additional training on the new system.
· Two (2) of the new devices were defective.
Prepare a fifteen to twenty (15-20) slide digital presentation with the software of your choice (e.g., PowerPoint, Google slides, Prezi, etc.) in which you:
1. Explain quality and its importance to project success.
2. Explain quality management planning.
3. Contrast quality assurance and quality control.
4. Describe the different quality activities involved in this project and each of their outcomes.
5. Describe Pareto diagrams and their use in project management.
6. Present the data in the provided scenario using a Pareto diagram (Use the software of your choosing to prepare the diagram).
7. Use appropriate key points and / or graphics to professionally convey the information.
8. Include presenter notes to explain each slide.
9. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
· Include the title of the assignment, the student’s name, the professor’s name, the course title, and the date in the presentation.
· Include the references used in the assignment in the presentation.
· Import charts, graphs, and / or the Pareto diagram into the presentation. The completed works must be imported into the presentation.
Points: 80
Assignment 5: VoIP Part 3 (Quality)
Criteria
Unacceptable
Below 70% F
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Explain quality and its importance to project success.
Weight: 10%
Did not submit or incompletelyexplained quality and its importance to project success.
Partially explained quality and its importance to project success.
Satisfactorily explained quality and its importance to project success.
Thoroughly explained quality and its importance to project success.
2. Explain quality management planning.
Weight: 10%
Did not submit or incompletelyexplained quality management planning.
Partially explained quality management planning.
Satisfactorily explained quality management planning.
Thoroughly explained quality management planning.
3. Contrast quality assurance and quality control.
Weight: 10%
Did not submit or incompletelycontrasted quality assurance and quality control.
Partially contrasted quality assurance and quality control.
Satisfactorily contrasted quality assurance and quality control.
Thoro ...
Assignment 4 Special Problems and Challenges and the Future of Poli.docxastonrenna
Assignment 4: Special Problems and Challenges and the Future of Policing In America
Due Week 10 and worth 200 points
STUDENT BOOK
Peak, K. J. (2014).
Policing America
:
Challenges and best practices
(8th ed.). NJ: Pearson
Publishing.
Modern law enforcement operations and strategies are driven by best practices in the areas of data collection and manipulation, addressing special populations, and preventing organized criminal activities. A tremendous amount of specialization has evolved in today's sphere of policing, especially among federal, state, and local agencies. Perhaps, what is most evident is how the law enforcement agencies of the federal government have retooled to meet today's challenge of terrorism. Use your textbook, the Internet, and / or Strayer library to research credible sources on the aforementioned issues as they relate to law enforcement operations and management.
Write a six to eight (6-8) page paper in which you:
Identify and describe the major functions of the four (4) agencies of the Department of Justice. Of the four agencies, provide a rationale for which agency you feel has the greatest responsibility as it relates to federal law enforcement.
Explain the purposes of the Uniform Crime Reports (UCR) and the National Crime Information Center (NCIC). Identify and discuss the various weaknesses related to the accuracy of the Uniform Crime Report (UCR).
Describe the major roles of police executives using the Mintzberg model of chief executive officers. Of the executive roles described in the model, provide a rationale for which role you feel is the most important for a chief executive officer’s success.
Examine two (2) legislative enactments that are in place to help combat terrorism. Provide your opinion on the effectiveness of these enactments in regards to combatting terrorism.
Analyze the problems related to determining the actual numbers of hate crimes and what makes hate crimes different from other crimes.
Use at least four (4) quality references including the textbooks.
Note:
Wikipedia and other Websites do not qualify as academic resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
.
Assignment 5 Integrated Business Communication1 As a future execu.docxastonrenna
Assignment 5: Integrated Business Communication
1 As a future executive,explain what you think are the most important communication issues you will have to face as you embark upon your career.
2 Discuss whether communication will become more complex, or less complex, and why
3. Address what role technology will play in the communication of thoughts and idea.
4 Discuss how the information gap between generations,cultures,imcome levels, and education can be resolved.
5 Include a statement of your personal philosophy on the future of integrated business communication
.
More Related Content
Similar to Assignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docx
JNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docxdonnajames55
JNR NON-PERMANENCE RISK REPORT: VCS Version 3
VCS JNR Non-Permanence Risk Report Template
This report template is for analyzing the non-permanence risk of VCS jurisdictional REDD+ programs. VCS projects, including nested projects, must use the VCS Non-Permanence Risk Report Template.
Instructions for completing the JNR Non-Permanence Risk Report:
TITLE PAGE: All items in the box at the bottom of the title page must be completed using Arial 10pt, black, regular (non-italic) font. This box must appear on the title page of the final document. The JNR non-permanence risk report may also feature the report title and preparer’s name and logo more prominently on the title page, using the format below (Arial 24pt and Arial 11pt, black, regular font).
JNR NON-PERMANENCE RISK REPORT: Instructions for completing the JNR non-permanence risk report can be found under the section headings in this template. All instructions must be followed. Instructions relate back to the rules and requirements set out in the JNR Requirements, VCS Standard and accompanying program documents. As such, this template must be completed in accordance with such documents, and the preparer will need to refer to the VCS program documents and in order to complete the template. It is also expected that relevant guidance is followed. Note that the instructions in this template are intended to serve as a guide and do not necessarily represent an exhaustive list of the information the preparer should provide under each section of the template.
All sections must be completed using Arial 10pt, black, regular (non-italic) font. Where a section is not applicable, same must be stated under the section (the section must not be deleted from the final document).
This document may be included as an annex to the JNR program description or JNR monitoring report, as applicable, or provided as a stand-alone document. Where submitted as an annex, the cover page may be deleted and where submitting as a stand-alone document, the cover page must be completed.
Where a jurisdiction is stratified due to different risk profiles, the whole document must be filled out for each area (either as separate documents, or by repeating all of the steps/tables).
All instructions, including this introductory text, should be deleted from the final document.
JNR NON-PERMANENCE RISK REPORT TITLE
Logo (optional)
Document Prepared By (individual or entity)
Jurisdictional REDD+ Program Title
Name of jurisdictional REDD+ program
Version
Version number of this document
Date of Issue
DD-Month-YYYY this version of the document issued
Program ID
VCS project database ID, if registered
Monitoring Period
DD-Month-YYYY to DD-Month-YYYY
Prepared By
Individual or entity that prepared the document
Contact
Physical address, telephone, email, website
Document and substantiate the risk and/or mitigation for each risk factor applicable to the jurisdictional program. Include any relevant documentary evidence. Where a risk or.
JNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docxvrickens
JNR NON-PERMANENCE RISK REPORT: VCS Version 3
VCS JNR Non-Permanence Risk Report Template
This report template is for analyzing the non-permanence risk of VCS jurisdictional REDD+ programs. VCS projects, including nested projects, must use the VCS Non-Permanence Risk Report Template.
Instructions for completing the JNR Non-Permanence Risk Report:
TITLE PAGE: All items in the box at the bottom of the title page must be completed using Arial 10pt, black, regular (non-italic) font. This box must appear on the title page of the final document. The JNR non-permanence risk report may also feature the report title and preparer’s name and logo more prominently on the title page, using the format below (Arial 24pt and Arial 11pt, black, regular font).
JNR NON-PERMANENCE RISK REPORT: Instructions for completing the JNR non-permanence risk report can be found under the section headings in this template. All instructions must be followed. Instructions relate back to the rules and requirements set out in the JNR Requirements, VCS Standard and accompanying program documents. As such, this template must be completed in accordance with such documents, and the preparer will need to refer to the VCS program documents and in order to complete the template. It is also expected that relevant guidance is followed. Note that the instructions in this template are intended to serve as a guide and do not necessarily represent an exhaustive list of the information the preparer should provide under each section of the template.
All sections must be completed using Arial 10pt, black, regular (non-italic) font. Where a section is not applicable, same must be stated under the section (the section must not be deleted from the final document).
This document may be included as an annex to the JNR program description or JNR monitoring report, as applicable, or provided as a stand-alone document. Where submitted as an annex, the cover page may be deleted and where submitting as a stand-alone document, the cover page must be completed.
Where a jurisdiction is stratified due to different risk profiles, the whole document must be filled out for each area (either as separate documents, or by repeating all of the steps/tables).
All instructions, including this introductory text, should be deleted from the final document.
JNR NON-PERMANENCE RISK REPORT TITLE
Logo (optional)
Document Prepared By (individual or entity)
Jurisdictional REDD+ Program Title
Name of jurisdictional REDD+ program
Version
Version number of this document
Date of Issue
DD-Month-YYYY this version of the document issued
Program ID
VCS project database ID, if registered
Monitoring Period
DD-Month-YYYY to DD-Month-YYYY
Prepared By
Individual or entity that prepared the document
Contact
Physical address, telephone, email, website
Document and substantiate the risk and/or mitigation for each risk factor applicable to the jurisdictional program. Include any relevant documentary evidence. Where a risk or ...
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docxstarkeykellye
G
Assignment 4: Designing Compliance within the LAN-to-WAN Domain
Due Week 8 and worth 100 points
Note:
Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized formatting requirements, do NOT count toward the overall page length.
Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas:
Protecting data privacy across the WAN
Filtering undesirable network traffic from the Internet
Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web
Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources
Having an area designed to trap attackers in order to monitor attacker activities
Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity
Hiding internal IP addresses
Allowing operating system and application patch management
The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to-WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations.
Write a three to five page paper in which you:
Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will:
filter undesirable network traffic from the Internet
filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web
allow for a zone for anonymous users but aggressively controls information exchange with internal resources
allow for an area designed to trap attackers in order to monitor attacker activities
offer a means to monitor network traffic in real time as a means to identify and block unusual activity
hide internal IP addresses
Identify the fundamentals of public key infrastructure (PKI).
Describe the manner in which your solution will protect the privacy of data transmitted across the WAN.
Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective.
Use at least three quality resources in this assignment.
Note:
Wikipedia and similar Websites do not qualify as quality resources.
Note:
The graphically depicted solution is not included in the required page length.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Ch ...
Assignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docxssuser562afc1
Assignment 4: VoIP Part 4 (Risk Register)
Utilizing the Delphi technique, your team constructed the following risks register the VoIP project containing the risk, the likelihood of its occurrence on a scale of 1 (least likely) to 5 (most likely), and the potential negative impact on the project on the same scale. In addition, they recommended the appropriate response and identified its type for one of the risks identified.
#
Risk
Likelihood (1-5)
Impact
(1-5)
Response Type
Response
1
Project Delayed due to lack of resources
3
5
2
Project runs out of funds before completion
1
5
3
Users reject new system
2
2
4
Defective Hardware
1
5
5
New government regulations introduced during deployment increase the cost of running VoIP
2
3
6
Yearly renewal fee issued on the legacy system due to delay of over 30 days in deployment of the new system
1
4
Mitigation
Schedule check 30 days before project deadline to determine if action needs to be taken to avoid delay. Decision tree will be utilized.
Write a three to five (3-5) page paper in which you:
1. Explain risk management and its associated activities and defend the need for a risk management plan.
2. Describe the Delphi technique used to identify risks and infer on types of projects where this technique is most accurate.
3. Examine the four (4) types of risk response (i.e., avoidance, acceptance, transference, and mitigation) and determine the appropriate situation where each should be used.
4. Complete the table with the risk response type (i.e., avoidance, acceptance, transference, and mitigation) and a description of the response.
5. Create a decision tree with the software of your choice to address risk number 6. Assume that when you check the schedule on day 60 of the project, it becomes evident that two (2) additional engineers are needed to ensure on-time completion of the project. The engineers cost $25,000 each and a fee of $120,000 is issued by the legacy provider. The probability of completing the project on time is as follows: With the current personnel – 60%; With one (1) engineer – 80%; With both engineers – 98%.
6. Explain the methodology utilized to create a decision tree and recommend the appropriate action to take based on your decision tree from criterion 5.
7. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
· Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
· Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
· Include the decision tree created in your chosen software. The complete ...
Disaster Recovery PlanThis assignment consists of two (2) part.docxduketjoy27252
Disaster Recovery Plan
This assignment consists of two (2) parts: a written paper and a PowerPoint presentation. You must submit both parts as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
In recent years, organizations have witnessed the impact of having effective and non-effective business continuity plans and disaster recovery plans. In today’s environment, with significant potential natural disasters, terrorist threats, and other man-made threats, it is critical that organizations develop effective business continuity plans and disaster recovery plans. Select an organization that you are familiar with, such as where you currently or previously have worked, contact a local organization, or search on the Internet for the needed detail of an organization you are interested in. Prepare a disaster recovery plan policy for that organization.
Part 1: Written Paper1.
1. Write a six pages paper in which you:
a. Provide an overview of the organization that will be delivered to senior management, defining the business goals and objectives and the size, layout, and structure of the organization.
b. Include a diagram of the organization’s network architecture and the proposed network architecture of an alternate computing facility in the event of a disaster (or the actual network architecture of the alternate computing facility if one already exists) through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
c. Develop the DRP Policy, including:
i. Disaster declaration
ii. Assessment of security
iii. Potential disaster scenarios and methods of dealing with the disaster
iv. Disaster recovery procedures
d. Develop an Incident Response Team (IRT) charter, which includes the following sections:
i. Executive summary
ii. Mission statement
iii. Incident declaration
iv. Organizational structure
v. Roles and responsibilities
vi. Information flow and methods of communication
vii. Methods and services provided by the IRT
viii. Authority and reporting procedures
Your assignment must follow these formatting requirements:
· Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
· Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
· Include charts or diagrams created in MS Visio or Dia as an appendix of the infrastructure document. All references to these diagrams must be included in .
Project Risk Management - Week 2: Individual Assignment
Overview and Rationale
In order to demonstrate proficiency with the content in this course we will complete a number of different assignments to validate your learning – and allow you to implement relevant practices a real-world setting.
Program Level - Student Learning Outcomes:
Create a risk management plan to determine how both positive and negative risks will be identified, analyzed and managedArticulate the value and benefits of creating an effective approach to planning for project risk managementIdentify project related risks and their drivers by integrating best practices, tools and techniques
Analyze risks using qualitative methods for the purpose of risk exposure and prioritization and communicate their impact to the stakeholdersAnalyze risks using quantitative methods for the purpose of risk exposure and prioritization and communicate their impact to the stakeholdersRecommend risks for risk response planning or watch listDevise a risk response plan based on appropriate techniques and strategies that would meetStakeholders’ expectationsExecute the risk management plan to continuously monitor risks and risk responsesDescribe how organizational and cultural factors may undermine implementation of effective risk management and develop strategies to overcome these factors
Week 2 Learning Objectives
Integrate best practices, tools and techniques to identify project related risks
Perform Stakeholders analysis to identify stakeholders to include in Risk Identification (and how)
Identify Risk identification tools &techniques
Craftqualityriskstatementsthatclarifyriskdrivers,eventsandimpacts
CreateariskregisterthatalignstoRiskManagementPlanandstakeholderneeds
Explain the process of using-Delphi technique, brainstorming, nominal group, affinity diagramming (group creativity) to identify risks
The next step in risk management is identifying the risks that may impact the progress or success of your project. For this assignment, you will begin to populate the risk register and identify the risks that may occur in the project. For this assignment you will complete and submit:
RiskRegisterthatincludesacomprehensivelistofidentifiedrisks.
A minimum (“meets requirements”) of 15 risks should beidentified
Toensuretheriskidentificationincludesthebreadthanddepthnecessaryforsuccess,besuretoincludeatleast2risksfrom:
1 project-level/ businessrisks
2risksperphaseoftheproject(so,iftheprojecthas5phases,thiswouldbetwoperphaseor10risks)
1 project-specific resourcerisks
1 schedule risks (criticalpath)
1 project-specific costrisks
2 implementationrisks
2opportunities
Risk statements must be written in the cause-condition-conclusion format. Additionally, you should identify the risk owner and the trigger event for eachrisk.
For this assignment, do not work to analyze or determine handling actions for the risks – this assignment is to identify the risks only- later weeks will analyze and plan for how to ...
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docxastonrenna
Assignment 4: Designing Compliance within the LAN-to-WAN Domain
Note:
Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized formatting requirements, do NOT count toward the overall page length.
Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas:
Protecting data privacy across the WAN
Filtering undesirable network traffic from the Internet
Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web
Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources
Having an area designed to trap attackers in order to monitor attacker activities
Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity
Hiding internal IP addresses
Allowing operating system and application patch management
The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to-WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations.
Write a three to five (3-5) page paper in which you:
Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will:
filter undesirable network traffic from the Internet
filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web
allow for a zone for anonymous users but aggressively controls information exchange with internal resources
allow for an area designed to trap attackers in order to monitor attacker activities
offer a means to monitor network traffic in real time as a means to identify and block unusual activity
hide internal IP addresses
Identify the fundamentals of public key infrastructure (PKI).
Describe the manner in which your solution will protect the privacy of data transmitted across the WAN.
Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective.
Use at least three (3) quality resources in this assignment.
Note:
Wikipedia and similar Websites do not qualify as quality resources.
Note:
The graphically depicted solution is not included in the required page length.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor.
Points 160Technical Paper Risk AssessmentCriteriaUna.docxLeilaniPoolsy
Points: 160
Technical Paper: Risk Assessment
Criteria
Unacceptable
Below 70% F
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Describe the company network, interconnection, and communication environment.
Weight: 15%
Did not submit or incompletely described the company network, interconnection, and communication environment.
Partially described the company network, interconnection, and communication environment.
Satisfactorily described the company network, interconnection, and communication environment.
Thoroughly described the company network, interconnection, and communication environment.
2a. Defend your assumptions where pertinent information from the scenario isn’t available.
Weight: 5%
Did not submit or incompletely defended your assumptions where pertinent information from the scenario isn’t available.
Partially defended your assumptions where pertinent information from the scenario isn’t available.
Satisfactorily defended your assumptions where pertinent information from the scenario isn’t available.
Thoroughly defended your assumptions where pertinent information from the scenario isn’t available.
2b. Ascertain apparent security vulnerabilities, and analyze at least three (3) such vulnerabilities. Such analysis should entertain the possibility of faulty network design. Recommend mitigation processes and procedures for each of the identified vulnerabilities.
Weight: 5%
Did not submit or incompletely ascertained apparent security vulnerabilities; did not submit or incompletely analyzed at least three (3) such vulnerabilities. Did not submit or incompletely entertained the possibility of faulty network design. Did not submit or incompletely recommended mitigation processes and procedures for each of the identified vulnerabilities.
Partially ascertained apparent security vulnerabilities; partially analyzed at least three (3) such vulnerabilities. Partially entertained the possibility of faulty network design. Partially recommended mitigation processes and procedures for each of the identified vulnerabilities.
Satisfactorily ascertained apparent security vulnerabilities; satisfactorily analyzed at least three (3) such vulnerabilities Satisfactorily entertained the possibility of faulty network design. Satisfactorily recommended mitigation processes and procedures for each of the identified vulnerabilities.
Thoroughly ascertained apparent security vulnerabilities; thoroughly analyzed at least three (3) such vulnerabilities. Thoroughly entertained the possibility of faulty network design. Thoroughly recommended mitigation processes and procedures for each of the identified vulnerabilities.
2c. Justify your cryptography recommendations, based on security concerns and requirements, data-driven decision-making, and objective opinions.
Weight: 5%
Did not submit or incompletely justified your cryptography recommendations, based on security concerns and requirements, data-driven decision making, and objecti.
Running head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docxrtodd599
Running head: VOIP WORK BREAKDOWN STRUCTURE
1
VOIP WORK BREAKDOWN STRUCTURE
4
Student Name
Professor
University Name
Class Name
Week 5VoIP Part 1 Work Breakdown Structure
08/12/2018
Project Requirements and Assumptions for the new VoIP Phone System
Budget
The budget for the deployment of the new VoIP phone system is estimated to be $25,000. The budget covers all the equipment required, the installation operations as well as commercial software and licensing needed in operating and maintaining the VoIP system.
Human Resources/project team
The project team would include and not limited to the organization’s CEO, Chief Information Officer, the IT manager/Administrator, the Network Engineer and the Chief Financial Officer. The team will ensure the implementation of the system within the allocated budget and time.
Workload
The workload for the project includes all the hardware utilized in the deployment, installation and maintenance of the VoIP systems in the organization.
Dependencies
The components of the VoIP phone system comprise of servers, and phones whose implementation would require completion of some tasks as well as depend on initiation of other associated activities.
A work breakdown structure forms a major project deliverable that put in order the project team's work into subtasks. By so doing the work breakdown structure describes the scope into tasks that a project team can fully understand. At each level of the WBS further task description and details are provided. It begins with the project at the top as the main deliverable followed by further decomposition into sub-deliverables utilizing an outline hierarchy. Such sub-deliverables are further decomposed in a manner that a single individual is assigned where the particular work packages needed to create the sub- deliverable are determined and clustered together (Norman, Brotherton, & Fried, 2011). The work package embodies the list of tasks in creating a given distinct unit of work. The work packages are defined on the WBS and assigned a budget and thus easy to track financial progress of the project as well as performance.
References
Collins, D., & Swale, R. (2014). Carrier-grade VoIP. New York: McGraw-Hill Education
Norman, E. S., Brotherton, S. A., & Fried, R. T. (2011). Work Breakdown Structures: The Foundation for Project Management Excellence. Chichester: Wiley.
Week 9 Assignment 6 - Submit Here
Using the Delphi technique, your team constructed the following risks register for the VoIP project containing the risk, the likelihood of its occurrence on a scale of 1 (least likely) to 5 (most likely), and the potential negative impact on the project on the same scale. In addition, they recommended the appropriate response and identified its type for one of the risks identified.
#
Risk
Likelihood (1-5)
Impact (1-5)
Response Type
Response
1
Project Delay due to lack of resources
3
5
2
Project .
Econ 421Subsidies Problem SetSpring 20151. Suppose low-in.docxjack60216
Econ 421
Subsidies: Problem Set
Spring 2015
1. Suppose low-income people are given vouchers worth 200 dollars per month that they can use only to pay rent on housing.
a. Use indifference curve analysis to show how the person could be made as well off with a 200 dollar case transfer.
b. Would the consumer's choice of the amount of housing to rent be any different if he receives cash instead of housing vouchers?
c. Use indifference curve analysis to show under what circumstance the 200 dollar per month housing voucher would cause the recipient to increase the amount of housing rented compared to what would be rented if the recipient received 200 dollars in cash each month in lieu of the housing vouchers.
d. Would this recipient be as well off under the housing voucher scheme as he would be with a cash transfer of equal value?
2. A needy family consisting of a mother and three children currently receives cash benefits that average 12 dollars per day. The mother of this family is allowed to earn an average of 4 dollars per day before her benefits begin to decline. After that, for each dollar earned cash benefits decline by 67 cents.
a. Plot the recipients money income-leisure tradeoff (budget) line under these circumstances.
b. Assume that she can find work at 4 dollars per hour. How many hours will she have to work per day before her benefits are eliminated?
c. Assuming that her indifference curves for work and leisure are convex, show her equilibrium allocation of time between work and leisure per day. Show that it is possible to have more than one most preferred outcome.
3. Go to http://www.irs.gov to obtain the tables for the earned income tax credit (EITC) for the current year.
a. Explain how the program increases earnings for low-income workers and affects their incentives.
b. Draw a curve for single workers filing jointly, and single parents show how the EITC will vary with earnings.
c. Why does the EITC encourage low-income workers to work? Use indifference curve analysis to show the income and substitution effects results from the EITC up to the point at which the maximum credit level of earnings is reached.
4. Explain why the negative income tax plan is likely to be more expensive than the currnet system of assistance to the poor. What are the advantages of wage rate subsidies?
CDS344 & CIS344 FINAL
Chapter 6
1. What name is given to a method of developing software that is based on small project iterations, or sprints, instead of long project schedules?
A. baseline
B. waterfall model
C. agile development
D. sprint
2. What is meant by authorizing official (AO)?
A. An individual to enact changes in response to reported problems.
B. The process of managing changes to computer/device configuration or application software.
C. A senior manager who reviews a certification report and makes the decision to approve the system for implementation.
D. A mandated requirement for a hardware or software solution that is used t ...
Read Chapters 5, 6, and 7 in our textbook. After reviewing this week.docxleonorepour284
Read Chapters 5, 6, and 7 in our textbook. After reviewing this week’s required reading, consider the following scenario: You are the lead of the risk management team that has been assigned to evaluate an incident that has occurred. You will be preparing a report for the CEO of the hospital that includes all system failures that contributed to the adverse event as well as utilizing a CQI tool (pareto, fishbone, flowchart). You will be using the
Adverse Event template
document to complete the three parts to the assignment. Note: If you have responded substantively to each of the content items within the three parts of the assignment, the paper should be between six and seven pages.
Part One: Description of Adverse Event
(Complete Part One of the
Adverse Event template
)
Choose an adverse event from the following list:
Medication error
Patient falls
Post-operative hemorrhage
The number of Discharges indicates the total number of patients who have been admitted and discharged in the hospital
Using the data listed below for your selected adverse event only, analyze and describe what the data is telling you. Make sure to include the graph in your template document.
Data -
Patient Safety Event for XYZ Hospital for the year 20XX through 20YY
# of Discharges
# of Surgical Cases
# of Medication Errors
# of Patient Falls
# of Post Operative Hemorrhage
20XX
20YY
20XX
20YY
20XX
20YY
20XX
20YY
20XX
20YY
Jan
1200
1400
200
240
300
350
38
35
1
3
Feb
1278
1450
213
250
289
370
42
40
1
2
Mar
1389
1540
250
300
300
385
37
45
3
2
Apr
1199
1800
200
245
289
412
36
65
2
3
May
900
1768
159
289
215
404
40
70
1
3
Jun
1000
1690
173
285
215
398
46
65
1
2
Jul
1200
1100
215
200
278
246
50
45
2
1
Aug
1239
978
240
158
301
241
53
40
2
3
Sep
1000
1089
198
200
275
215
48
51
3
2
Oct
789
978
150
248
241
251
38
52
2
1
Nov
980
1000
175
209
230
231
42
47
2
1
Dec
700
980
145
215
200
235
25
43
3
1
Note
: The number of beds and operating rooms increased effective 1/1/20YY.
List the advent chosen and include background such as prevalence of the incident.
Describe the adverse event in detail. You can make-up the scenario on the event topic chosen from the list or you can research an actual story on one of the events and utilize it for this assignment.
List who was involved in the event and their role in the event.
List the stakeholders on your CQI team. Discuss the differences among the stakeholders that might cause issues when working as a CQI team. Include barriers to their communicating effectively as a team and the communication techniques/methods utilized to inform the organization's staff of the adverse event improvement plan.
Describe at least two operational or safety processes that might not have been followed that contributed or caused this event to take place. For instance, describe any regulations or proc.
Points 200 Term Paper The Rookie Chief Information Security .docxLeilaniPoolsy
Points: 200 Term Paper: The Rookie Chief Information Security Officer
Criteria
Unacceptable
Below 60% F
Meets
Minimum
Expectations
60-69% D
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
Part 1: Organization Chart
1ai. Use Visio or an
Open Source
alternative, such as
Dia, to create an
organization chart in
which you illustrate
the roles that will be
required to ensure
design, evaluation,
implementation, and
management of
security programs for
the organization.
Weight: 5%
Did not submit or
incompletely
used Visio or an
Open Source
alternative, such
as Dia, to create
an organization
chart in which
you illustrated the
roles that will be
required to
ensure design,
evaluation,
implementation,
and management
of security
programs for the
organization.
Insufficiently
used Visio or
an Open
Source
alternative,
such as Dia, to
create an
organization
chart in which
you illustrated
the roles that
will be required
to ensure
design,
evaluation,
implementation,
and
management of
security
programs for
the
organization.
Partially used
Visio or an
Open Source
alternative,
such as Dia, to
create an
organization
chart in which
you illustrated
the roles that
will be required
to ensure
design,
evaluation,
implementation,
and
management of
security
programs for
the
organization.
Satisfactorily
used Visio or
an Open
Source
alternative,
such as Dia, to
create an
organization
chart in which
you illustrated
the roles that
will be required
to ensure
design,
evaluation,
implementation,
and
management of
security
programs for
the
organization.
Thoroughly
used Visio or
an Open
Source
alternative,
such as Dia, to
create an
organization
chart in which
you illustrated
the roles that
will be required
to ensure
design,
evaluation,
implementation,
and
management of
security
programs for
the
organization.
1aii. Use Visio or an
Open Source
alternative, such as
Dia, to create an
organization chart in
which you clearly
identify the reporting
structure for roles
such as IT Security
Compliance Officer,
Security Manager,
CIO, CISO, IT
Security Engineer,
Privacy Security
Professional, and IT
Procurement
Specialist.
Weight: 5%
Did not submit or
incompletely
used Visio or an
Open Source
alternative, such
as Dia, to create
an organization
chart in which
you clearly
identified the
reporting
structure for roles
such as IT
Security
Compliance
Officer, Security
Manager, CIO,
CISO, IT Security
Engineer, Privacy
Security
Professional, and
IT Procurement
Specialist.
Insufficiently
used Visio or
an Open
Source
alternative,
such as Dia, to
create an
organization
chart in which
you clearly
identified the
reporting
structure for
roles such as IT
Security
Compliance
Officer,
Security
Manager, CIO,
CISO, IT
Security
Engineer,
Privacy
Security
Professional,
and IT
Procureme.
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxcarlibradley31429
Assignment 1: Designing Compliance within the LAN-to-WAN Domain
Note: Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized formatting requirements, do NOT count toward the overall page length.
Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas:
· Protecting data privacy across the WAN
· Filtering undesirable network traffic from the Internet
· Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web
· Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources
· Having an area designed to trap attackers in order to monitor attacker activities
· Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity
· Hiding internal IP addresses
· Allowing operating system and application patch management
The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to-WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations.
Write a three to five page paper in which you:
1. Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will:
a. filter undesirable network traffic from the Internet
b. filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web
c. allow for a zone for anonymous users but aggressively controls information exchange with internal resources
d. allow for an area designed to trap attackers in order to monitor attacker activities
e. offer a means to monitor network traffic in real time as a means to identify and block unusual activity
f. hide internal IP addresses
2. Identify the fundamentals of public key infrastructure (PKI).
3. Describe the manner in which your solution will protect the privacy of data transmitted across the WAN.
4. Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective.
5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Note: The graphically depicted solution is not included in the required page length.
Your assignment must follow these formatting requirements:
· This course requires use of Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review t.
Assignment 5Hi Prof. Dan,This assignment is just a continuat.docxssuser562afc1
Assignment 5
Hi Prof. Dan,
This assignment is just a continuation of assignment 3 & 4 that you completed for me on Repeat Offenders and the solutions that I am incorporating which are education, treatment, and guaranteed job placement. I also thought about incorporating an alternative sentencing home which could be an alternative to prison while the offender completes the three phases. This assignment focuses on the financial aspect of the project and is a power point. If you do not have copies of the past assignments you’ve done and need to see them let me know. Thank you so much for your help.
As the Finance Director of the local police department, you are requested to prepare a presentation for the funding of your solution during the annual budget hearing of the city council. It is important that you include all costs associated with the solution as the city council does not provide additional funding if the actual cost would exceed the proposed cost. If additional costs would arise, it could result in the failure of the solution. Estimate the costs associated with the implementation of your proposed solution and focus on the following:
· Provide a cost estimate for the solution. Use a table or spreadsheet format to display your numerical estimates.
· Identify factors that could increase the estimated costs.
· Present examples why your proposal is cost effective.
· Research state and federal sources of funding for your solution.
Incorporate appropriate animations, photos, tables, spread sheets and graphics for each slide.
Support your presentation with at least three (3) scholarly resources. In addition to these specified resources, other appropriate scholarly resources may be included.
Length: 12-15 slides (with a separate reference slide), plus chart or Excel spreadsheet
Notes Length: 100-150 words for each slide
Adverse Event Reporting
Read Chapters 5, 6, and 7 in our textbook. After reviewing this week’s required reading, consider the following scenario: You are the lead of the risk management team that has been assigned to evaluate an incident that has occurred. You will be preparing a report for the CEO of the hospital that includes all system failures that contributed to the adverse event as well as utilizing a CQI tool. You will be using the Adverse Event template to complete the three parts to the assignment. Note: If you have responded substantively to each of the content items within the three parts of the assignment, the paper should be between six and seven pages.
Part One: Description of Adverse Event (Complete Part One of the Adverse Event template)
· Choose an adverse event from the following list:
· Medication error
· Patient falls
· Post-operative hemorrhage
· Data - Patient Safety Event For XYZ Hospital for 20XX through 20YY
# of Discharges
# of Surgical Cases
# of Medication Errors
# of Patient Falls
# of Post Operative Hemorrhage
20XX
20YY
20XX
20YY
20XX
20YY
20XX
20YY
20XX
20YY
Jan ...
Maximo Oil and Gas 7.6.1 HSE: Incident Management overviewHelen Fisher
The Incidents application has a full service capability for use by supervisory personnel and HSE professionals. Create Incident and View Incident can be used by less frequent users who want to simply enter an incident. The Incident Reporter supports a disconnected mobile environment with a simple user interface to report any type of incident using a mobile device. Ticket Template supports the creation of Incident templates.
publicsynchronizedclass RandomSeq {
private String id;
private String seq;
public void RandomSeq();
public void RandomSeq(String, String);
public void setSeqID(String);
public void setSeq(String);
public String getSeqID();
public String getSeq();
public String getRandomSeq(long);
public void formatSeq(int);
}
Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing
skills, using the following rubric.
Points: 80 Assignment 6: VoIP Part 4 (Risk Register)
Criteria
Unacceptable
Below 70% F
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Explain risk
management and its
associated activities
and defend the need
for a risk management
plan.
Weight: 10%
Did not submit or
incompletely
explained risk
management and its
associated activities
and did not submit
or incompletely
defended the need
for a risk
management plan.
Partially explained
risk management
and its associated
activities and
partially defended
the need for a risk
management plan.
Satisfactorily
explained risk
management and
its associated
activities and
satisfactorily
defended the need
for a risk
management plan.
Thoroughly
explained risk
management and
its associated
activities and
thoroughly
defended the need
for a risk
management plan.
2. Describe the Delphi
technique used to
identify risks and infer
on types of projects
where this technique is
most accurate.
Weight: 10%
Did not submit or
incompletely
described the Delphi
technique used to
identify risks and did
not submit or
incompletely inferred
on types of projects
where this technique
is most accurate.
Partially described
the Delphi
technique used to
identify risks and
partially inferred on
types of projects
where this
technique is most
accurate.
Satisfactorily
described the
Delphi technique
used to identify
risks and
satisfactorily
inferred on types of
projects where this
technique is most
accurate.
Thoroughly
described the
Delphi technique
used to identify
risks and thoroughly
inferred on types of
projects where this
technique is most
accurate.
3. Examine the four (4)
types of risk response
(i.e., avoidance,
acceptance,
transference, and
mitigation) and
determine the
appropriate situation
where each should be
used.
Weight: 10%
Did not submit or
incompletely
examined the four
(4) types of risk
response and did
not submit or
incompletely
determined the
appropriate situation
where each should
be used.
Partially examined
the four (4) types of
risk response and
partially determined
the appropriate
situation where
each should be
used.
Satisfactorily
examined the four
(4) types of risk
response and
satisfactorily
determined the
appropriate
situation where
each should be
used.
Thoroughly
examined the four
(4) types of risk
response and
thoroughly
determined the
appropriate
situation where
each should be
used.
4. Complete the table
with the risk response
type (i.e., avoidance,
acceptance,
transfer ...
The security consulting firm that you work for has been awarded a co.docxjoshua2345678
The security consulting firm that you work for has been awarded a contract to implement a new IT Security Infrastructure to secure the Information Technology data assets of a local government agency. This agency has many remote workers that are in the field and need to connect back to the agency’s system servers. The remote workers use a wireless network infrastructure to connect their electronic pads to servers located within the local government’s facility. The remote workers have needs to access property records, cite zoning violations electronically, and validate building permits. The public demand to expand IT services has grown faster than its ability to provide an adequately secured infrastructure. In fact, this government entity was previously featured on the news for having minimal security controls and methods for accessing property tax information of citizens. The inadequate security allowed many construction trade businesses to illegally access property records and zoning violations. Your role in this project is to enhance and optimize the security mechanisms for accessing these systems.
Write a four to five (4-5) page paper in which you:
1. Create an information flow diagram, using Visio or Dia, which:
a. Illustrates how remote users will securely connect to the government agency’s network.
b. Illustrates the patch of network devices that data packets must travel to get from server to remote user’s device and back to
server.
Note: The graphically depicted solution is not included in the required page length.
2. Provide an equipment list of network security devices that would be needed to ensure the integrity and sensitivity of private
information. In this list:
a. Propose at least two (2) vendor brands per each device and the associate costs required to procure these items.
b. Identify the functionality each device serves and the expected benefits the government agency should experience upon the
successful installation of this equipment.
3. Develop a maintenance plan that should be recommended to the government agency to ensure having the latest security measures
available within the network in which you:
a. Describe the risks associated with not fulfilling the activities outlined within your maintenance plan.
b. Indicate specific activities, personnel / resources required, and frequency of execution.
4. Recommend at least four (4) physical security measures that could be developed to ensure the electronic perimeter of electronic
assets.
5. Recommend at least two (2) physical security vendors that could achieve the four (4) security measures you identified. Justify your
recommendations with your response.
6. Evaluate and consider activities that the Human Resources Department could perform in order to complement and instill security
from within the organization. Provide a rationale with your response.
7. Use at least three (3) quality resources in th.
Assignment #1VoIP Part 3 (Quality)Suppose the VoIP project spo.docxfredharris32
Assignment #1
VoIP Part 3 (Quality)
Suppose the VoIP project sponsor wants you to present the project to the board of directors. Particularly, the sponsor would like you to discuss the quality of the project. It is worth noting that during the deployment of the VoIP system the quality control team tracked forty (40) of the deployments. The following problems were documented:
· Five (5) of the deployments experienced delays due to the unique configuration of the office space which required modification to install the proper wiring.
· Twelve (12) of the users called the help desk to get additional training on the new system.
· Two (2) of the new devices were defective.
Prepare a fifteen to twenty (15-20) slide digital presentation with the software of your choice (e.g., PowerPoint, Google slides, Prezi, etc.) in which you:
1. Explain quality and its importance to project success.
2. Explain quality management planning.
3. Contrast quality assurance and quality control.
4. Describe the different quality activities involved in this project and each of their outcomes.
5. Describe Pareto diagrams and their use in project management.
6. Present the data in the provided scenario using a Pareto diagram (Use the software of your choosing to prepare the diagram).
7. Use appropriate key points and / or graphics to professionally convey the information.
8. Include presenter notes to explain each slide.
9. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
· Include the title of the assignment, the student’s name, the professor’s name, the course title, and the date in the presentation.
· Include the references used in the assignment in the presentation.
· Import charts, graphs, and / or the Pareto diagram into the presentation. The completed works must be imported into the presentation.
Points: 80
Assignment 5: VoIP Part 3 (Quality)
Criteria
Unacceptable
Below 70% F
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Explain quality and its importance to project success.
Weight: 10%
Did not submit or incompletelyexplained quality and its importance to project success.
Partially explained quality and its importance to project success.
Satisfactorily explained quality and its importance to project success.
Thoroughly explained quality and its importance to project success.
2. Explain quality management planning.
Weight: 10%
Did not submit or incompletelyexplained quality management planning.
Partially explained quality management planning.
Satisfactorily explained quality management planning.
Thoroughly explained quality management planning.
3. Contrast quality assurance and quality control.
Weight: 10%
Did not submit or incompletelycontrasted quality assurance and quality control.
Partially contrasted quality assurance and quality control.
Satisfactorily contrasted quality assurance and quality control.
Thoro ...
Similar to Assignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docx (20)
Assignment 4 Special Problems and Challenges and the Future of Poli.docxastonrenna
Assignment 4: Special Problems and Challenges and the Future of Policing In America
Due Week 10 and worth 200 points
STUDENT BOOK
Peak, K. J. (2014).
Policing America
:
Challenges and best practices
(8th ed.). NJ: Pearson
Publishing.
Modern law enforcement operations and strategies are driven by best practices in the areas of data collection and manipulation, addressing special populations, and preventing organized criminal activities. A tremendous amount of specialization has evolved in today's sphere of policing, especially among federal, state, and local agencies. Perhaps, what is most evident is how the law enforcement agencies of the federal government have retooled to meet today's challenge of terrorism. Use your textbook, the Internet, and / or Strayer library to research credible sources on the aforementioned issues as they relate to law enforcement operations and management.
Write a six to eight (6-8) page paper in which you:
Identify and describe the major functions of the four (4) agencies of the Department of Justice. Of the four agencies, provide a rationale for which agency you feel has the greatest responsibility as it relates to federal law enforcement.
Explain the purposes of the Uniform Crime Reports (UCR) and the National Crime Information Center (NCIC). Identify and discuss the various weaknesses related to the accuracy of the Uniform Crime Report (UCR).
Describe the major roles of police executives using the Mintzberg model of chief executive officers. Of the executive roles described in the model, provide a rationale for which role you feel is the most important for a chief executive officer’s success.
Examine two (2) legislative enactments that are in place to help combat terrorism. Provide your opinion on the effectiveness of these enactments in regards to combatting terrorism.
Analyze the problems related to determining the actual numbers of hate crimes and what makes hate crimes different from other crimes.
Use at least four (4) quality references including the textbooks.
Note:
Wikipedia and other Websites do not qualify as academic resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
.
Assignment 5 Integrated Business Communication1 As a future execu.docxastonrenna
Assignment 5: Integrated Business Communication
1 As a future executive,explain what you think are the most important communication issues you will have to face as you embark upon your career.
2 Discuss whether communication will become more complex, or less complex, and why
3. Address what role technology will play in the communication of thoughts and idea.
4 Discuss how the information gap between generations,cultures,imcome levels, and education can be resolved.
5 Include a statement of your personal philosophy on the future of integrated business communication
.
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docxastonrenna
Assignment 4: The Future of Digital Crimes and Digital Terrorism
Due Week 10 and worth 250 points
In the United States, a number of law enforcement agencies, including the Secret Service, the Federal Bureau of Investigation (FBI), and the Department of Homeland Security among others have taken on roles to fight computer crimes and terrorism.
Use the Internet or Strayer library to research articles on the efforts of law enforcement agencies to combat digital crimes and digital terrorism, as well as the roles of such agencies in the future of the combat in question.
Write a four to five (4-5) page paper in which you:
Describe the overall impact (e.g., economic, social, etc.) of utilizing information technologies in combatting digital crime and digital terrorism.
Explain the existing challenges that result from the independent nature of the law enforcement agencies within the U.S. with regards to computer crimes and terrorism. Next, propose one (1) strategy that the U.S. could use in order to mitigate the challenges in question.
Explain the fundamental manner in which the U.S. could align the efforts of federal agencies in order to better protect the nation against digital crimes and terrorism.
Give your opinion of the key future trends in digital crime and digital terrorism. Next, provide one (1) overall strategy that the U.S. could use in order to combat digital crime and digital terrorism.
Use at least four (4) quality references for this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format.
Assignment 4: The Future of Digital Crimes and Digital Terrorism
Criteria
Unacceptable
Below 60% F
Meets Minimum Expectations
60-69% D
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Describe the overall impact (e.g., economic, social, etc.) of utilizing information technologies in combatting digital crime and digital terrorism.
Weight: 20%
Did not submit or incompletely described the overall impact (e.g., economic, social, etc.) of utilizing information technologies in combatting digital crime and digital terrorism.
Insufficiently
described the overall impact (e.g., economic, social, etc.) of utilizing information technologies in combatting digital crime and digital terrorism.
Partially described the overall impact (e.g., economic, social, etc.) of utilizing information technologies in combatting digital crime and digital terrorism.
Satisfactorily
described the overall impact (e.g., economic, social, etc.) of utilizing information technologies in combatting digital crime and digital terrorism.
Thoroughly
described the overall impact (e.g., economic, social, etc.) of utilizing information technologies in combatting digital crime and digital terrorism.
2. Explain the existing challenges that result from the independent nature of the law enforce.
Assignment 4: Network Design Executive PowerPoint Presentation
In this assignment you are to submit the Network Design Executive PowerPoint Presentation for the term paper.
This is a persuasive Executive PowerPoint presentation of up to 15 slides that you will present to the Executive Committee of Fiction Corporation.
The PowerPoint must include the following in accordance with of the text:
1. Title page
2. Executive summary
3. Project goal
4. Project scope
5. Design requirements:
a. Business goals
b. Technical goals
c. User communities and data stores
d. Network applications
6. Current state of the network
7. Logical design
8. Physical design
9. Results of network design testing
10. Implementation plan with a project schedule
11. Project budget with a return on investment calculation
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as OpenOffice, Dia, and Open Project. The completed diagrams / charts must be imported into the Word document before the paper is submitted.
The specific course learning outcomes associated with this assignment are:
Develop a comprehensive network design document.
Use technology and information resources to research issues in network architecture and analysis.
Write clearly and concisely about network architecture and analysis using proper writing mechanics and technical style conventions.
Points: 100
Assignment 4:
Network Design Executive PowerPoint Presentation
Criteria
Unacceptable
Below 70% F
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Create a persuasive Executive PowerPoint presentation that includes title page.
Weight: 5%
Did not submit or incompletely created a persuasive Executive PowerPoint presentation that includes title page.
Partially created a persuasive Executive PowerPoint presentation that includes title page.
Satisfactorily created a persuasive Executive PowerPoint presentation that includes title page.
Thoroughly created a persuasive Executive PowerPoint presentation that includes title page.
2. Create a persuasive Executive PowerPoint presentation that includes executive summary.
Weight: 5%
Did not submit or incompletely created a persuasive Executive PowerPoint presentation that includes executive summary.
Partially created a persuasive Executive PowerPoint presentation that includes executive summary.
Satisfactorily created a persuasive Executive PowerPoint presentation that includes executive summary.
Thoroughly created.
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docxastonrenna
Assignment 4: Presentation
Due Week 10 and worth 280 points
Choose any federal statute that is currently in the news. You will have to research that statute and at least two court cases pertaining to the statute. Then, prepare a PowerPoint Presentation of 6 to 8 slides addressing the following:
Provide a summary perspective of the statute.
From the two cases relevant to the statute you researched, analyze and evaluate each case separately by providing the following (about two paragraphs per case):
Facts of the case
Issues
Rule
Identify and discuss the legal ramifications and violations of any legal subjects and/or decisions related to any constitutional principles and/or administrative agency.
Make an argument for or against the statute. Discuss and persuade the audience of your position as a public administrator for or against it.
Your assignment must:
Include ten (10) PowerPoint slides, with two (2) devoted to each of the topics in items 2–4 above. Slides should abbreviate the information in no more than five or six (5 or 6) bullet points each.
In the Notes View of each PowerPoint slide, incorporate the notes you would use when presenting the slides to an audience.
Slide titles should be based on the criteria described above (e.g., “Four Major Changes,” “Major Court Cases,” etc.)
In addition to the ten (10) content slides required, a title slide and a reference slide are to be included. The title slide is to contain the title of the assignment, your name, the instructor’s name, the course title, and the date. The reference slide should list, in APA format, the sources you consulted in writing the paper.
The specific course learning outcomes associated with this assignment are:
·
Interpret the language of the U.S. Constitution and the U.S. legal system in order to explain the principles and process of constitutional, regulatory, and administrative laws at the federal and state levels.
·
Use the “case” approach to the U.S. legal system for researching cases, laws, and other legal communications using technology and information resources.
·
Evaluate legal subjects relevant to public administration to include property, government contracts, employment, and torts.
·
Relate the administrative process, constitutional and statutory requirements, to the scope of judicial review of administrative agency decisions.
·
Assess legal decisions related to the administration of public goods.
Apply and rule on moral and ethical analysis to issues relevant to the public administration decision-making process.
Use technology and information resources to research issues in constitution and administrative law.
Write clearly and concisely about issues in constitution and administrative law using proper writing mechanics.
.
Assignment 4 Engaging Families and the Community in Early Childhood.docxastonrenna
Assignment 4: Engaging Families and the Community in Early Childhood Learning
Directions
This assignment contains 2 parts. Both parts must be completed as a requirement of this assignment.
Create a 2 page newsletter for parents/guardians of your preschool classroom. In the first part, you will welcome them to your class and invite them to become part of the learning experience. You may create special events or simply identify opportunities during the school day where they may participate. The second part of your newsletter will contain information on local resources and services that families may need or find helpful. Helping families connect to the community can further increase student success. Include resources that can be found in your area.
·
Be creative and make your letter visually engaging – use color and pictures
·
Use a newsletter format
·
Identify 5 different ways that parents can become involved in your classroom and describe each opportunity. Be sure to include a wide variety of ways parents can participate..
·
Identify 5 different resources and services available to help families in the community. Briefly describe each service as well as provide pertinent contact information.
GraGrading Rubric
Possible points
Student points
The opening of the newsletter is welcoming and conveys the purpose of the information being presented.
10
Newsletter includes 5 opportunities for parent engagement and each opportunity is described in detail.
30
Newsletter includes 5 different resources/services that are available locally in the community. Each service is described and includes contact information.
30
Information is presented in a 2 page newsletter format and is creative & unique with the use of color and layout. Information is enhanced with the use of visuals.
20
Information is presented in clear writing style using proper grammar, spelling and punctuation. There are few errors that interfere with the clarity of the content.
10
100
.
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxastonrenna
Assignment 4: Designing Compliance within the LAN-to-WAN Domain
Due Week 8 and worth 130 points
Note:
Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized formatting requirements, do NOT count toward the overall page length.
Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas:
Protecting data privacy across the WAN
Filtering undesirable network traffic from the Internet
Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web
Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources
Having an area designed to trap attackers in order to monitor attacker activities
Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity
Hiding internal IP addresses
Allowing operating system and application patch management
The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to-WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations.
Write a three to five (5-6) page paper in which you:
Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will:
filter undesirable network traffic from the Internet
filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web
allow for a zone for anonymous users but aggressively controls information exchange with internal resources
allow for an area designed to trap attackers in order to monitor attacker activities
offer a means to monitor network traffic in real time as a means to identify and block unusual activity
hide internal IP addresses
Identify the fundamentals of public key infrastructure (PKI).
Describe the manner in which your solution will protect the privacy of data transmitted across the WAN.
Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective.
Use at least three (3) quality resources in this assignment.
Note:
Wikipedia and similar Websites do not qualify as quality resources.
Note:
The graphically depicted solution is not included in the required page length.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific f.
Assignment 4: “Changing Our Lives” Thesis Statement
Adaliza Rodriguez
ENG 090- Writing Fundamentals
Charlotte Walker
August 13, 2016
Think about this: a young innocent girl from a small neighborhood in Puerto Rico sitting at the dining table trying to work on her math homework. Her younger siblings are playing in the living room, as her mother is busy preparing dinner. Her father, because of irreconcilable differences, separated from the family and she is wondering if she will indeed manage to make it thru high school with all these emotional and psychological interference. That young girl is me. I did not make it pass high school. Thankfully, I managed to pass my GED when I moved to NJ with my aunt, and continue to pursue in further education.
Acquiring a college degree is undoubtedly a significant step in an individual’s life that it now one of the core components of the American dream. Earn a degree, get a job, start a family and buy a house. Ordinarily, it is challenging but it begins with a college degree. Many first generation university and college students experience wide range of feelings, such as being the first child in their family to attain a college degree. I also want to experience the same feelings. I was overwhelmed with pride for being the first in my family to attend college, It’s a dream come true. Normally, those in possession of a college degree enjoy numerous opportunities. Thus, it is a significant accomplishment that I will one day also receive.
Many students, particularly the first generation university or college students, encounter enormous challenges in finding the courage to face the college life. This is because of the changing lifestyle as well as the fear of adjusting to a new and different schedule. For me, college presented an opportunity to continue progressing in my career, and that motivated me. It is true that new students are normally worried about learning and understanding new technology and how it works. For this reason, I spent much of my time on the computer and learning how beneficial it is to take courses online when it is convenient for myself and family. Thus, I was able to pick up on the blackboard and follow along with the instructions, that proved to be helpful.
College life provides students with an opportunity to build up their self confidence. Many use the opportunity to show pride in their academic success and build up their self esteem. College and university students are exposed to people from various backgrounds as well as expectations. An individual encounters some experiences that may make him or her feel socially, emotionally as well as physically uncomfortable. I used the new exposure to expand myself awareness and in understanding the world beyond student life.
Before getting into work environment, it is better to earn a college or university degree to enhance financial, social and career g.
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docxastonrenna
Assignment 4: Designing Compliance within the LAN-to-WAN Domain
Due Week 8 and worth 130 points
Note:
Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized formatting requirements, do NOT count toward the overall page length.
Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas:
Protecting data privacy across the WAN
Filtering undesirable network traffic from the Internet
Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web
Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources
Having an area designed to trap attackers in order to monitor attacker activities
Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity
Hiding internal IP addresses
Allowing operating system and application patch management
The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to-WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations.
Write a three to five (3-5) page paper in which you:
Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will:
filter undesirable network traffic from the Internet
filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web
allow for a zone for anonymous users but aggressively controls information exchange with internal resources
allow for an area designed to trap attackers in order to monitor attacker activities
offer a means to monitor network traffic in real time as a means to identify and block unusual activity
hide internal IP addresses
Identify the fundamentals of public key infrastructure (PKI).
Describe the manner in which your solution will protect the privacy of data transmitted across the WAN.
Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective.
Use at least three (3) quality resources in this assignment.
Note:
Wikipedia and similar Websites do not qualify as quality resources.
Note:
The graphically depicted solution is not included in the required page length.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-.
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docxastonrenna
Assignment 3
Purpose:
In assignment 3, the saga of Joseph Dunn's leadership at Dunn's Ski Emporium and The Deli continues. George Aitkins is getting ready to retire and Dunn has prepared for a clean transition. Dunn has hired you as a consultant to help create the transition organization.
Students will analyze the case study and then write a consultancy report applying concepts and ideas learned throughout the course. Students are expected to effectively use a wide range of the course readings in completing the paper, which means the course readings are used to support ideas and reasoning rather than as stand-alone statements.
The purpose of this assignment is two-fold. First, students will learn how to write a consultancy report and second, students will link the concepts of Dunn as a social architect, change agent, and individual to Dunn as a relationship builder.
Outcomes Met:
develop and implement methods for establishing a constructive organizational structure and culture that fosters positive employee and employer relationships
assess the interactions between the external environment and the organization to foster responsible and effective leadership and organizational practices
Perspective:
Students will act as a consultant hired to help Dunn address his role as a relationship builder. Interface the plan you created in Assignment #1- The Role of a Leader, with Dunn's need to address the potential threats to workforce harmony. Emphasize his role as leader and what he can do to build a relationship with his employees so that he empowers his managers and workforce to implement his vision for the company. Students are expected to be realistic in applying the concepts from the course to expand Dunn's environment and leadership role. Remember that in order to determine strategic direction, the leader must look inward, outward, forward and beyond.
.
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docxastonrenna
Assignment 3: Views on Diversity
**FOR SOLUTIONS PRO.**
Pablo believes that diversity is the most important issue in our culture, and that it is greatly underemphasized. On the other hand, Ralph rarely thinks of diversity, except when it is mentioned in the workplace. Monica is sensitized to multicultural issues because her parents are immigrants who still struggle with discrimination after being here for 20 years.
To obtain a cross-section of what people think about diversity, conduct five-minute interviews with three individuals you don't know well, and assess their views on diversity. You have been provided an
Informed Consent
document for the respondents to sign along with verbally consenting to participate in this assignment. This is to enable that the respondents demonstrate a clear understanding of the meaning and purpose of this assignment. While you are expected to use the informed consent form in keeping with ethical practices for data collection,
you do not need to submit it to the instructor as part of the assignment.
Ask the respondents the following questions and record their answers:
When you hear the word diversity mentioned in the workplace, in the media, or in casual conversation, what meaning do you assign this term?
Does a particular race, ethnic group, or other minority group come to mind when you think of diversity? Does one of these groups pertain to you?
Do you think the majority of people in our culture:
Respect cultural differences among groups of people.
Show indifference to cultural differences.
Lack respect for cultural differences. Explain each choice.
If you were to make a suggestion about how our culture should handle diversity over the next decade, what would it be?
Compile your responses and write a brief reflection paper (two pages) on your findings. Specifically address the following issues:
What did you discover was the general attitude toward diversity in our culture?
Is diversity more associated with one race, ethnic, or other minority group than with others? If so, explain why this might be the case.
Compare and contrast the respondent's views with your own. How would you answer the same questions?
by
Wednesday, June 15, 2016
. Your response should be
at least two pages long
. All written assignments and responses should follow APA rules for attributing sources.
.
Assignment 3 Views on DiversityPablo believes that diversity is t.docxastonrenna
Assignment 3: Views on Diversity
Pablo believes that diversity is the most important issue in our culture, and that it is greatly underemphasized. On the other hand, Ralph rarely thinks of diversity, except when it is mentioned in the workplace. Monica is sensitized to multicultural issues because her parents are immigrants who still struggle with discrimination after being here for 20 years.
To obtain a cross-section of what people think about diversity, conduct five-minute interviews with three individuals you don't know well, and assess their views on diversity. You have been provided an
Informed Consent
document for the respondents to sign along with verbally consenting to participate in this assignment. This is to enable that the respondents demonstrate a clear understanding of the meaning and purpose of this assignment. While you are expected to use the informed consent form in keeping with ethical practices for data collection, you do not need to submit it to the instructor as part of the assignment.
Ask the respondents the following questions and record their answers:
When you hear the word diversity mentioned in the workplace, in the media, or in casual conversation, what meaning do you assign this term?
Does a particular race, ethnic group, or other minority group come to mind when you think of diversity? Does one of these groups pertain to you?
Do you think the majority of people in our culture:
Respect cultural differences among groups of people.
Show indifference to cultural differences.
Lack respect for cultural differences. Explain each choice.
If you were to make a suggestion about how our culture should handle diversity over the next decade, what would it be?
Compile your responses and write a brief reflection paper (two pages) on your findings. Specifically address the following issues:
What did you discover was the general attitude toward diversity in our culture?
Is diversity more associated with one race, ethnic, or other minority group than with others? If so, explain why this might be the case.
Compare and contrast the respondent's views with your own. How would you answer the same questions?
Submit your response to the
M1: Assignment 3 Dropbox
by
Wednesday, June 15, 2016
. Your response should be at least two pages long. All written assignments and responses should follow APA rules for attributing sources.
Assignment 3 Grading Criteria
Maximum Points
Interviewed a cross-section of people and acquired the desired responses.
15
Summarized the respondent's attitude toward diversity in modern culture using appropriate terms and concepts.
25
Commented on whether the respondent believed diversity was associated with one particular race or ethnic group more so than others.
25
Provided contrasting views between the respondent's and your own views on the discussed subjects along with an explanation.
25
Wrote in a clear, concise, and organized manner; demonstrated ethical scholarship in accurate representation and attributi.
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docxastonrenna
Assignment 3: Outline a New IT Security Policy
Due Week 9 and worth 250 points
You have been hired by the Board of Directors of RollinOn, Inc as the new IT Security Manager. RollinOn is a designer of premade and custom designed skates and skateboards. RollinOn has had some extreme growth in the area of e-Commerce over the past couple of years due to the addition of their custom design tools on their website. However, RollinOn has had some internal security issues. RollinOn hs had some very lax policies allowing employees to bring their own tablets and laptops, also known as bring your own device or BYOD, and access social media on the intranet. The Web application development team has increased in size and is also in need of sound security practices. There have been several instances of downloaded malware and the company website has been hacked on at least one (1) occasion.
Your main objective is to create an outline of a new IT security policy regarding the company’s web presence and lack of access control. Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.
Part I: Written Section
Write a three to five (3-5) page paper in which you:
Briefly explain the current state of Web application security to the Board of Directors.
Describe the major potential security risks associated with maintaining the organization’s Web presence, protecting its assets, and promoting e-Commerce.
Assess any techniques and technologies that you may need to use to mitigate those potential security risks.
Create an outline of your new IT security policies for RollinOn. Be sure to relate your policies to the potential risks.
Speculate on the most common types of resistance that you might encounter from employees when implementing your new IT policy.
Use at least four (4) quality references in this assignment. Note: Wikipedia and similar Websites do not qualify as quality references.
Format your assignment according to the following formatting requirements:
Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page is not included in the required page length.
.
Assignment 3 Nonverbal CommunicationImagine that you are forming .docxastonrenna
Assignment 3: Nonverbal Communication
Imagine that you are forming a small professional group to discuss how the statistics and research of a human services organization can be improved. You would also need to present the group with some tips and tools on positive communication techniques to enhance the success of the group's communication.
In this assignment, you will create a code of conduct or a set of guidelines regarding how a group should interact during meetings. You will also analyze the issues that might arise when people meet in a group and explain how these issues can be addressed by making preventative efforts.
Tasks:
Create a 2- to 3-page paper by responding to the following points:
Describe the way in which you will set up a small professional group. Create a code of conduct or a set of guidelines regarding how the group should interact in both face-to-face communication and technology-mediated meetings.
Provide at least 6–10 positive communication techniques that would enable the group to address communication issues, if they occur, during the meeting.
Review the group development stages (forming, storming, norming, and performing) and analyze the stage in which your group currently is; describe the specific technique to be used based on the stage in which the group is.
Note
: Your paper should rely upon at least 2 sources from additional professional literature; the sources must be cited in APA format. The literature may include relevant textbooks, peer-reviewed journal articles, and websites created by professional organizations, agencies, or institutions (.edu, .org, or .gov).
In addition, you will create a 6- to 10-minute video introducing the communication tips or code of conduct that you previously created. Also, include the following points while creating your video:
The difference between listening and hearing
The five positive ways to align your nonverbal body language with your verbal language
The etiquette of technologically mediated meetings (choose any one method to address)
.
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docxastonrenna
Assignment 3: Leadership of Richard Branson
Write a paper in which you:
Assess the key elements of Richard Branson’s leadership style and the impact that those elements have had on his business success. Provide support for your rationale.
Given that The Virgin Group has been described as a fast-growing entrepreneurial company with many facets to the group, suggest how the unique aspects of Richard Branson’s leadership style mesh successfully with the particular attributes of a multifaceted organization like Virgin.
Determine two (2) key ways in which Richard Branson is likely to motivate employees in order to achieve his goals for the Virginia Group. Indicate whether or not his approach is likely to work in a different organizational setting. Provide support for your rationale.
Assess the effectiveness of Richard Branson’s ability to articulate and communicate his vision for his company to employees and other stakeholders. Provide support for your rationale.
Assume that you have received a job offer to be a manager within the Virgin Group. Determine the criteria you would use to evaluate whether Richard Branson’s leadership style is a good fit for you as a manager and what conclusion you may draw about working under this type of leader.
Take a position on whether or not you believe Richard Branson is a global leader. Justify your position and provide support for your justification.
Predict Richard Branson’s success as a leader over the next five (5) years. Support your prediction.
.
Assignment 3 Gender Identity We are socialized at every stage in .docxastonrenna
Assignment 3: Gender Identity
We are socialized at every stage in life to conform to our gender identity. Societal reinforcement of tendencies of gender identity is relentless. For example, in hospitals, little girls are wrapped in pink and little boys in blue. This difference in colors influences how we learn and how we internalize our role in our society.
Girls tend to grow up to play feminine roles and boys tend to grow up to play masculine roles. This differentiation of gender identity has implications in social stratification. The videos given below will provide you with a better understanding of the differentiation of sexual identity from an earlier generation.
Search for and watch an episode of at least one of the following shows. You may find these videos using a variety of search methods including visiting your local library, using Netflix or your local video store, or searching on YouTube. If you have difficulty locating an episode of one of the following shows, contact your instructor for assistance in finding an alternative.
I Love Lucy
All in the Family
The Mickey Mouse Club
The Honeymooners
Leave it to Beaver
Father Knows Best
Gilligan’s Island
The Brady Bunch
I Dream of Jeannie
As you watch the video, ask yourself the following questions:
To what extent have things changed and to what extent have they remained the same in regards to gender roles, expectations, division, and identity from the time this show was originally popular and today?
How conscious and sensitive are the characters regarding gender prejudice, power inequality, and subordination?
Did they take inequality of the sexes for granted?
Based on your readings and understanding that you have gathered after watching the above-noted video, write a short biographical description of your life if you were to wake up tomorrow morning in the time period of the video you watched and find you have a different gender identity. Write a description of how you lived your life a day after your hypothetical change in gender as you answer the following questions:
Discuss how you would react on finding out that your sex is opposite. Would you feel a sense of relief, indifference, or elation? Why?
Discuss three ways your attitude towards the opposite sex was enlightened or would change as a result of what you learned from this project. If you would not change your attitude, why?
Write down the ideas and attitudes you have taken for granted a member of your actual gender. Consider how your roles at home and in the office would change if you were a member of the opposite gender.
Relate the ideas of sexism and racism to the videos. How do you think sexism and racism have changed since the 1950s?
Use the following file naming convention: LastnameFirstInitial_M1_A3.doc. For example, if your name is John Smith, your document will be named SmithJ_M1_A3.doc.
By
Wednesday, September 28, 2016
, deliver your assignment to the
M1: Assignment 3 Dropbox
.
Assignment 3 Grading Criteria
Maxi.
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docxastonrenna
Assignment 3: Fraud Techniques
Due Week 7 and worth 50 points
Today, there are many industries that remain vulnerable to electronic fraud. For this assignment, you will need to research the Internet for organizations that remain vulnerable and the hacking or fraud techniques they have encountered in the recent years.
Write a 3-4 page paper in which you:
Identify and describe at least two forms of fraud techniques from your research. Include the identity of the government agencies that provide awareness for these types of fraud techniques.
Justify the threat cyber terrorism poses to society. Provide examples to support your justification.
Prioritize steps that should be completed in order to preserve evidence so that it may be used in court cases for trials against computer fraud offenders.
Defend or oppose the legal processes of civil law used to resolve cases against computer crimes offenders. Justify your decision.
Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Explain the techniques of computer criminals and hackers.
Describe organized crime and cyber terrorism crime.
Categorize the civil matters related to computer crime.
Use technology and information resources to research issues in the investigation of computer crime.
Write clearly and concisely about computer crime investigation topics using proper writing mechanics and technical style conventions.
Click
here
to view the grading rubric.
.
Assignment 3 Exploring Your CulturePart of successfully exploring.docxastonrenna
Assignment 3: Exploring Your Culture
Part of successfully exploring other cultures is having a solid foundation in the tenets of one’s culture. This assignment will have you evaluate key components of your culture. When you begin exploring the main foundation of other cultures, you will be able to identify similarities or dissimilarities to your own. This is also a good self-ethnographic activity.
Develop a presentation on the cultural identity with which you align yourself. Consider the following:
Describe the culture you identify with.
Explain the major components of your culture.
Explain the various symbols associated with your culture including their meanings.
Describe the other cultures you are integrated with besides your own. What are the similarities and differences between these cultures with which you are connected?
Evaluate the roles that race, class, age, and gender play in your culture.
Support your statements with examples and scholarly references.
You may use images and other media to present your perspective. Use the speakers’ notes to explain your statements in further detail.
Develop a 10-slide presentation in PowerPoint format. Apply APA standards to citation of sources. Use the following file naming convention: LastnameFirstInitial_M1_A3.ppt. For example, if your name is John Smith, your document will be named SmithJ_M1_A3.ppt.
.
Assignment 3 Exploring Your CulturePart of successfully explo.docxastonrenna
Assignment 3: Exploring Your Culture
Part of successfully exploring other cultures is having a solid foundation in the tenets of one’s culture. This assignment will have you evaluate key components of your culture. When you begin exploring the main foundation of other cultures, you will be able to identify similarities or dissimilarities to your own. This is also a good self-ethnographic activity.
Develop a presentation on the cultural identity with which you align yourself. Consider the following:
Describe the culture you identify with.
Explain the major components of your culture.
Explain the various symbols associated with your culture including their meanings.
Describe the other cultures you are integrated with besides your own. What are the similarities and differences between these cultures with which you are connected?
Evaluate the roles that race, class, age, and gender play in your culture.
Support your statements with examples and scholarly references.
You may use images and other media to present your perspective. Use the speakers’ notes to explain your statements in further detail.
Develop a 10-slide presentation in PowerPoint format. Apply APA standards to citation of sources. Use the following file naming convention: LastnameFirstInitial_M1_A3.ppt. For example, if your name is John Smith, your document will be named SmithJ_M1_A3.ppt.
By
Week 1, Day 7
, deliver your assignment to the
M1: Assignment 3 Dropbox
.
Assignment 3 Grading Criteria
Maximum Points
Examined your culture, providing a detailed analysis of its main components and symbols.
36
Compared your culture with other cultures you are integrated with to identify the similarities and differences.
32
Assessed the roles of race, class, age, and gender in your culture.
12
Wrote in a clear, concise, and organized manner; demonstrated ethical scholarship in accurate representation and attribution of sources; displayed accurate spelling, grammar, and punctuation.
20
Total:
100
.
Assignment 3 Legal Ethics, Patients’ Rights, and HIV AIDSDue We.docxastonrenna
Assignment 3: Legal Ethics, Patients’ Rights, and HIV / AIDS
Due Week 9 and worth 200 points
As the head health care administrator at USA Community Hospital, you are required to review compliance reports on issues relating to the ethical conduct of the professional staff at your hospital, patient review registries, and standard procedures surrounding the ethical treatment of patients with HIV / AIDS. Intermittently, complaints surface from patients with HIV / AIDS concerned with ethical treatment and denial of services.
Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.
Write a six to eight (6-8) page paper in which you:
Devise a plan to investigate the validity of patients’ claims of denial of services. This plan should include, but not be limited to, establishing mechanisms to address service denial claims, a human resources component, and a review of related policies and procedures.
Analyze the primary way in which different staffing levels may play pivotal roles in upholding ethical conduct, including treating patients with dignity. Justify your position.
Formulate a plan to relate the primary legal ramifications to the professional staff regarding ethical treatment of the hospital’s HIV / AIDS patients.
Devise a community relations plan that tout’s the hospital’s unique ways of serving persons with HIV / AIDS, including a focus on de-stigmatizing those afflicted.
Use at least five (5) quality academic resources in this assignment. Note: Wikipedia and other Websites do not quality as academic resources.
.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
1. Assignment 3: Incident Response (IR) Strategic Decisions
Suppose that you have been alerted of a potential incident
involving a suspected worm spreading via buffer overflow
techniques, compromising Microsoft IIS Web servers. As the IR
Team leader, it is your responsibility to determine the next
steps.
Write a two to three (2-3) page paper in which you:
Explain in detail the initial steps that would need to be made by
you and the IR team in order to respond to this potential
incident.
Construct a process-flow diagram that illustrates the process of
determining the incident containment strategy that would be
used in this scenario, and identify which containment strategy
would be appropriate in this case, through the use of graphical
tools in Visio, or an open source alternative such as Dia. Note:
The graphically depicted solution is not included in the required
page length.
Construct a process flow diagram to illustrate the process(es)
for determining if / when notification of the incident should be
relayed to upper management, and explain how those
communications should be structured and relayed through the
use of graphical tools in Visio, or an open source alternative
such as Dia. Note: The graphically depicted solution is not
included in the required page length.
Detail the incident recovery processes for the resolution of this
incident.
Use at least three (3) quality resources in this assignment. Note:
Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, the
2. student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
The specific course learning outcomes associated with this
assignment are:
Summarize the various types of disasters, response and recovery
methods.
Develop techniques for different disaster scenarios.
Use technology and information resources to research issues in
disaster recovery.
Write clearly and concisely about disaster recovery topics using
proper writing mechanics and technical style conventions.
Points: 75
Assignment 3: Incident Response (IR) Strategic Decisions
Criteria
Unacceptable
Below 60% F
Meets Minimum Expectations
60-69% D
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Explain in detail the initial steps that would need to be made
by you and the IR team in order to respond to this potential
incident.
Weight: 15%
Did not submit or incompletely explained in detail the initial
steps that would need to be made by you and the IR team in
order to respond to this potential incident.
3. Insufficiently explained in detail the initial steps that would
need to be made by you and the IR team in order to respond to
this potential incident.
Partially explained in detail the initial steps that would need to
be made by you and the IR team in order to respond to this
potential incident.
Satisfactorily explained in detail the initial steps that would
need to be made by you and the IR team in order to respond to
this potential incident.
Thoroughly explained in detail the initial steps that would need
to be made by you and the IR team in order to respond to this
potential incident.
2. Construct a process-flow diagram that illustrates the process
of determining the incident containment strategy that would be
used in this scenario, and identify which containment strategy
would be appropriate in this case, through the use of graphical
tools in Visio, or an open source alternative such as Dia.
Weight: 25%
Did not submit or incompletely constructed a process-flow
diagram that illustrates the process of determining the incident
containment strategy that would be used in this scenario, and
did not submit or incompletely identified which containment
strategy would be appropriate in this case, through the use of
graphical tools in Visio, or an open source alternative such as
Dia.
Insufficiently constructed a process-flow diagram that
illustrates the process of determining the incident containment
strategy that would be used in this scenario, and insufficiently
identified which containment strategy would be appropriate in
this case, through the use of graphical tools in Visio, or an open
source alternative such as Dia.
Partially constructed a process-flow diagram that illustrates the
process of determining the incident containment strategy that
would be used in this scenario, and partially identified which
containment strategy would be appropriate in this case, through
the use of graphical tools in Visio, or an open source alternative
4. such as Dia.
Satisfactorily constructed a process-flow diagram that
illustrates the process of determining the incident containment
strategy that would be used in this scenario, and satisfactorily
identified which containment strategy would be appropriate in
this case, through the use of graphical tools in Visio, or an open
source alternative such as Dia.
Thoroughly constructed a process-flow diagram that illustrates
the process of determining the incident containment strategy
that would be used in this scenario, and thoroughly identified
which containment strategy would be appropriate in this case,
through the use of graphical tools in Visio, or an open source
alternative such as Dia.
3. Construct a process flow diagram to illustrate the process(es)
for determining if / when notification of the incident should be
relayed to upper management, and explain how those
communications should be structured and relayed through the
use of graphical tools in Visio, or an open source alternative
such as Dia.
Weight: 25%
Did not submit or incompletely
constructed a process flow diagram to illustrate the process(es)
for determining if / when notification of the incident should be
relayed to upper management, and did not submit or
incompletely explained how those communications should be
structured and relayed through the use of graphical tools in
Visio, or an open source alternative such as Dia.
Insufficiently constructed a process flow diagram to illustrate
the process(es) for determining if / when notification of the
incident should be relayed to upper management, and
insufficiently explained how those communications should be
structured and relayed through the use of graphical tools in
Visio, or an open source alternative such as Dia.
Partially constructed a process flow diagram to illustrate the
process(es) for determining if / when notification of the incident
should be relayed to upper management, and partially explained
5. how those communications should be structured and relayed
through the use of graphical tools in Visio, or an open source
alternative such as Dia.
Satisfactorily constructed a process flow diagram to illustrate
the process(es) for determining if / when notification of the
incident should be relayed to upper management, and
satisfactorily explained how those communications should be
structured and relayed through the use of graphical tools in
Visio, or an open source alternative such as Dia.
Thoroughly constructed a process flow diagram to illustrate the
process(es) for determining if / when notification of the incident
should be relayed to upper management, and thoroughly
explained how those communications should be structured and
relayed through the use of graphical tools in Visio, or an open
source alternative such as Dia.
4. Detail the incident recovery processes for the resolution of
this incident.
Weight: 20%
Did not submit or incompletely detailed the incident recovery
processes for the resolution of this incident.
Insufficiently detailed the incident recovery processes for the
resolution of this incident.
Partially detailed the incident recovery processes for the
resolution of this incident.
Satisfactorily detailed the incident recovery processes for the
resolution of this incident.
Thoroughly detailed the incident recovery processes for the
resolution of this incident.
5. 3 references
Weight: 5%
No references provided
Does not meet the required number of references; all references
poor quality choices.
Does not meet the required number of references; some
references poor quality choices.
Meets number of required references; all references high quality
6. choices.
Exceeds number of required references; all references high
quality choices.
6. Clarity, writing mechanics, and formatting requirements
Weight: 10%
More than 8 errors present
7-8 errors present
5-6 errors present
3-4 errors present
0-2 errors present