Current Events Crisis Analysis Essay
This paper should be written in an APA-Style format.
Your paper will be evaluated on the following:
· Content
· Grammar
· Structure and mechanics
· Relevance to the topic(s)
Note: Each essay will be submitted through Canvas
Current Events Crisis Analysis:
This assignment requires students to identify and examine a current example of a crisis taken from the news. Students will analyze various elements for consideration and apply course concepts. Students will critique the company/individual in terms of what was done well and what perhaps could have been orchestrated better and why.
Instructions:
Write about a company or industry that has faced or currently faces a crisis (or that is grappling with an issue which threatens to become a crisis.)
Include the following components: 1) analyze the underlying causation); 2) a stakeholder analysis; 3) review what the organization did in response, and 4) evaluate its effectiveness and determine whether other approaches might have been taken.
You should do an analysis rather than a description. In addition, you should include documentation of source material. Finally, whichever sort of topic you choose should be of real interest to you.
Length:
3-5 pages (it’s expected that you employ sources, attributions and bibliography.)
Be sure to provide informed and thoughtful answers to all of the guideline suggestions/questions.
Style:
APA Format
Visit the Purdue Online Writing Lab for more help with APA formatting.
Guidelines:
I. Define the organization and its crisis / potential crisis.
II. Crises develop in four stages: Warning (detection, prevention, preparation), Point-of- no-return (containment), Cleanup (recovery), and Back-to-normal (learning). What stage(s) apply to this crisis?
III. Who do you think is in charge of managing the crisis?
a. What are their highest priorities?
b. What are their motives behind their decisions?
IV. Attempt to define the stakeholders and their concerns.
a. What are the communication strategies?
b. What are the messages?
c. Are there any inconsistencies between early response and later response?
d. Did the organization utilize any intermediaries to help manage its relationships with stakeholders?
V. Evaluate the organization’s responses.
a. Restores trust? Damaging? Honest? Explanatory? Plain speech vs. technical speech? Deflects or invites participation of those affected to seek solutions? Ignores, meets or exceeds stakeholder expectations?
b. Were concerns dismissed? Was blame cast elsewhere? Were mistakes acknowledged? Sympathetic? Were public apologies made?
VI. In your opinion, how well was the organization prepared for this crisis? Explain.
VII. If an organization’s reputation has been damaged, how might it be restored?
VIII. Can you detect or predict any potential benefits from this crisis?
Written Submission Guidelines
1. Review the detailed written assignment instructions on how to submit your assignments and how to revi.
The document discusses the importance of thoroughly testing software installers. It notes that installers are often an afterthought and not rigorously tested by organizations. It provides examples of important areas to test for installers, including:
1) Testing system resources by attempting installations on unsupported operating systems or devices without sufficient storage space.
2) Testing customization options by selecting different installation locations, including network drives, and ensuring only selected components are installed.
3) Testing other functionality like installation overwrite scenarios, language/grammar, license agreements and uninstall processes.
Thorough installer testing is important as the installer is usually the first experience a user has with an organization's software. Untested installers can negatively impact the
The document provides instructions for installing and configuring the Wiki Wizard software. It describes registering a license, setting configuration options like threads and proxies, adding wiki sites from a scraper or importer, and validating the sites. It also explains the auto generator, captcha, and spinner settings. The overview aims to get the user started with the basic setup and navigation of the software.
This document provides a 3-step guide to getting started with Hyper-V:
1. Install the Hyper-V role in Windows Server 2008.
2. Create a virtual machine and allocate resources like memory and storage.
3. Install an operating system on the virtual machine and integration services to improve integration between the host and guest.
This document provides high-level steps for IT professionals to perform an enterprise-scale desktop deployment project moving from Windows XP to Windows 7. It discusses migrating user files and settings, application management and compatibility testing, choosing an imaging strategy to build Windows 7 system images, and automating the end-to-end migration process. The goal is to make the process as automated as possible when transitioning multiple users and computers from an older to a newer operating system.
MN502Overview of Network SecurityPage 6 of 6Assessment D.docxraju957290
MN502 Overview of Network Security Page 6 of 6
Assessment Details and Submission Guidelines
Unit Code
MN502
Unit Title
Overview of Network Security
Assessment Type
Individual Assessment
Assessment Title
Demonstration of a network security tool
Purpose of the assessment (with ULO Mapping)
a) Discuss common threats and attacks on networked information systems
b) Identify most common intrusion detection attacks, and discuss how to prevent them
c) Apply skills to analyse complex problems in network security under supervision
Weight
15%
Total Marks
20
Word limit
Not Applicable
Due Date
W Week 7
Submission Guidelines
· All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.
· The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.
· Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.
Extension
· If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School's Administration Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit this application three working days prior to the due date of the assignment. Further information is available at:
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/specialconsiderationdeferment
Academic Misconduct
· Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at:http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure.For further information, please refer to the Academic Integrity Section in your Unit Description.
Assessment Cover Sheet
Student ID:
Student Surname:
Given Name:
Course:
School:
Unit Code:
Unit Title:
Due Date:
Date Submitted:
Campus:
Lecturer:
Tutor:
All work must be submitted on Moodle by the due date. If an extension of time to submit work is required, a Special Consideration Application must be submitted. Further information is available at:
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/specialconsiderationdeferment
Academic Misconduct
Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at:http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure.For fu ...
This article explains how to create mass users using eCATT scripts in 4 phases: 1) Recording a user creation, 2) Creating parameters, 3) Creating a test configuration, and 4) Updating and uploading the variant file. The script allows creating many users quickly by modifying values in an Excel file rather than individual user creation.
The document discusses the importance of thoroughly testing software installers. It notes that installers are often an afterthought and not rigorously tested by organizations. It provides examples of important areas to test for installers, including:
1) Testing system resources by attempting installations on unsupported operating systems or devices without sufficient storage space.
2) Testing customization options by selecting different installation locations, including network drives, and ensuring only selected components are installed.
3) Testing other functionality like installation overwrite scenarios, language/grammar, license agreements and uninstall processes.
Thorough installer testing is important as the installer is usually the first experience a user has with an organization's software. Untested installers can negatively impact the
The document provides instructions for installing and configuring the Wiki Wizard software. It describes registering a license, setting configuration options like threads and proxies, adding wiki sites from a scraper or importer, and validating the sites. It also explains the auto generator, captcha, and spinner settings. The overview aims to get the user started with the basic setup and navigation of the software.
This document provides a 3-step guide to getting started with Hyper-V:
1. Install the Hyper-V role in Windows Server 2008.
2. Create a virtual machine and allocate resources like memory and storage.
3. Install an operating system on the virtual machine and integration services to improve integration between the host and guest.
This document provides high-level steps for IT professionals to perform an enterprise-scale desktop deployment project moving from Windows XP to Windows 7. It discusses migrating user files and settings, application management and compatibility testing, choosing an imaging strategy to build Windows 7 system images, and automating the end-to-end migration process. The goal is to make the process as automated as possible when transitioning multiple users and computers from an older to a newer operating system.
MN502Overview of Network SecurityPage 6 of 6Assessment D.docxraju957290
MN502 Overview of Network Security Page 6 of 6
Assessment Details and Submission Guidelines
Unit Code
MN502
Unit Title
Overview of Network Security
Assessment Type
Individual Assessment
Assessment Title
Demonstration of a network security tool
Purpose of the assessment (with ULO Mapping)
a) Discuss common threats and attacks on networked information systems
b) Identify most common intrusion detection attacks, and discuss how to prevent them
c) Apply skills to analyse complex problems in network security under supervision
Weight
15%
Total Marks
20
Word limit
Not Applicable
Due Date
W Week 7
Submission Guidelines
· All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.
· The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.
· Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.
Extension
· If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School's Administration Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit this application three working days prior to the due date of the assignment. Further information is available at:
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/specialconsiderationdeferment
Academic Misconduct
· Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at:http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure.For further information, please refer to the Academic Integrity Section in your Unit Description.
Assessment Cover Sheet
Student ID:
Student Surname:
Given Name:
Course:
School:
Unit Code:
Unit Title:
Due Date:
Date Submitted:
Campus:
Lecturer:
Tutor:
All work must be submitted on Moodle by the due date. If an extension of time to submit work is required, a Special Consideration Application must be submitted. Further information is available at:
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/specialconsiderationdeferment
Academic Misconduct
Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at:http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure.For fu ...
This article explains how to create mass users using eCATT scripts in 4 phases: 1) Recording a user creation, 2) Creating parameters, 3) Creating a test configuration, and 4) Updating and uploading the variant file. The script allows creating many users quickly by modifying values in an Excel file rather than individual user creation.
Windows Server Deployment ProposalOverviewEach student will .docxalanfhall8953
Windows Server Deployment Proposal
Overview
Each student will create a detailed, organized, unified technical solution given the scenario described below. The submission will be in a written format, with at least one diagram, and may include additional diagrams, charts or tables. The assignment is meant for students to enhance their mastery of the material and to provide a creative and realistic way in which to apply knowledge from this course.
Scenario
Worldwide Advertising, Inc. (referred to as “WAI”) has hired you as an IT consultant for implementing their Windows network infrastructure. WAI is a new advertising firm, and they are currently hiring staff, establishing two locations, and have a need to get their internal IT services configured. They do not yet have an IT staff, but when they do, the IT staff will take over all aspects of IT administration. You are required to supply WAI with a solution which describes the implementation and configuration of their core IT services. Cost is not a significant concern – WAI wishes to implement the “right” solution to fit their needs now and for the next 2-3 years.
There are several details about WAI which will have an impact on your choices:
· WAI will start with 110 employees, in the following departments:
· Executives (9 employees) – manage and run the company
· Accounts and Sales Department (15 employees) – perform market research and maintain accounts
· Creative, Media and Production Department (59 employees) – advertising
· Human Resources and Finances (17 employees) – perform HR and financial duties
· IT (10 employees) – manage IT for the company
· WAI will have two sites, one in Seattle and one in New York. Most staff will be located in Seattle, with at least 1 person from each of the departments above located in NY.
· Networking equipment is already in place for both sites. A secure tunnel (using IPSec) will be established between the two sites so that inter-site traffic will be securely tunneled over the Internet. You may make whatever other assumptions you wish about intra-and inter-site connectivity.
· Security mechanisms (e.g., firewalls, intrusion detection) will be handled separately, and there is no need to describe them.
· Some departments will want their data to remain private from other departments (e.g., Finances personnel will not want Production staff to see the company’s financial details). Your team may make assumptions about how data should be shared or kept private.
· Assumptions can be made regarding any information not included here; all assumptions should be identified, however.
Topics to Cover
Your document should cover the content presented in the course. The outline below contains recommended points to cover. You are free to add other related information.
Describe the technical and business reasons for each choice, citing other resources as appropriate.
The Windows Server 2012 operating system should be used for all aspects of the solution.
The topics inclu.
Teaching old dogs new tricks with Rational Developer for System iStrongback Consulting
Rolling out Rational Developer is more than just purchasing the product. In order to maximize the adoption rate of the product, you need a plan, you need executive sponsorship, and you need diligence. This covers our recommended best practices, as well as example anti-patterns that people often fall into causing their adoption rate to plummet.
CSS G11 Module 6 Q1 computer systems servicing for grade 12ASEJODEREK
This document provides information about installers preparation and operating system installation procedures. It discusses types of software installations like media-based, web-based, single executable files, and Windows Installer installations. It also describes portable installer software and applications that can be easily transferred between computers. Furthermore, it explains the Rufus application which is used to create bootable USB drives for installing operating systems using external devices.
1) The document provides steps to set up a Jenkins build server on Amazon EC2, including launching an EC2 instance, installing Jenkins, and configuring it to use EC2 instances as build slaves.
2) The steps include creating a security group to allow HTTP and SSH access, downloading and installing Jenkins on the EC2 instance, and configuring Jenkins with the Amazon EC2 plugin to enable use of EC2 instances for builds.
3) Additional resources are provided to learn more about Jenkins on AWS, including a whitepaper and links to documentation on DevOps, security groups, and key pairs.
1) The document describes the installation processes of Windows 10, Linux Ubuntu 15.04, antivirus software Kaspersky, and office software Microsoft Office 2010 on a computer system.
2) Details are provided on partitioning disks and setting up user accounts during the Linux installation. Network setup and installation of the Skype application are also documented.
3) Test plans are outlined to check the identification of distributions, device drivers, user account configuration, network connectivity, and software installation. Screenshots confirm the successful completion of tests.
4) Common faults identified on four PCs include non-working USB ports, faulty Wi-Fi connectivity, random restarting, and malfunctioning keyboard keys. Steps taken to diagnose
This document contains questions related to system administration, software development, and DevOps best practices. It covers topics such as scaling applications, handling outages, deploying software, testing systems, configuration management tools, networking, Linux, Windows, security, cloud infrastructure, databases, APIs, websites, continuous integration, source control workflows, and personal interests. The questions are designed to assess a candidate's knowledge and experience in these important technical areas.
Operating System Upgrade Implementation Report And...Julie Kwhl
- Advancements in browsers and JavaScript libraries have made Flash unnecessary for most websites, allowing richer experiences without plugins.
- As devices like phones, tablets, and smart TVs became more common, accessibility of content across different platforms became important.
- Web standards like HTML5, CSS, and JavaScript now provide many of the interactive capabilities Flash once did, in an open and consistent way across all browsers and devices.
- While Flash had its place early on, today's web favors open standards that don't require plugins and can reach all internet-connected devices. The benefits of accessibility now outweigh Flash's capabilities for most sites.
This document provides instructions for a hands-on test involving configuring two Windows Server 2008 machines - one as a domain controller and one as a member server. It includes 16 steps to configure IP addresses, install Active Directory, add a user, delegate permissions, create OUs, configure a roaming profile, and set NTFS and share permissions using the A-G-D-L-P method. The student is asked to document each step, provide screenshots as evidence of completion, and answer several questions.
Cyber terrorism, by definition, is the politically motivated use.docxdorishigh
Cyber terrorism, by definition, is the politically motivated use of computers and information technology to cause severe disruption or widespread fear in society. The Center for Strategic and International Studies reported in March 2019 that Chinese Hackers targeted at least 27 Universities to steal Naval Technologies research, being one of many cyber-terrorist attacks. Besides these attacks, Hacktivism is a cyber-attack either by legal or illegal digital means in the pursuit of political ends, free speech, and the right of free speech. A most notable example would be the group Anonymous conducting numerous hacks from 2008 to 2012 against companies, organizations, and even governments that go against their moral codes. Behind the Tunisia Operation in 2010, Anonymous took down eight government websites with DDOS (Distributed Denial of Service) attacks in support of Arab Spring movements. Between the two Cyberterrorism is meant to instill fear and panic in society. At the same time, Hacktivism brings about a voice or an opposition to the government and other organizations to support a cause against them. Hacktivism is more politically based, pointing out flaws in the system raising awareness on our rights as human beings. Advances in technology lead to newer and different types of attacks either group can conduct. From viruses waiting for you to log into your bank account to massive-scale attacks against the banks' systems themselves, terrorists, or hacktivists, have infinite ways to infiltrate and attack for their cause. Many laws have been put in place to combat these groups, acts put in place such as Cybersecurity Information Sharing Act (CISA) or Cybersecurity Enhancement Act of 2014 helping share information and build research and development to fight against cyber-attacks. Given the push against both groups by our government, I can't help but feel concern for our rights and freedoms that may be infringed upon that our government or some corporation is doing while combating the whistleblower with Hacktivist tactics. It only keeps me and others mindful while fighting against cyberattacks that may be classified as cyberterrorism. There is a fine line on what would be a genuine noble act of hacking or something labeled as cyberterrorism placing information and lives at risk, its not so black and white as some areas can be considered grey. Thankfully some events in history, thanks to Hacktivism has brought good results that benefit society, such as Operation "Nice" which organized to hunt down the terrorist responsible for attacks in the French city, killing nearly a hundred people. Also, Operation Darknet which infiltrated 40 child pornography websites publishing 1500 plus names of frequent visitors to the sites stopping such activity. In these instances, I am for hacktivism and specific groups that act for the benefit of society and our rights as humans.
Cyberterrorism. (n.d.). Retrieved from
https://www.dictionary.com/browse/cyberterroris.
Cyber Security Threats
Yassir Nour
Dr. Fonda Ingram
ETCS-690
Cybersecurity Research Seminar
Date: 02/08/2019
1. Denial-of-Service (DoS) Attacks
A denial-of-service (DoS) is any kind of assault where the assailants (programmers) endeavor to keep real clients from getting to the service.
Programmer sends undesirable high volumes of traffic through the system until it ends up stacked and can never again work.
https://www.incapsula.com/ddos/ddos-attacks/denial-of-service.html
2
Company and summary of how the threat affected the firm
Deezer, an online music streaming service, says it was affected by a vast scale DDoS assault on June 7 through a botnet, which brought about the organization's site being down for a few hours.
https://www.theguardian.com/technology/2014/jun/10/deezer-user-data-hack-attack-ddos
3
Possible
Solution
s
These threats could been avoided by:
Reinforcing the security frameworks and servers
WAFs (Web Application Firewalls) are an incredible instrument to use against these assaults as they give you more command over your web traffic while perceiving malicious web misuses.
2. Malware
A malware assault is a sort of cyber-attack in which malware or malicious programming performs exercises on the unfortunate casualty's PC system, more often than not without his/her insight.
In straightforward words, it is a code with the expectation to takes information or obliterates something on the PC.
https://us.norton.com/internetsecurity-malware.html
5
Company and summary of how the threat affected the firm
Onslow Water and Sewer Authority (OWASA) on October 15, 2018, was assaulted by Ryuk ransomware making huge harm to the association's system and brought about various databases and systems being modified starting from the group up.
The ransomware corrupted vast quantities of endpoints and requested higher payments than what we ordinarily observe (15 to 50 Bitcoins).
https://blog.malwarebytes.com/cybercrime/malware/2019/01/ryuk-ransomware-attacks-businesses-over-the-holidays/
6
Possible
.
Cyber Security in Industry 4.0Cyber Security in Industry 4.0 (.docxdorishigh
Cyber Security in Industry 4.0
Cyber Security in Industry 4.0 (IEEE) Using Emerging Technology to Improve Compliance As cyber threats, malicious software, and cyber-attacks continue to escalate in sophistication, and no industry can remain immune to these threats. The IEEE has used industry-inspired advances in innovation and implementation to promote the highest level of cybersecurity standards for the most robustly protected information and communication technology infrastructure, from networks and telecommunication systems through websites, digital certificates, and passwords, and other software-based systems (Ardito et al., 2019). This Enhanced Canada Cybersecurity Standards and Certificates (ECCS&C) project strives to provide a common framework for enhanced cybersecurity across all sectors. The fourth industrial revolution is referred to as cybersecurity in Industry 4.0 and is encompassing three discrete components: machine learning, artificial intelligence, and automation.The effects of these four technologies will most certainly impact the processes and processes aspects of technology adoption. Over the next decade, we will most certainly see further and the further rise of robotics (Ardito et al., 2019).
The industrial revolution will begin with smart factory security systems. For now, those systems are secure, but many manufacturers will soon provide safeguards against attack and malware threats to help prevent malware attacks and lawsuits. The processes can look simple like a boiler next to a giant hexagon. For example, all these processes would trigger heating or cooling at some point, and the heating or cooling can be controlled by digital control boxes connected to a smart grid (Shi et al., 2019).
The industrial network will soon have more people connected in more complex networks, such as industrial warehouses. All of these buildings can communicate with each other and can remotely activate or deactivate automation systems to reduce manufacturing costs. The need for the defense, control, and monitoring of systems and networks. The blockchain is the most viable platform for these purposes (Shi et al., 2019). Decentralization is gaining respect and confidence on a global scale, and so there is a renewed emphasis on the blockchain in the industry. There is an abundance of articles on the blockchain's potential and benefits for companies. For example, more than fifty articles are covering the blockchain's potential for authentication, threat modeling, and development of social payment interfaces. Companies are beginning to explore smart contracts and smart systems for security, reputation, and data. All in all, it seems that all the evidence points to blockchain technology as the future of the financial industry (Shi et al., 2019).
References
Ardito, L., Petruzzelli, A. M., Panniello, U., & Garavelli, A. C. (2019). Towards Industry 4.0. Business Process Management Journal.
Shi, L., Chen, X., Wen, S., & Xiang, Y. (2019, December)..
Cyber Security Gone too farCarlos Diego LimaExce.docxdorishigh
Cyber Security Gone too far
Carlos Diego Lima
Excelsior College
BNS301 National Security Ethics and Diversity
How far is it too far when protecting the peoples' rights in cyberspace and its national security? In an ever-evolving cyber world, many states tend to infringe on citizens' cyber information privacy for their own accord. Sometimes governments overstep boundaries and bend the rules to protect the land and overstep the peoples' privacy to enforce rules and regulations. My final paper will analyze rules and regulations within the Cybersecurity realm within the United States. The National Security Strategy is a good guideline on the laws and what the U.S is looking to implement soon. This paper intends not to make conspiracy theories to show facts and existing laws and regulations on how the citizens' privacy has no longer been protected and some examples of historical events. (Snowden) had an ethical dilemma when he made his decisions. My paper will include my opinions and the bullet points below to construct a good argument on how the U.S can protect its citizens' privacy.
· National Security Strategy
· Cyber laws within the United States
· Privacy Laws
· Phone settings
· Phone Companies and laws sharing information to the government
· Internal agencies search and espionage laws
Edgar, T. H. (2017). Beyond Snowden privacy, mass surveillance, and the struggle to reform the NSA. Washington, D.C: Brookings Institution Press.
J., T. P., & Upton, D. (2016). Cyber security culture: Counteracting cyber threats through organizational learning and training. Routledge.
Miloshoska, D., & Smilkovski, I. (2016).
Http://uklo.edu.mk/filemanager/HORIZONTI 2017/Horizonti serija A volume 19/14. Security and trade facilitation - the evidence from Macedonia- Milososka, Smilkovski.pdf.
HORIZONS.A, 19, 153-163. doi:10.20544/horizons.a.19.1.16.p14
Omand, D. (2018). Principled Spying: The Ethics of Secret Intelligence. Georgetown University Pre Omand, D. (2018). Principled Spying: The Ethics of Secret Intelligence. Georgetown University Press.
Zimmerman, R. (2015). The Department of Homeland Security: Assessment, recommendations, and appropriations. New York: Nova.
Running Head: METHODS, RESULTS AND DISCUSSION 1
METHODS, RESULTS AND DISCUSSION
Kaytlin De Los Santos
Florida International University
METHODS, RESULTS AND DISCUSSION 2
Methods, Results and Discussion
Methods
Participants
One hundred and thirty-nine participants were randomly selected and requested to fill a
questionnaire during the study. Every one of the 48 researchers looked for about 3 participants
each who were strangers to them or students at FIU. The participants needed to have not taken a
psychology research methods class in the fall of 2019.
Male participants for the study were 53 which accounted 38.1% while female participants
were 86 which accounted for 61.9% of the total number of particip.
CW 1R Checklist and Feedback Sheet Student Copy Go through this.docxdorishigh
CW 1R Checklist and Feedback Sheet: Student Copy
Go through this checklist before you submit your CW 1R assessment. You can also use this sheet to make notes on your tutor’s feedback in the following areas. This information will be essential when you are improving your draft.
Tutor’s comments
Part 3
Is your referencing complete and accurate?
Part 1
Have you evaluated the required number of sources?
Have you included all the sources in your evaluation in your list?
Is it clear how you have identified your sources as reliable and appropriate for academic use? Have you considered a number of aspects eg. currency, authority, etc?
Are your sources all clearly relevant to your topic?
Have you explained the key points or identified useful data from each source? Have you explained points in your own words?
Have you noted how you will use the source in your essay? Will it support a point / provide data / offer a counter-argument?
Have you identified the relationship between the information you have read? Do articles support an argument presented in another source? Provide additional information? Offer an alternative view?
Part 2
Have you included all your sources in part 2 in your outline?
Is your introduction clear? Have you included: the background /context for your essay? An overview of the essay structure?
Is your position clear?
Does your position relate to the main body of the essay? Do all your points relate to your position?
Is the development of your argument logical throughout your outline? Do any paragraphs seem repetitive / irrelevant or out of place?
For each paragraph
Is it clear how each paragraph develops your argument?
Does each paragraph focus and develop one key point?
Is the topic sentence clear?
Do the supporting points develop the topic sentence?
Is there clear evidence / data to support your points?
Are citations included for the support you will use?
Have you used more than one source for each paragraph?
Conclusion
Does your conclusion effectively answer your question?
1
BERNICE BOBS HER HAIR
by
F. Scott Fitzgerald
After dark on Saturday night one could stand on the first tee
of the golf-course and see the country-club windows as a
yellow expanse over a very black and wavy ocean. The
waves of this ocean, so to speak, were the heads of many
curious caddies, a few of the more ingenious chauffeurs, the
golf professional's deaf sister--and there were usually several
stray, diffident waves who might have rolled inside had they
so desired. This was the gallery.
The balcony was inside. It consisted of the circle of wicker
chairs that lined the wall of the combination clubroom and
ballroom. At these Saturday-night dances it was largely
feminine; a great babel of middle-aged ladies with sharp eyes
and icy hearts behind lorgnettes and large bosoms. The main
function of the balcony was critical. It occasionally showed
grudging admira.
CW 1 Car Industry and AIby Victoria StephensonSubmission.docxdorishigh
CW 1 Car Industry and AI
by Victoria Stephenson
Submission date: 03-Jan-2020 12:53PM (UTC+0000)
Submission ID: 1239134764
File name: 14900_Victoria_Stephenson_CW_1_Car_Industry_and_AI_278016_1651532176.docx (39.1K)
Word count: 2448
Character count: 13114
Overall structure looks clear, but what is the main focus of paragraph
5?
Non-academic source
Referencing error
Good point /
s
Pt 1. Search method
issue 1
This is not the title of the article - it is 'Driving Tests Coming for Autonomous Cars'. Make sure your referencing
is accurate.
Pt 1. Search method
issue
This article does not come up on a Google Scholar
search.
G
oo
d
so
ur
ce
s
el
ec
tio
n
R
ef
er
en
ci
ng
e
rr
or
P
t 2
. C
le
ar
s
ou
rc
e
ev
al
ua
tio
n
G
oo
d
po
in
t /
s
P
t 2
. G
oo
d,
c
le
ar
in
di
ca
tio
n
of
h
ow
s
ou
rc
e
w
ill
b
e
us
ed
.
2
P
t 2
. G
oo
d,
c
le
ar
s
up
po
rt
pr
ov
id
ed
G
oo
d
so
ur
ce
s
el
ec
tio
n
P
t 2
. C
le
ar
s
ou
rc
e
ev
al
ua
tio
n
P
t 2
. G
oo
d,
c
le
ar
in
di
ca
tio
n
of
h
ow
s
ou
rc
e
w
ill
b
e
us
ed
.
P
t 2
. G
oo
d,
c
le
ar
po
in
t
P
t 2
. G
oo
d,
c
le
ar
s
up
po
rt
pr
ov
id
ed
Good point /
s
QM
QM
FINAL GRADE
60/100
CW 1 Car Industry and AI
GRADEMARK REPORT
GENERAL COMMENTS
Instructor
Source Selection: 6 (One merit criteria met; two of the
sources are less academic)
Source Evaluation and Use of Sources: 7 (Both Merit
criteria met)
Processing Text: 6.5 (mid-mark) One Distinction criteria
met - main points are all clear, support is repetitive /
less clear in places - make sure you give specific
examples / data).
Research and Understanding: 4.5 - mid-mark awarded.
Search methods are unclear / could not be followed.
Conclusions are good and clearly indicate reading has
been undertaken and understood.
24 / 40
PAGE 1
Text Comment. Overall structure looks clear, but what is the main focus of paragraph 5?
PAGE 2
Non-academic source
Remember that your sources must be reliable/trustworthy. This means they should be books,
academic journal articles, or reports from governments or international organisations. Do not use
general websites as primary sources.
Referencing error
QM
QM
QM
QM
QM
QM
QM
Check the guidelines on the cover page of this submission template to make sure you have
formatted the reference accurately.
Good point / s
Pt 1. Search method issue
You have not explained where you found your source or have used a non-academic search engine.
This is not good practice for academic study; please use either Google Scholar, StarPlus or the
reference lists of other related academic papers.
Comment 1
Google Scholar would be a better starting point, or you could follow up on research cited in the
website article to make sure that the research is academic and non-biased.
PAGE 3
Text Comment. This is not the title of the article - it is 'Driving Tests Coming for Autonomous
Cars'. Make .
CWTS
CWFT Module 7 Chapter 2
Eco-maps
1
ECO-MAPS
The eco-map helps to identify family resources at-a-glance. Areas of strength and concern are presented to assist in
creating a picture of the family’s world. Information is gathered in circles. Eco-maps are a snapshot in time.
Periodically update changes in connections to resources—especially natural familial and community resources to
maximize usefulness of the tool. The list below helps spur questions and generate deeper discussion about resources
and strengths during the initial visit.
Extended Family Medical/Health Care
Who is in the area that can be a support for you ALL family members: physical illness or disease
What kind of relationship Effects of chemical use
What kind of insurance
Income Effects of chemical use
Financial status Access to medical care
Sources of income Psychological illness, disease
Budgeting
Social Services/Resources
Friends County or Tribal/Financial Services/Child Welfare
Close – Supportive – Conflictive Names of workers
Where located Neighborhood centers
What kind of contact - frequency Agencies / counseling involved with in the past
Positive or negative experiences
Recreation
What do you do for fun Work/School
What do you do for relaxation Employment—past/present
What would you like to do What work are you interested in pursuing
Interests and / or hobbies What type of skills, vocation
What have you done in the past Degree or school until what grade
Positive or negative experiences
Spiritually/Religion
Spirituality and/or religious affiliation growing up Neighborhood
What kind of experiences did you have How long at present home
With what activities were you involved What is your neighborhood like
Current spiritual beliefs and religious affiliations Do you feel safe in your home and neighborhood
Where did you grow up, and what was it like
When showing connections with the ecomap, indicate the nature of the connections with a descriptive word or by
drawing different kinds of lines:
Strong connections: ----------
Tenuous connections: ._._._._
Stressful connections: //////
Draw arrows along the connection lines to signify the flow of energy and resources.
Identify significant people and fill in empty circles as needed. See the example Kelly Family below.
CWTS
CWFT Module 7 Chapter 2
Eco-maps
2
CHURCH/SPIRITUALITY
RECREATION
WORK/SCHOOL
FRIENDS
Extended Family/
Significant Others NEIGHBORHOOD
INCOME
SOCIAL SERVICES/
RESOURCES
NAME: ________________________
MEDICAL/
HEALTH CARE
STRENGTHS:
CONCERNS:
CWTS
CWFT Module 7 Chapter 2
Eco-maps
3
KELLY
FAMILY
Example
HEALTH CARE
EXTENDED
FAMILY
Absent father
WILLIAM
13
VERONA
9
GLORIA
14
SCHOOL
HOUSING:
Homeless
DANGEROUS
NEIGHBORHOOD
CHILD
WELFARE
(foster homes)
MFIP
BENEFITS
JOB TRAINING
Vocational
Rehabilitation
Prog.
Cw2 Marking Rubric Managerial Finance
0
Fail
2
(1-29) Fail
30-39
Fail
40-49
3rd
50-59
2:2
60-69
2:1
70+
1st
Grade Descriptors (Right)
Learning Pillars, Criterion Description and Expectations (Below)
Module Learning Outcome and Industry Competencies
Weighting
No attempt, No submission, Absent
Unsatisfactory, Poor, Week
Incomplete, Inadequate, Limited
Basic, Satisfactory, Sufficient
Appropriate, Fair, Reasonable,
Commendable, Competent, Judicious
Highly Commendable, Outstanding, Exceptional
1
Professional Skills - Executive Summary - Degree to which the executive summary explains the key themes and outcomes of the report in a one page summary
1A,1C
5%
As per grade descriptor
Poor attempt at identifying and
including key themes and/or outcomes. Is unlikely to be limited to one page only
The summary is limited in approach and
therefore incomplete. Possibly over one page in length.
Covers most of the key themes and
outcomes, basic use of information and sources, likely over one page in length.
A one page summary, which provides a
fair and appropriate executive summary to the report.
A commendable, one page summary.
Efficient structure which conveys and logically explains key themes and outcomes.
A strong one page summary. Which is
proficient in explaining key themes and outcomes. Very good structure to the summary.
2
Knowledge and Understanding:
- Introduction completeness and clarity of introduction to the organisation, background, context and rationale for the report being prepared
LO5,4A,4B,5A
10%
As per grade descriptor
Unsatisfactory introduction to the
organisation and background to report. Poor rational is presented. The scope of the report is very broad.
Incomplete introduction and/or background,
inadequate rationale for the report presented. Scope not adequately defined
Acceptable intro and/or background.
Somewhat basic rationale for the research presented. Satisfactory definition of report scope.
Appropriate introduction and/or
background. Fair rationale for the report presented. Scope reasonably well defined.
Commendable introduction and
background presented. Competent rationale presented. Scope well defined.
A strong and well articulated
introduction, the background is proficiently presented with excellent explanation of rationale to the report.
Scope very well defined.
3
Cognitive (thinking) Skills: Literature review:
Information is gathered from multiple, research- based sources. The appropriate content in consideration is covered in depth without being redundant. Sources are cited when specific statements are made. Significance to the
course is unquestionable
LO2,4A,1C,3C,3D
10%
As per grade descriptor
The literature review is
unsatisfactory in that the research content is irrelevant and/or incomplete with poor analysis and conclusions.
The literature review is inadequate in
that the research content is limited and/or incomplete with the same for it's analysis and conclusions.
The review is a.
CVPSales price per unit$75.00Variable Cost per unit$67.00Fixed C.docxdorishigh
CVPSales price per unit$75.00*Variable Cost per unit$67.00*Fixed Cost$100,000.00*Targeted Net Income$0.00*(assume 0 if you want to calculate breakeven)Calculated Volume12,500calculated* inputted by user
Social Networking Channels
Thomas Lamonte Esters
Independence University
29 September 2018
SOCIAL NETWORKING CHANNELS 1
I dislike social networking sites because of the dangerous hazards connected to it.
The ProCon article vividly describes the numerous benefits that are attached to the social networking sites such as connecting people, enhancing advertising and marketing, promoting research and education, assisting to spread information faster as compared to other media, connecting employers and employees and assisting the government to identify and prosecute criminals. These are just a few examples that the article illustrates to support the necessity of the social networking sites in the society today. According to the article, the social networking channels have significantly transformed different sectors such as businesses for the better since they can sell their products and services globally (Procon.org, 2018).
However, the detrimental effects connected with the social networking channels are also numerous and most of them may lead to permanent damage to our lives. It is very clear that the education is the backbone of our lives and also the key to success. Currently, about 69% of the American population use social media channels which is a drastic increase in the usage from 2008 where about 26% of the Americans were connected to the social media (Procon.org, 2018). Most of the social networking sites users are the youths who are in their lower grade level, colleges or even universities. The research shows that using social media when handling assignments decreases the quality of work and makes the students drop in their performance. Education is a core value to a successful life and allowing social media to intrude in the academics will be detrimental since it will lead to the production of incompetent individuals who may end up causing problems in the society (Rowell, 2015).
Moreover, the social media channels expose individuals’ to privacy problems and intrusion by any interested parties. In fact, nothing which is shared in the social media channels is private. According to the survey conducted, 81% of the people surveyed believed that social media is insecure. The government through the NSA (National Security Agencies) intrudes to people’s data and communication in social media meaning that their private information ends up in the hands of the government. Many people do not know about social media privacy settings and this means that they leave their social media accounts prone to invasion (Procon.org, 2018). Viruses such as Steck. Evl can also be propagated via the social media to cause harm to the users. Most of these viruses are spies and send users priv.
CYB207 v2Wk 4 – Assignment TemplateCYB205 v2Page 2 of 2.docxdorishigh
CYB/207 v2
Wk 4 – Assignment Template
CYB/205 v2
Page 2 of 2
NIST Risk Management Framework Step
What is the key NIST Special Publication that guides this step?
What are the typically deliverables for this step??
Who typically works on the deliverables for this step??
Step 1
Categorize
<(list NIST special pub)
(Describe the deliverable)
(List Author)
Step 2
Select
Step 3
Implement
Step 4
Assess
Step 5
Authorize
Step 6
Monitor
Copyright 2020 by University of Phoenix. All rights reserved.
Copyright 2020 by University of Phoenix. All rights reserved.
A Selection From
HAMMURABI'S CODE OF LAWS
(circa 1780 B.C.)
Translated by L. W. King
CODE OF LAWS
2. If any one bring an accusation against a man, and the accused go to the river and leap into the river, if he sink in the river his accuser shall take possession of his house. But if the river prove that the accused is not guilty, and he escape unhurt, then he who had brought the accusation shall be put to death, while he who leaped into the river shall take possession of the house that had belonged to his accuser.
3. If any one bring an accusation of any crime before the elders, and does not prove what he has charged, he shall, if it be a capital offense charged, be put to death.
6. If any one steal the property of a temple or of the court, he shall be put to death, and also the one who receives the stolen thing from him shall be put to death.
14. If any one steal the minor son of another, he shall be put to death.
15. If any one take a male or female slave of the court, or a male or female slave of a freed man, outside the city gates, he shall be put to death.
17. If any one find runaway male or female slaves in the open country and bring them to their masters, the master of the slaves shall pay him two shekels of silver.
21. If any one break a hole into a house (break in to steal), he shall be put to death before that hole and be buried.
22. If any one is committing a robbery and is caught, then he shall be put to death.
25. If fire break out in a house, and some one who comes to put it out cast his eye upon the property of the owner of the house, and take the property of the master of the house, he shall be thrown into that self-same fire.
59. If any man, without the knowledge of the owner of a garden, fell a tree in a garden he shall pay half a mina in money.
108. If a tavern-keeper (feminine) does not accept corn according to gross weight in payment of drink, but takes money, and the price of the drink is less than that of the corn, she shall be convicted and thrown into the water.
112. If any one be on a journey and entrust silver, gold, precious stones, or any movable property to another, and wish to recover it from him; if the latter do not bring all of the property to the appointed place, but appropriate it to his own use, then shall this man, who did not bring the property to hand it over, be convicted, and he shall pay fivefold for all that had been entrusted to him.
.
More Related Content
Similar to Current Events Crisis Analysis Essay This paper should be writte.docx
Windows Server Deployment ProposalOverviewEach student will .docxalanfhall8953
Windows Server Deployment Proposal
Overview
Each student will create a detailed, organized, unified technical solution given the scenario described below. The submission will be in a written format, with at least one diagram, and may include additional diagrams, charts or tables. The assignment is meant for students to enhance their mastery of the material and to provide a creative and realistic way in which to apply knowledge from this course.
Scenario
Worldwide Advertising, Inc. (referred to as “WAI”) has hired you as an IT consultant for implementing their Windows network infrastructure. WAI is a new advertising firm, and they are currently hiring staff, establishing two locations, and have a need to get their internal IT services configured. They do not yet have an IT staff, but when they do, the IT staff will take over all aspects of IT administration. You are required to supply WAI with a solution which describes the implementation and configuration of their core IT services. Cost is not a significant concern – WAI wishes to implement the “right” solution to fit their needs now and for the next 2-3 years.
There are several details about WAI which will have an impact on your choices:
· WAI will start with 110 employees, in the following departments:
· Executives (9 employees) – manage and run the company
· Accounts and Sales Department (15 employees) – perform market research and maintain accounts
· Creative, Media and Production Department (59 employees) – advertising
· Human Resources and Finances (17 employees) – perform HR and financial duties
· IT (10 employees) – manage IT for the company
· WAI will have two sites, one in Seattle and one in New York. Most staff will be located in Seattle, with at least 1 person from each of the departments above located in NY.
· Networking equipment is already in place for both sites. A secure tunnel (using IPSec) will be established between the two sites so that inter-site traffic will be securely tunneled over the Internet. You may make whatever other assumptions you wish about intra-and inter-site connectivity.
· Security mechanisms (e.g., firewalls, intrusion detection) will be handled separately, and there is no need to describe them.
· Some departments will want their data to remain private from other departments (e.g., Finances personnel will not want Production staff to see the company’s financial details). Your team may make assumptions about how data should be shared or kept private.
· Assumptions can be made regarding any information not included here; all assumptions should be identified, however.
Topics to Cover
Your document should cover the content presented in the course. The outline below contains recommended points to cover. You are free to add other related information.
Describe the technical and business reasons for each choice, citing other resources as appropriate.
The Windows Server 2012 operating system should be used for all aspects of the solution.
The topics inclu.
Teaching old dogs new tricks with Rational Developer for System iStrongback Consulting
Rolling out Rational Developer is more than just purchasing the product. In order to maximize the adoption rate of the product, you need a plan, you need executive sponsorship, and you need diligence. This covers our recommended best practices, as well as example anti-patterns that people often fall into causing their adoption rate to plummet.
CSS G11 Module 6 Q1 computer systems servicing for grade 12ASEJODEREK
This document provides information about installers preparation and operating system installation procedures. It discusses types of software installations like media-based, web-based, single executable files, and Windows Installer installations. It also describes portable installer software and applications that can be easily transferred between computers. Furthermore, it explains the Rufus application which is used to create bootable USB drives for installing operating systems using external devices.
1) The document provides steps to set up a Jenkins build server on Amazon EC2, including launching an EC2 instance, installing Jenkins, and configuring it to use EC2 instances as build slaves.
2) The steps include creating a security group to allow HTTP and SSH access, downloading and installing Jenkins on the EC2 instance, and configuring Jenkins with the Amazon EC2 plugin to enable use of EC2 instances for builds.
3) Additional resources are provided to learn more about Jenkins on AWS, including a whitepaper and links to documentation on DevOps, security groups, and key pairs.
1) The document describes the installation processes of Windows 10, Linux Ubuntu 15.04, antivirus software Kaspersky, and office software Microsoft Office 2010 on a computer system.
2) Details are provided on partitioning disks and setting up user accounts during the Linux installation. Network setup and installation of the Skype application are also documented.
3) Test plans are outlined to check the identification of distributions, device drivers, user account configuration, network connectivity, and software installation. Screenshots confirm the successful completion of tests.
4) Common faults identified on four PCs include non-working USB ports, faulty Wi-Fi connectivity, random restarting, and malfunctioning keyboard keys. Steps taken to diagnose
This document contains questions related to system administration, software development, and DevOps best practices. It covers topics such as scaling applications, handling outages, deploying software, testing systems, configuration management tools, networking, Linux, Windows, security, cloud infrastructure, databases, APIs, websites, continuous integration, source control workflows, and personal interests. The questions are designed to assess a candidate's knowledge and experience in these important technical areas.
Operating System Upgrade Implementation Report And...Julie Kwhl
- Advancements in browsers and JavaScript libraries have made Flash unnecessary for most websites, allowing richer experiences without plugins.
- As devices like phones, tablets, and smart TVs became more common, accessibility of content across different platforms became important.
- Web standards like HTML5, CSS, and JavaScript now provide many of the interactive capabilities Flash once did, in an open and consistent way across all browsers and devices.
- While Flash had its place early on, today's web favors open standards that don't require plugins and can reach all internet-connected devices. The benefits of accessibility now outweigh Flash's capabilities for most sites.
This document provides instructions for a hands-on test involving configuring two Windows Server 2008 machines - one as a domain controller and one as a member server. It includes 16 steps to configure IP addresses, install Active Directory, add a user, delegate permissions, create OUs, configure a roaming profile, and set NTFS and share permissions using the A-G-D-L-P method. The student is asked to document each step, provide screenshots as evidence of completion, and answer several questions.
Similar to Current Events Crisis Analysis Essay This paper should be writte.docx (9)
Cyber terrorism, by definition, is the politically motivated use.docxdorishigh
Cyber terrorism, by definition, is the politically motivated use of computers and information technology to cause severe disruption or widespread fear in society. The Center for Strategic and International Studies reported in March 2019 that Chinese Hackers targeted at least 27 Universities to steal Naval Technologies research, being one of many cyber-terrorist attacks. Besides these attacks, Hacktivism is a cyber-attack either by legal or illegal digital means in the pursuit of political ends, free speech, and the right of free speech. A most notable example would be the group Anonymous conducting numerous hacks from 2008 to 2012 against companies, organizations, and even governments that go against their moral codes. Behind the Tunisia Operation in 2010, Anonymous took down eight government websites with DDOS (Distributed Denial of Service) attacks in support of Arab Spring movements. Between the two Cyberterrorism is meant to instill fear and panic in society. At the same time, Hacktivism brings about a voice or an opposition to the government and other organizations to support a cause against them. Hacktivism is more politically based, pointing out flaws in the system raising awareness on our rights as human beings. Advances in technology lead to newer and different types of attacks either group can conduct. From viruses waiting for you to log into your bank account to massive-scale attacks against the banks' systems themselves, terrorists, or hacktivists, have infinite ways to infiltrate and attack for their cause. Many laws have been put in place to combat these groups, acts put in place such as Cybersecurity Information Sharing Act (CISA) or Cybersecurity Enhancement Act of 2014 helping share information and build research and development to fight against cyber-attacks. Given the push against both groups by our government, I can't help but feel concern for our rights and freedoms that may be infringed upon that our government or some corporation is doing while combating the whistleblower with Hacktivist tactics. It only keeps me and others mindful while fighting against cyberattacks that may be classified as cyberterrorism. There is a fine line on what would be a genuine noble act of hacking or something labeled as cyberterrorism placing information and lives at risk, its not so black and white as some areas can be considered grey. Thankfully some events in history, thanks to Hacktivism has brought good results that benefit society, such as Operation "Nice" which organized to hunt down the terrorist responsible for attacks in the French city, killing nearly a hundred people. Also, Operation Darknet which infiltrated 40 child pornography websites publishing 1500 plus names of frequent visitors to the sites stopping such activity. In these instances, I am for hacktivism and specific groups that act for the benefit of society and our rights as humans.
Cyberterrorism. (n.d.). Retrieved from
https://www.dictionary.com/browse/cyberterroris.
Cyber Security Threats
Yassir Nour
Dr. Fonda Ingram
ETCS-690
Cybersecurity Research Seminar
Date: 02/08/2019
1. Denial-of-Service (DoS) Attacks
A denial-of-service (DoS) is any kind of assault where the assailants (programmers) endeavor to keep real clients from getting to the service.
Programmer sends undesirable high volumes of traffic through the system until it ends up stacked and can never again work.
https://www.incapsula.com/ddos/ddos-attacks/denial-of-service.html
2
Company and summary of how the threat affected the firm
Deezer, an online music streaming service, says it was affected by a vast scale DDoS assault on June 7 through a botnet, which brought about the organization's site being down for a few hours.
https://www.theguardian.com/technology/2014/jun/10/deezer-user-data-hack-attack-ddos
3
Possible
Solution
s
These threats could been avoided by:
Reinforcing the security frameworks and servers
WAFs (Web Application Firewalls) are an incredible instrument to use against these assaults as they give you more command over your web traffic while perceiving malicious web misuses.
2. Malware
A malware assault is a sort of cyber-attack in which malware or malicious programming performs exercises on the unfortunate casualty's PC system, more often than not without his/her insight.
In straightforward words, it is a code with the expectation to takes information or obliterates something on the PC.
https://us.norton.com/internetsecurity-malware.html
5
Company and summary of how the threat affected the firm
Onslow Water and Sewer Authority (OWASA) on October 15, 2018, was assaulted by Ryuk ransomware making huge harm to the association's system and brought about various databases and systems being modified starting from the group up.
The ransomware corrupted vast quantities of endpoints and requested higher payments than what we ordinarily observe (15 to 50 Bitcoins).
https://blog.malwarebytes.com/cybercrime/malware/2019/01/ryuk-ransomware-attacks-businesses-over-the-holidays/
6
Possible
.
Cyber Security in Industry 4.0Cyber Security in Industry 4.0 (.docxdorishigh
Cyber Security in Industry 4.0
Cyber Security in Industry 4.0 (IEEE) Using Emerging Technology to Improve Compliance As cyber threats, malicious software, and cyber-attacks continue to escalate in sophistication, and no industry can remain immune to these threats. The IEEE has used industry-inspired advances in innovation and implementation to promote the highest level of cybersecurity standards for the most robustly protected information and communication technology infrastructure, from networks and telecommunication systems through websites, digital certificates, and passwords, and other software-based systems (Ardito et al., 2019). This Enhanced Canada Cybersecurity Standards and Certificates (ECCS&C) project strives to provide a common framework for enhanced cybersecurity across all sectors. The fourth industrial revolution is referred to as cybersecurity in Industry 4.0 and is encompassing three discrete components: machine learning, artificial intelligence, and automation.The effects of these four technologies will most certainly impact the processes and processes aspects of technology adoption. Over the next decade, we will most certainly see further and the further rise of robotics (Ardito et al., 2019).
The industrial revolution will begin with smart factory security systems. For now, those systems are secure, but many manufacturers will soon provide safeguards against attack and malware threats to help prevent malware attacks and lawsuits. The processes can look simple like a boiler next to a giant hexagon. For example, all these processes would trigger heating or cooling at some point, and the heating or cooling can be controlled by digital control boxes connected to a smart grid (Shi et al., 2019).
The industrial network will soon have more people connected in more complex networks, such as industrial warehouses. All of these buildings can communicate with each other and can remotely activate or deactivate automation systems to reduce manufacturing costs. The need for the defense, control, and monitoring of systems and networks. The blockchain is the most viable platform for these purposes (Shi et al., 2019). Decentralization is gaining respect and confidence on a global scale, and so there is a renewed emphasis on the blockchain in the industry. There is an abundance of articles on the blockchain's potential and benefits for companies. For example, more than fifty articles are covering the blockchain's potential for authentication, threat modeling, and development of social payment interfaces. Companies are beginning to explore smart contracts and smart systems for security, reputation, and data. All in all, it seems that all the evidence points to blockchain technology as the future of the financial industry (Shi et al., 2019).
References
Ardito, L., Petruzzelli, A. M., Panniello, U., & Garavelli, A. C. (2019). Towards Industry 4.0. Business Process Management Journal.
Shi, L., Chen, X., Wen, S., & Xiang, Y. (2019, December)..
Cyber Security Gone too farCarlos Diego LimaExce.docxdorishigh
Cyber Security Gone too far
Carlos Diego Lima
Excelsior College
BNS301 National Security Ethics and Diversity
How far is it too far when protecting the peoples' rights in cyberspace and its national security? In an ever-evolving cyber world, many states tend to infringe on citizens' cyber information privacy for their own accord. Sometimes governments overstep boundaries and bend the rules to protect the land and overstep the peoples' privacy to enforce rules and regulations. My final paper will analyze rules and regulations within the Cybersecurity realm within the United States. The National Security Strategy is a good guideline on the laws and what the U.S is looking to implement soon. This paper intends not to make conspiracy theories to show facts and existing laws and regulations on how the citizens' privacy has no longer been protected and some examples of historical events. (Snowden) had an ethical dilemma when he made his decisions. My paper will include my opinions and the bullet points below to construct a good argument on how the U.S can protect its citizens' privacy.
· National Security Strategy
· Cyber laws within the United States
· Privacy Laws
· Phone settings
· Phone Companies and laws sharing information to the government
· Internal agencies search and espionage laws
Edgar, T. H. (2017). Beyond Snowden privacy, mass surveillance, and the struggle to reform the NSA. Washington, D.C: Brookings Institution Press.
J., T. P., & Upton, D. (2016). Cyber security culture: Counteracting cyber threats through organizational learning and training. Routledge.
Miloshoska, D., & Smilkovski, I. (2016).
Http://uklo.edu.mk/filemanager/HORIZONTI 2017/Horizonti serija A volume 19/14. Security and trade facilitation - the evidence from Macedonia- Milososka, Smilkovski.pdf.
HORIZONS.A, 19, 153-163. doi:10.20544/horizons.a.19.1.16.p14
Omand, D. (2018). Principled Spying: The Ethics of Secret Intelligence. Georgetown University Pre Omand, D. (2018). Principled Spying: The Ethics of Secret Intelligence. Georgetown University Press.
Zimmerman, R. (2015). The Department of Homeland Security: Assessment, recommendations, and appropriations. New York: Nova.
Running Head: METHODS, RESULTS AND DISCUSSION 1
METHODS, RESULTS AND DISCUSSION
Kaytlin De Los Santos
Florida International University
METHODS, RESULTS AND DISCUSSION 2
Methods, Results and Discussion
Methods
Participants
One hundred and thirty-nine participants were randomly selected and requested to fill a
questionnaire during the study. Every one of the 48 researchers looked for about 3 participants
each who were strangers to them or students at FIU. The participants needed to have not taken a
psychology research methods class in the fall of 2019.
Male participants for the study were 53 which accounted 38.1% while female participants
were 86 which accounted for 61.9% of the total number of particip.
CW 1R Checklist and Feedback Sheet Student Copy Go through this.docxdorishigh
CW 1R Checklist and Feedback Sheet: Student Copy
Go through this checklist before you submit your CW 1R assessment. You can also use this sheet to make notes on your tutor’s feedback in the following areas. This information will be essential when you are improving your draft.
Tutor’s comments
Part 3
Is your referencing complete and accurate?
Part 1
Have you evaluated the required number of sources?
Have you included all the sources in your evaluation in your list?
Is it clear how you have identified your sources as reliable and appropriate for academic use? Have you considered a number of aspects eg. currency, authority, etc?
Are your sources all clearly relevant to your topic?
Have you explained the key points or identified useful data from each source? Have you explained points in your own words?
Have you noted how you will use the source in your essay? Will it support a point / provide data / offer a counter-argument?
Have you identified the relationship between the information you have read? Do articles support an argument presented in another source? Provide additional information? Offer an alternative view?
Part 2
Have you included all your sources in part 2 in your outline?
Is your introduction clear? Have you included: the background /context for your essay? An overview of the essay structure?
Is your position clear?
Does your position relate to the main body of the essay? Do all your points relate to your position?
Is the development of your argument logical throughout your outline? Do any paragraphs seem repetitive / irrelevant or out of place?
For each paragraph
Is it clear how each paragraph develops your argument?
Does each paragraph focus and develop one key point?
Is the topic sentence clear?
Do the supporting points develop the topic sentence?
Is there clear evidence / data to support your points?
Are citations included for the support you will use?
Have you used more than one source for each paragraph?
Conclusion
Does your conclusion effectively answer your question?
1
BERNICE BOBS HER HAIR
by
F. Scott Fitzgerald
After dark on Saturday night one could stand on the first tee
of the golf-course and see the country-club windows as a
yellow expanse over a very black and wavy ocean. The
waves of this ocean, so to speak, were the heads of many
curious caddies, a few of the more ingenious chauffeurs, the
golf professional's deaf sister--and there were usually several
stray, diffident waves who might have rolled inside had they
so desired. This was the gallery.
The balcony was inside. It consisted of the circle of wicker
chairs that lined the wall of the combination clubroom and
ballroom. At these Saturday-night dances it was largely
feminine; a great babel of middle-aged ladies with sharp eyes
and icy hearts behind lorgnettes and large bosoms. The main
function of the balcony was critical. It occasionally showed
grudging admira.
CW 1 Car Industry and AIby Victoria StephensonSubmission.docxdorishigh
CW 1 Car Industry and AI
by Victoria Stephenson
Submission date: 03-Jan-2020 12:53PM (UTC+0000)
Submission ID: 1239134764
File name: 14900_Victoria_Stephenson_CW_1_Car_Industry_and_AI_278016_1651532176.docx (39.1K)
Word count: 2448
Character count: 13114
Overall structure looks clear, but what is the main focus of paragraph
5?
Non-academic source
Referencing error
Good point /
s
Pt 1. Search method
issue 1
This is not the title of the article - it is 'Driving Tests Coming for Autonomous Cars'. Make sure your referencing
is accurate.
Pt 1. Search method
issue
This article does not come up on a Google Scholar
search.
G
oo
d
so
ur
ce
s
el
ec
tio
n
R
ef
er
en
ci
ng
e
rr
or
P
t 2
. C
le
ar
s
ou
rc
e
ev
al
ua
tio
n
G
oo
d
po
in
t /
s
P
t 2
. G
oo
d,
c
le
ar
in
di
ca
tio
n
of
h
ow
s
ou
rc
e
w
ill
b
e
us
ed
.
2
P
t 2
. G
oo
d,
c
le
ar
s
up
po
rt
pr
ov
id
ed
G
oo
d
so
ur
ce
s
el
ec
tio
n
P
t 2
. C
le
ar
s
ou
rc
e
ev
al
ua
tio
n
P
t 2
. G
oo
d,
c
le
ar
in
di
ca
tio
n
of
h
ow
s
ou
rc
e
w
ill
b
e
us
ed
.
P
t 2
. G
oo
d,
c
le
ar
po
in
t
P
t 2
. G
oo
d,
c
le
ar
s
up
po
rt
pr
ov
id
ed
Good point /
s
QM
QM
FINAL GRADE
60/100
CW 1 Car Industry and AI
GRADEMARK REPORT
GENERAL COMMENTS
Instructor
Source Selection: 6 (One merit criteria met; two of the
sources are less academic)
Source Evaluation and Use of Sources: 7 (Both Merit
criteria met)
Processing Text: 6.5 (mid-mark) One Distinction criteria
met - main points are all clear, support is repetitive /
less clear in places - make sure you give specific
examples / data).
Research and Understanding: 4.5 - mid-mark awarded.
Search methods are unclear / could not be followed.
Conclusions are good and clearly indicate reading has
been undertaken and understood.
24 / 40
PAGE 1
Text Comment. Overall structure looks clear, but what is the main focus of paragraph 5?
PAGE 2
Non-academic source
Remember that your sources must be reliable/trustworthy. This means they should be books,
academic journal articles, or reports from governments or international organisations. Do not use
general websites as primary sources.
Referencing error
QM
QM
QM
QM
QM
QM
QM
Check the guidelines on the cover page of this submission template to make sure you have
formatted the reference accurately.
Good point / s
Pt 1. Search method issue
You have not explained where you found your source or have used a non-academic search engine.
This is not good practice for academic study; please use either Google Scholar, StarPlus or the
reference lists of other related academic papers.
Comment 1
Google Scholar would be a better starting point, or you could follow up on research cited in the
website article to make sure that the research is academic and non-biased.
PAGE 3
Text Comment. This is not the title of the article - it is 'Driving Tests Coming for Autonomous
Cars'. Make .
CWTS
CWFT Module 7 Chapter 2
Eco-maps
1
ECO-MAPS
The eco-map helps to identify family resources at-a-glance. Areas of strength and concern are presented to assist in
creating a picture of the family’s world. Information is gathered in circles. Eco-maps are a snapshot in time.
Periodically update changes in connections to resources—especially natural familial and community resources to
maximize usefulness of the tool. The list below helps spur questions and generate deeper discussion about resources
and strengths during the initial visit.
Extended Family Medical/Health Care
Who is in the area that can be a support for you ALL family members: physical illness or disease
What kind of relationship Effects of chemical use
What kind of insurance
Income Effects of chemical use
Financial status Access to medical care
Sources of income Psychological illness, disease
Budgeting
Social Services/Resources
Friends County or Tribal/Financial Services/Child Welfare
Close – Supportive – Conflictive Names of workers
Where located Neighborhood centers
What kind of contact - frequency Agencies / counseling involved with in the past
Positive or negative experiences
Recreation
What do you do for fun Work/School
What do you do for relaxation Employment—past/present
What would you like to do What work are you interested in pursuing
Interests and / or hobbies What type of skills, vocation
What have you done in the past Degree or school until what grade
Positive or negative experiences
Spiritually/Religion
Spirituality and/or religious affiliation growing up Neighborhood
What kind of experiences did you have How long at present home
With what activities were you involved What is your neighborhood like
Current spiritual beliefs and religious affiliations Do you feel safe in your home and neighborhood
Where did you grow up, and what was it like
When showing connections with the ecomap, indicate the nature of the connections with a descriptive word or by
drawing different kinds of lines:
Strong connections: ----------
Tenuous connections: ._._._._
Stressful connections: //////
Draw arrows along the connection lines to signify the flow of energy and resources.
Identify significant people and fill in empty circles as needed. See the example Kelly Family below.
CWTS
CWFT Module 7 Chapter 2
Eco-maps
2
CHURCH/SPIRITUALITY
RECREATION
WORK/SCHOOL
FRIENDS
Extended Family/
Significant Others NEIGHBORHOOD
INCOME
SOCIAL SERVICES/
RESOURCES
NAME: ________________________
MEDICAL/
HEALTH CARE
STRENGTHS:
CONCERNS:
CWTS
CWFT Module 7 Chapter 2
Eco-maps
3
KELLY
FAMILY
Example
HEALTH CARE
EXTENDED
FAMILY
Absent father
WILLIAM
13
VERONA
9
GLORIA
14
SCHOOL
HOUSING:
Homeless
DANGEROUS
NEIGHBORHOOD
CHILD
WELFARE
(foster homes)
MFIP
BENEFITS
JOB TRAINING
Vocational
Rehabilitation
Prog.
Cw2 Marking Rubric Managerial Finance
0
Fail
2
(1-29) Fail
30-39
Fail
40-49
3rd
50-59
2:2
60-69
2:1
70+
1st
Grade Descriptors (Right)
Learning Pillars, Criterion Description and Expectations (Below)
Module Learning Outcome and Industry Competencies
Weighting
No attempt, No submission, Absent
Unsatisfactory, Poor, Week
Incomplete, Inadequate, Limited
Basic, Satisfactory, Sufficient
Appropriate, Fair, Reasonable,
Commendable, Competent, Judicious
Highly Commendable, Outstanding, Exceptional
1
Professional Skills - Executive Summary - Degree to which the executive summary explains the key themes and outcomes of the report in a one page summary
1A,1C
5%
As per grade descriptor
Poor attempt at identifying and
including key themes and/or outcomes. Is unlikely to be limited to one page only
The summary is limited in approach and
therefore incomplete. Possibly over one page in length.
Covers most of the key themes and
outcomes, basic use of information and sources, likely over one page in length.
A one page summary, which provides a
fair and appropriate executive summary to the report.
A commendable, one page summary.
Efficient structure which conveys and logically explains key themes and outcomes.
A strong one page summary. Which is
proficient in explaining key themes and outcomes. Very good structure to the summary.
2
Knowledge and Understanding:
- Introduction completeness and clarity of introduction to the organisation, background, context and rationale for the report being prepared
LO5,4A,4B,5A
10%
As per grade descriptor
Unsatisfactory introduction to the
organisation and background to report. Poor rational is presented. The scope of the report is very broad.
Incomplete introduction and/or background,
inadequate rationale for the report presented. Scope not adequately defined
Acceptable intro and/or background.
Somewhat basic rationale for the research presented. Satisfactory definition of report scope.
Appropriate introduction and/or
background. Fair rationale for the report presented. Scope reasonably well defined.
Commendable introduction and
background presented. Competent rationale presented. Scope well defined.
A strong and well articulated
introduction, the background is proficiently presented with excellent explanation of rationale to the report.
Scope very well defined.
3
Cognitive (thinking) Skills: Literature review:
Information is gathered from multiple, research- based sources. The appropriate content in consideration is covered in depth without being redundant. Sources are cited when specific statements are made. Significance to the
course is unquestionable
LO2,4A,1C,3C,3D
10%
As per grade descriptor
The literature review is
unsatisfactory in that the research content is irrelevant and/or incomplete with poor analysis and conclusions.
The literature review is inadequate in
that the research content is limited and/or incomplete with the same for it's analysis and conclusions.
The review is a.
CVPSales price per unit$75.00Variable Cost per unit$67.00Fixed C.docxdorishigh
CVPSales price per unit$75.00*Variable Cost per unit$67.00*Fixed Cost$100,000.00*Targeted Net Income$0.00*(assume 0 if you want to calculate breakeven)Calculated Volume12,500calculated* inputted by user
Social Networking Channels
Thomas Lamonte Esters
Independence University
29 September 2018
SOCIAL NETWORKING CHANNELS 1
I dislike social networking sites because of the dangerous hazards connected to it.
The ProCon article vividly describes the numerous benefits that are attached to the social networking sites such as connecting people, enhancing advertising and marketing, promoting research and education, assisting to spread information faster as compared to other media, connecting employers and employees and assisting the government to identify and prosecute criminals. These are just a few examples that the article illustrates to support the necessity of the social networking sites in the society today. According to the article, the social networking channels have significantly transformed different sectors such as businesses for the better since they can sell their products and services globally (Procon.org, 2018).
However, the detrimental effects connected with the social networking channels are also numerous and most of them may lead to permanent damage to our lives. It is very clear that the education is the backbone of our lives and also the key to success. Currently, about 69% of the American population use social media channels which is a drastic increase in the usage from 2008 where about 26% of the Americans were connected to the social media (Procon.org, 2018). Most of the social networking sites users are the youths who are in their lower grade level, colleges or even universities. The research shows that using social media when handling assignments decreases the quality of work and makes the students drop in their performance. Education is a core value to a successful life and allowing social media to intrude in the academics will be detrimental since it will lead to the production of incompetent individuals who may end up causing problems in the society (Rowell, 2015).
Moreover, the social media channels expose individuals’ to privacy problems and intrusion by any interested parties. In fact, nothing which is shared in the social media channels is private. According to the survey conducted, 81% of the people surveyed believed that social media is insecure. The government through the NSA (National Security Agencies) intrudes to people’s data and communication in social media meaning that their private information ends up in the hands of the government. Many people do not know about social media privacy settings and this means that they leave their social media accounts prone to invasion (Procon.org, 2018). Viruses such as Steck. Evl can also be propagated via the social media to cause harm to the users. Most of these viruses are spies and send users priv.
CYB207 v2Wk 4 – Assignment TemplateCYB205 v2Page 2 of 2.docxdorishigh
CYB/207 v2
Wk 4 – Assignment Template
CYB/205 v2
Page 2 of 2
NIST Risk Management Framework Step
What is the key NIST Special Publication that guides this step?
What are the typically deliverables for this step??
Who typically works on the deliverables for this step??
Step 1
Categorize
<(list NIST special pub)
(Describe the deliverable)
(List Author)
Step 2
Select
Step 3
Implement
Step 4
Assess
Step 5
Authorize
Step 6
Monitor
Copyright 2020 by University of Phoenix. All rights reserved.
Copyright 2020 by University of Phoenix. All rights reserved.
A Selection From
HAMMURABI'S CODE OF LAWS
(circa 1780 B.C.)
Translated by L. W. King
CODE OF LAWS
2. If any one bring an accusation against a man, and the accused go to the river and leap into the river, if he sink in the river his accuser shall take possession of his house. But if the river prove that the accused is not guilty, and he escape unhurt, then he who had brought the accusation shall be put to death, while he who leaped into the river shall take possession of the house that had belonged to his accuser.
3. If any one bring an accusation of any crime before the elders, and does not prove what he has charged, he shall, if it be a capital offense charged, be put to death.
6. If any one steal the property of a temple or of the court, he shall be put to death, and also the one who receives the stolen thing from him shall be put to death.
14. If any one steal the minor son of another, he shall be put to death.
15. If any one take a male or female slave of the court, or a male or female slave of a freed man, outside the city gates, he shall be put to death.
17. If any one find runaway male or female slaves in the open country and bring them to their masters, the master of the slaves shall pay him two shekels of silver.
21. If any one break a hole into a house (break in to steal), he shall be put to death before that hole and be buried.
22. If any one is committing a robbery and is caught, then he shall be put to death.
25. If fire break out in a house, and some one who comes to put it out cast his eye upon the property of the owner of the house, and take the property of the master of the house, he shall be thrown into that self-same fire.
59. If any man, without the knowledge of the owner of a garden, fell a tree in a garden he shall pay half a mina in money.
108. If a tavern-keeper (feminine) does not accept corn according to gross weight in payment of drink, but takes money, and the price of the drink is less than that of the corn, she shall be convicted and thrown into the water.
112. If any one be on a journey and entrust silver, gold, precious stones, or any movable property to another, and wish to recover it from him; if the latter do not bring all of the property to the appointed place, but appropriate it to his own use, then shall this man, who did not bring the property to hand it over, be convicted, and he shall pay fivefold for all that had been entrusted to him.
.
CUSTOMER SERVICE- TRAINIG PROGRAM
2
TABLE OF CONTENTS
Introduction ------------------------------------------------------------------------------------------------------------3
Training Needs Analysis ---------------------------------------------------------------------------------------------4
Training Design -------------------------------------------------------------------------------------------------------9
Training Objectives --------------------------------------------------------------------------------------------------10
Training Methods ----------------------------------------------------------------------------------------------------11
Training Development ----------------------------------------------------------------------------------------------13
Training Evaluation -------------------------------------------------------------------------------------------------14
Appendix I ------------------------------------------------------------------------------------------------------------16
References ------------------------------------------------------------------------------------------------------------17
3
INTRODUCTION
Background
In contrast to Walmart’s ability in maintaining leadership as a multinational retail aiming sustainability,
corporate philanthropy and employment opportunity, the company is falling behind in terms of customer
service satisfaction. Despite to the effort of Walmart’s executives throughout these years, in building a better
relationship with their customers, it seems they remain still unsuccessful. This can be measured as their
satisfaction rating levels are still extremely low when compared to other businesses in the same industry. Per
the American Customer Satisfaction Index (ACSI) annual ranking for 2016, Walmart, “still between one of
the 10 companies with the worst customer satisfaction”. (Tim Denman-March 01, 2016)
Since we all recognize the crucial importance that represents to any business keeping their customers happy,
not only with the price of the product but most important with the service provided. I will create a training
plan mainly focused in the delivery of effective customer service practices for all Walmart customer services
associates. This training program will provide to all Walmart’s new hires and current associates the
opportunity of not only learning, but also expanding, reinforcing and creating consistency of their knowledge
on how to deal with customers in different situations. How to improve happiness for the customers while
shopping and how to improve the associate’s customer service attitude and efficiency with the goal of
offering an outstanding service. Ultimately, to achieve delivering an enjoyable shopping experience to all
Walmart’s clients. This training will be presented in five different modules; each module will represent a
fundamental aspect inside of customer service job in order to make the associates.
Customer Service Test (Chapter 6 - 10)Name Multiple Choice.docxdorishigh
Customer Service
Test (Chapter 6 - 10)
Name:
Multiple Choice Questions (3 points each – please highlight your response)
1) ____ The Regional Sales Manager of a medical device company is an assertive person who proactively engages in confrontational dialogue during sales meetings of his company. Being a forceful businessman, he prefers firm handshakes in his interactions and is inclined to project a confident, arrogant demeanor. He is most likely to prefer what personality style:
a. Inquisitive
b. Rational
c. Expressive
d. Decisive
2) ____ An individual who favors solitary leisure activities over people-oriented activities is most likely to adopt what personality style:
a. Decisive
b. Expressive
c. Inquisitive
d. Rational
3) ____ People who adopt the inquisitive style differ from people who adopt the expressive style in that the former tends to be more like which of the following:
a. Volunteers feelings freely
b. Be very punctual and time conscious
c. Enjoys engaging individuals in person
d. Prefers informality and closeness in interactions
4) ____ A customer approaches a salesperson to discuss details of a product he is interested in. Given her preference for the expressive style, which of the following would the customer likely be interested in:
a. The bottom line of using the product
b. Instructions that discuss the use of the product
c. Questions related to rebates and other technical information
d. The color and sizes that the product is available in
5) ____ A good way to establish good relationships with an internal customer is to:
a. Tell your co-worker about all your work and family challenges
b. Wear strong fragrances to make sure you get noticed
c. Stay connected by stopping by their work area periodically
d. Forward your calls to him/her when you are away from your desk
6) ____ One strategy for dealing with talkative customers is to:
a. Ignore all the other customers while listening to them
b. Roll your eyes and look away
c. Direct them to your co-workers
d. Used closed-end questions to guide the conversation
7) ____ Which of the following is the last step of the problem solving model:
a. Evaluate the alternatives
b. Identify the alternatives
c. Monitor the results
d. Make a decision
8) ____ The Customer Experience Representative is confronted by an upset customers and uses a problem solving model to address the issue. She first identified the problem. The next step she should take is:
a. Monitor the results
b. Identify the alternatives
c. Make a decision
d. Evaluate the alternatives
9) ____ The last step of the service recover process is:
a. Show compassion
b. Conduct a follow up
c. Take further action
d. Apologize another time
10) ____ Which of the following statements is an example of an individualistic culture:
a. A country that provides all of it citizens with complete healthcare
b. A native tribe whose members pursue personal goals over the tribe’s
c. An ethnic group that runs all its decis.
Customer Value Funnel Questions1. Identify the relevant .docxdorishigh
Customer Value Funnel Questions
1. Identify the relevant macroenvironmental factors (level 1). What impact do these issues have on the focal organization?
2. Discuss the market factors (level 2). How do collaboration, competition, suppliers and regulators affect the performance of the focal organization?
.
Customer service is something that we have all heard of and have som.docxdorishigh
Customer service is something that we have all heard of and have some degree of familiarity with. However, customer service issues are a frequent complaint amongst customers. Using the Internet or another resource identify an organization with a reputation in customer service excellence. Then find another that has had a long history of customer service issues and complaints.
How do organizations promote customer service excellence?
What are the effects of poor customer service?
How does quality tie into customer service?
How can organizations improve their customer service models?
.
Customer requests are:
Proposed Cloud Architecture (5 pages needed from step 1 to step 5)
Final Report Evaluating AWS and Azure Providers (5 pages (step1 to5) + 2 pages from step 6 to 7 = the final report would be 7 pages), also you will find
the template for the final
report is on the last pages
Below are the instructions
Since you have become familiar with the foundations of cloud computing technologies, along with their risks and the legal and compliance issues, you will now explore cloud offerings of popular cloud providers and evaluate them to recommend one that would be the best fit for BallotOnline.
In this project, you will first learn about networking in the cloud and auxiliary cloud services provided by cloud vendors. Next, you will explore cloud computing trends, best practices, and issues involved in migrating IT deployments to the cloud, as well as typical architectures of cloud deployments. Then, you will apply your findings to propose a general architecture for BallotOnline’s cloud deployment to best address the company’s business requirements.
Once you have selected a deployment architecture, you will research two leading cloud vendors: Amazon Web Services (AWS) and Microsoft Azure. Exploring and comparing the tools available for application migration will enable you to recommend a vendor to the executives in your final report. The final deliverable is a written report to BallotOnline management, describing the results of your research and recommending the cloud deployment architecture and the vendor for its deployment, with justification.
Your final report should demonstrate that you understand the IT needs of the organization as you evaluate and select cloud providers. The report should include your insights on the appropriate direction to take to handle the company’s IT business needs. You will also be assessed on the ability to integrate relevant risk, policy, and compliance consideration into the recommendations, as well as the clarity of your writing and a demonstration of logical, step-by-step decision making to formulate and justify your ideas.
Check the
Project 3 FAQ thread
in the discussion area for any last-minute updates or clarifications about the project.
Step 1: Research Networking and Auxiliary Services in the Cloud
The executives at BallotOnline have been impressed with your research on cloud computing thus far. While there are a variety of
cloud providers
, BallotOnline is considering using Amazon Web Services (AWS) and Microsoft Azure, two of the top providers in the market. BallotOnline's executives want you to help determine which would be the best provider for the organization.
You will start with learning about
internet networking basics
and
cloud networking
. You will also research many
cloud services
that cloud providers make available to their customers to help them take full advantage of cloud service and deployment models.
Step 2: Research Cloud Trends, Best Practices, and Mig.
Customer Relationship Management
Presented By:
Shan Gu
Cristobal Vaca
Amber Vargas
Jasmine Villasenor- Team Leader
Xiaoqi Zhou
1
IST 309
Professor He
Group 10
3/18/20
23-25 minute presentation
Overview
Introduction to Customer Relationship Management (CRM)
Objectives of CRM
Different forms of CRM
Examples of businesses that use CRM
The problem, context, & architecture of CRM
The state of art & current best practices of CRM
Advantages and Disadvantages of CRM
Recommendations
2
Introduction to CRM
Customer relationship management (CRM) is an approach to manage a company's interaction with current and potential customers
It’s seen as both an organizational strategy & information technology
Takes form in various systems and applications
Builds sustainable long-term customer relationships that create value for both the company and it’s customers
Contributes to customer retention & expansion of their relationships with advantageous existing customers
Obtains new customers
3
It uses data analysis about customers' history with a company to improve business relationships with customers, specifically focusing on customer retention and ultimately driving sales growth.
CRM helps companies acquire new customers and retain and expand their relationships with profitable existing customers. Retaining customers is particularly important because repeat customers are the largest generator of revenue for an enterprise. Also, organizations have long understood that winning back a customer who has switched to a competitor is vastly more expensive than keeping that customer satisfied in the first place.
The goal is simple: Improve business relationships. A CRM system helps companies stay connected to customers, streamline processes, and improve profitability.
Objectives
Who is CRM for?
Large businesses
Small businesses
Customers of both types of businesses listed above
4
Key Features:
stay connected to customers
streamline processes
provide visibility & easy access to data
improve efficiency & profitability
How does CRM benefit businesses?
Provides a clear overview of your customers
Can be used as both a sales and marketing tool
Contributes information from HR → Customer service → Supply-chain management
A CRM system gives eve#ryone — from sales, customer service, business development, recruiting, marketing, or any other line of business — a better way to manage the external interactions and relationships that drive success. A CRM tool lets you store customer and prospect contact information, identify sales opportunities, record service issues, and manage marketing campaigns, all in one central location — and make information about every customer interaction available to anyone at your company who might need it.
Some of the biggest gains in productivity can come from moving beyond CRM as a sales and marketing tool, and embedding it in your business – from HR to customer services and supply-chain management.
E.
Custom Vans Inc. Custom Vans Inc. specializes in converting st.docxdorishigh
Custom Vans Inc. Custom Vans Inc
. specializes in converting standard vans into campers. Depending on the amount of work and customizing to be done, the customizing could cost less than $1,000 to more than $5,000. In less than four years, Tony Rizzo was able to expand his small operation in Gary, Indiana, to other major outlets in Chicago, Milwaukee, Minneapolis, and Detroit.
Innovation was the major factor in Tony’ s success in converting a small van shop into one of the largest and most profitable custom van operations in the Midwest. Tony seemed to have a special ability to design and develop unique features and devices that were always in high demand by van owners. An example was Shower-Rific, which Tony developed only six months after he started Custom Vans Inc. These small showers were completely self-contained, and they could be placed in almost any type of van and in a number of different locations within a van. Shower-Rific was made of fiberglass and contained towel racks, built-in soap and shampoo holders, and a unique plastic door. Each Shower-Rific took 2 gallons of fiberglass and 3 hours of labor to manufacture.
Most of the Shower-Rifics were manufactured in Gary, in the same warehouse where Custom Vans Inc. was founded. The manufacturing plant in Gary could produce 300 Shower-Rifics in a month, but that capacity never seemed to be enough. Custom Vans shops in all locations were complaining about not getting enough Shower-Rifics, and because Minneapolis was farther away from Gary than the other locations, Tony was always inclined to ship Shower-Rifics to the other locations before Minneapolis. This infuriated the manager of Custom Vans at Minneapolis, and after many heated discussions, Tony decided to start another manufacturing plant for Shower-Rifics at Fort Wayne, Indiana.
The manufacturing plant at Fort Wayne could produce 150 Shower-Rifics per month. The manufacturing plant at Fort Wayne was still not able to meet current demand for Shower-Rifics, and Tony knew that the demand for his unique camper shower would grow rapidly in the next year. After consulting with his lawyer and banker, Tony concluded that he should open two new manufacturing plants as soon as possible. Each plant would have the same capacity as the Fort Wayne manufacturing plant. An initial investigation into possible manufacturing locations was made, and Tony decided that the two new plants should be located in Detroit, Michigan; Rockford, Illinois; or Madison, Wisconsin. Tony knew that selecting the best location for the two new manufacturing plants would be difficult. Transportation costs and demands for the various locations were important considerations.
The Chicago shop was managed by Bill Burch. This Custom Vans shop was one of the first established by Tony, and it continued to outperform the other locations. The manufacturing plant at Gary was supplying the Chicago shop with 200 Shower-Rifics each month, although Bill knew that the demand for the.
🔥🔥🔥🔥🔥🔥🔥🔥🔥
إضغ بين إيديكم من أقوى الملازم التي صممتها
ملزمة تشريح الجهاز الهيكلي (نظري 3)
💀💀💀💀💀💀💀💀💀💀
تتميز هذهِ الملزمة بعِدة مُميزات :
1- مُترجمة ترجمة تُناسب جميع المستويات
2- تحتوي على 78 رسم توضيحي لكل كلمة موجودة بالملزمة (لكل كلمة !!!!)
#فهم_ماكو_درخ
3- دقة الكتابة والصور عالية جداً جداً جداً
4- هُنالك بعض المعلومات تم توضيحها بشكل تفصيلي جداً (تُعتبر لدى الطالب أو الطالبة بإنها معلومات مُبهمة ومع ذلك تم توضيح هذهِ المعلومات المُبهمة بشكل تفصيلي جداً
5- الملزمة تشرح نفسها ب نفسها بس تكلك تعال اقراني
6- تحتوي الملزمة في اول سلايد على خارطة تتضمن جميع تفرُعات معلومات الجهاز الهيكلي المذكورة في هذهِ الملزمة
واخيراً هذهِ الملزمة حلالٌ عليكم وإتمنى منكم إن تدعولي بالخير والصحة والعافية فقط
كل التوفيق زملائي وزميلاتي ، زميلكم محمد الذهبي 💊💊
🔥🔥🔥🔥🔥🔥🔥🔥🔥
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxOH TEIK BIN
(A Free eBook comprising 3 Sets of Presentation of a selection of Puzzles, Brain Teasers and Thinking Problems to exercise both the mind and the Right and Left Brain. To help keep the mind and brain fit and healthy. Good for both the young and old alike.
Answers are given for all the puzzles and problems.)
With Metta,
Bro. Oh Teik Bin 🙏🤓🤔🥰
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...indexPub
The recent surge in pro-Palestine student activism has prompted significant responses from universities, ranging from negotiations and divestment commitments to increased transparency about investments in companies supporting the war on Gaza. This activism has led to the cessation of student encampments but also highlighted the substantial sacrifices made by students, including academic disruptions and personal risks. The primary drivers of these protests are poor university administration, lack of transparency, and inadequate communication between officials and students. This study examines the profound emotional, psychological, and professional impacts on students engaged in pro-Palestine protests, focusing on Generation Z's (Gen-Z) activism dynamics. This paper explores the significant sacrifices made by these students and even the professors supporting the pro-Palestine movement, with a focus on recent global movements. Through an in-depth analysis of printed and electronic media, the study examines the impacts of these sacrifices on the academic and personal lives of those involved. The paper highlights examples from various universities, demonstrating student activism's long-term and short-term effects, including disciplinary actions, social backlash, and career implications. The researchers also explore the broader implications of student sacrifices. The findings reveal that these sacrifices are driven by a profound commitment to justice and human rights, and are influenced by the increasing availability of information, peer interactions, and personal convictions. The study also discusses the broader implications of this activism, comparing it to historical precedents and assessing its potential to influence policy and public opinion. The emotional and psychological toll on student activists is significant, but their sense of purpose and community support mitigates some of these challenges. However, the researchers call for acknowledging the broader Impact of these sacrifices on the future global movement of FreePalestine.
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 𝟏)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐄𝐏𝐏 𝐂𝐮𝐫𝐫𝐢𝐜𝐮𝐥𝐮𝐦 𝐢𝐧 𝐭𝐡𝐞 𝐏𝐡𝐢𝐥𝐢𝐩𝐩𝐢𝐧𝐞𝐬:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐍𝐚𝐭𝐮𝐫𝐞 𝐚𝐧𝐝 𝐒𝐜𝐨𝐩𝐞 𝐨𝐟 𝐚𝐧 𝐄𝐧𝐭𝐫𝐞𝐩𝐫𝐞𝐧𝐞𝐮𝐫:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
Current Events Crisis Analysis Essay This paper should be writte.docx
1. Current Events Crisis Analysis Essay
This paper should be written in an APA-Style format.
Your paper will be evaluated on the following:
· Content
· Grammar
· Structure and mechanics
· Relevance to the topic(s)
Note: Each essay will be submitted through Canvas
Current Events Crisis Analysis:
This assignment requires students to identify and examine a
current example of a crisis taken from the news. Students will
analyze various elements for consideration and apply course
concepts. Students will critique the company/individual in terms
of what was done well and what perhaps could have been
orchestrated better and why.
Instructions:
Write about a company or industry that has faced or currently
faces a crisis (or that is grappling with an issue which threatens
to become a crisis.)
Include the following components: 1) analyze the underlying
causation); 2) a stakeholder analysis; 3) review what the
organization did in response, and 4) evaluate its effectiveness
and determine whether other approaches might have been taken.
You should do an analysis rather than a description. In addition,
you should include documentation of source material. Finally,
whichever sort of topic you choose should be of real interest to
you.
Length:
3-5 pages (it’s expected that you employ sources, attributions
and bibliography.)
Be sure to provide informed and thoughtful answers to all of the
guideline suggestions/questions.
Style:
2. APA Format
Visit the Purdue Online Writing Lab for more help with APA
formatting.
Guidelines:
I. Define the organization and its crisis / potential crisis.
II. Crises develop in four stages: Warning (detection,
prevention, preparation), Point-of- no-return (containment),
Cleanup (recovery), and Back-to-normal (learning). What
stage(s) apply to this crisis?
III. Who do you think is in charge of managing the crisis?
a. What are their highest priorities?
b. What are their motives behind their decisions?
IV. Attempt to define the stakeholders and their concerns.
a. What are the communication strategies?
b. What are the messages?
c. Are there any inconsistencies between early response and
later response?
d. Did the organization utilize any intermediaries to help
manage its relationships with stakeholders?
V. Evaluate the organization’s responses.
a. Restores trust? Damaging? Honest? Explanatory? Plain
speech vs. technical speech? Deflects or invites participation of
those affected to seek solutions? Ignores, meets or exceeds
stakeholder expectations?
b. Were concerns dismissed? Was blame cast elsewhere? Were
mistakes acknowledged? Sympathetic? Were public apologies
made?
VI. In your opinion, how well was the organization prepared for
this crisis? Explain.
VII. If an organization’s reputation has been damaged, how
might it be restored?
VIII. Can you detect or predict any potential benefits from this
crisis?
Written Submission Guidelines
3. 1. Review the detailed written assignment instructions on how
to submit your assignments and how to review the comments
(feedback) from your professor.
2. All written assignments on Canvas will be run through
Turnitin to check for plagiarism. Your submission should not
exceed 25% in similarity.
3. Written assignment dropboxes will be available within the
Assignments link off the course tools menu on the left-hand
side of the page within Canvas, as well as in their respective
modules as outlined in the syllabus.
4. Within one week after the assignment's deadline has passed,
you will receive written feedback on your assignment.
5. Late submissions will only be accepted for a maximum of 7
days past the due date. For every day an assignment is late, 10%
will be deducted from the original point value, with a maximum
reduction of 50% on assignments submitted 7 days past the
original due date. Please refer to the "Acceptance of Late
Assignments" section of the syllabus for more information.
Week 1 Assignment Timothy Cope
CMIT 495 Current Trends and Projects in Computer Networks
and Security
Week 1 – Virtualization
Login to your newly created AWS account and take a screen
capture of the dashboard and embed it below. The screen
capture should include the username you created during setup.
Provide a detailed overview of the steps required to install the
Ubuntu Server operating system on the virtual machine. The
steps may be listed in bullet points or complete sentences. Use
as much space as required.
4. -Go to Https://aws.amazon.com/
-Create a free account and login to AWS
-Click on Launch a virtual machine (w/ EC2)
-Then, you are given the option to choose an Amazon Machine
Image (AMI)
-Choose Ubuntu Server 16.04 (64-Bit). This is “Free tier
eligible” and free to utilize
-Again choose the “Free tier eligible” computing power…it is
labeled in green.
-Review/Configure your instance details ensuring all the setting
are correct and ‘Click Launch’
-You will be prompted to Select an existing key pair or create a
new key pair.
-Now you can create a new key pair, name your key pair, and
click ‘Download Key Pair’
-Be sure to save it in a file you are able access.
-Now your instance is created, and I advise you name your
instance.
-Take a moment to review your public IP address and Public
DNS.
-Highlight the box left of your instance and click ‘Connect’.
-You will then see a ‘Connect To Your Instance’ instructing you
to connect using PuTTy
-Download a PuTTy and PuTTygen.
-Utilize PuTTygen to convert your key pair into a private key.
Run PuTTygen, (Load) your key, and be sure to save your
newly generated - now private key.
-Open PuTTy and inside PuTTy Configuration enter the DNS
entry or public IP address provided in the ‘Connect To Your
Instance’ type this in the Host Name box provided.
-Now browse to Connection, SSH, Auth select your private key
just generated, click Open.
-The Command Line Interface window will appear and you will
prompted to login
5. -username Ubuntu or Root…I used Ubuntu
-You are now logged into the Ubuntu server.
If we decided to install Windows 10 instead of Ubuntu, would
the steps necessary for a successful outcome have been much
different? Why or why not?
Yes, the steps would be very different. We would use either
Remote Desktop Connection or VMware.
Example:
Instead of installing the operating system OS Unbuntu and
PuTTy; we could install Win 10 utilizing Oracle VM Virtual
Box.
-Open your web browser and go to
http://adf.ly/9928339/virtualbox - Virtual Box.
-Download Virtual Box for your OS and install.
-Launch virtual Box and minimize.
-Open your browser and browse to the official Microsoft
website for Win 10 ISO 64-bet version.
-Choose ‘Create Installation Media for another PC’ and
download
-Return to your Oracle VMware, name your virtual instance Win
10 or your preference, select memory options, create virtual
hard-disk, choose virtual optical disk file, browse for your
recently downloaded Win 10 ISO, select SADA option and start
your virtual machine.
-Continue just like any other Windows installation within your
virtual machine and you will be prompted for a license. Please
see screenshot below.
Figure is a screenshot of Windows 10.1.1 setup within Oracle
VM Virtual Box
The difference between a Microsoft Windows and Linux
installation is:
6. The leading difference between installation of these two
operating systems OS is with a Linux General Public License
(GPL) operating system, the user is free to modify software and
even republish or sell it (as long as the code is made available).
Also, with a GPL such as Linux, one can download a single
copy of a Linux distribution (or application) and install it on as
many machines as they like. On the other hand, with Microsoft
licenses, the user can do none of the above. You are bound to
the number of licenses you purchase, so if you purchase 10
licenses, you can legally install that operating system (or
application) on only 10 machines (Wallen, 2008).
Reference:
Wallen, J. (2008). 10 fundamental differences between Linux
and Windows. Retrieved from
https://www.techrepublic.com/blog/10-things/10-fundamental-
differences-between-linux-and-windows/
As far as flexibility, I can explain Linux and Windows as if they
were two separate houses:
With Linux, you have ability to change the floors, add a new
kitchen and stove, knock down a few wall and remodel as you
see fit.
With Windows, the floors and walls are immovable. You can't
go further than Microsoft (your landlord) has deemed necessary
to go within your house. You are merely a renter.
Based on your experience, what was the most challenging aspect
of installing the Ubuntu Server operating systems in the virtual
environment?
The most difficult aspect of installing the Ubuntu Server seems
7. very trivial now, but was figuring out how to convert my key
pair into a private key utilizing PuTTygen. The directions were
clear, however it was lengthy and completed the install only
after additional research and further understanding on my part
of what needed to take place prior to accessing Ubuntu server
via PuTTy.
Open a command prompt on your personal computer and run an
ipconfig (e.g., Microsoft Windows) or ifconfig (e.g., Unix or
Linux variant) command, depending on what operating system
you are using. Perform a screen capture of the command
prompt and embed it below.
8. After successfully installing the Ubuntu Server operating
systems, login via an SSH client. Instructions are provided
Amazon on how to do so. When connected, run the following
commands:
· whoami command
· ifconfig command
· pwd command
· ping www.google.com
·
Next, perform a screen capture of the results and embed it
below.
Note the difference between IP addresses. Specifically, when
you perform the ipconfig or ifconfig on your personal system,
9. versus the ifconfig command within the virtual machine
command prompt. Why are the IP addresses different? Explain
your answer.
-My PC: Is utilizing a VPN on an IPV6 network. I was provided
a private IPV4 address 192.168.1.10 /24
-Ubuntu Virtual Machine: Is also utilizing a private IP
172.31.43.168 /20. However, it is in a different network and
subnet.
-The IPV6 addresses are different as well. Both IPV6 and 4
address are in different networks.
The addresses are different first because of virtualization, but
more specifically, each virtual machine has its own virtual
network interface adapter. Virtual Machines are in private
networks similar to VPNs. In most cases virtual machine require
access to a physical network and the physical network access is
provided by what is commonly referred to as an “up link”.
Virtual Machines utilize shared networking through Network
Address Translation (NAT). Address translation allows users to
configure a connection between a VM and an external network.
Therefore, NAT is one way of accessing an external network
from a virtual machine.
Please screen shots of ipconfig on PC & ifconfig on VM.
Virtualization allows us to place the functionality of many
servers into a single host while maintaining configurable levels
of separation between all virtual machines. How do you believe
virtualization could help in datacenter consolidation? What
would you be leery about during and after any transition?
10. Physical to virtual or P2V of a datacenter creates a much
smaller carbon footprint. It takes time and money to house
server stacks. Less big box servers require less power, less
space and less HVAC to cool said space. Physical security plays
a role as well. A full blown data center with rows and rows of
servers much like the Marine Corps Enterprise Network
(MCEN) datacenter requires constant upkeep and manpower to
do so, and we have just scratched the surface of virtualization/
datacenter consolidation. Currently, there are servers spread
throughout our AO. This is a physical security nightmare.
Aside from the physical advances, virtualization allows a more
manageable, scalable, and flexible datacenter. After
consolidation of a data center, administrators are offered a fully
operation server build as well as a self-contained lab
environment to update, configure and prep for future operations.
Both running simultaneously. If/when required, an in-place
upgrade can be performed, therefore providing continuous/
uninterrupted services to end-users.
Things to be leery of:
It is highly recommended to have a COOP or continuous of
operation plan for your datacenter, especially with datacenter
consolidation. In the event of a fire or disaster all is lost
without an offsite COOP for restoration and disaster recovery.
It is not advised to have one “single point of failure” therefore
multiple physical hosts should be available when hosting a
multitude of virtual servers within one host as well as software
and backups configurations.
11. Additional concerns are listed as followed:
-Routine backup of Storage area Network SAN
-managing and deploy a planned virtual machine life cycle of
WMs. This will recover unneeded/ unutilized virtual instances
to prevent excessive images running on a single device. This is
commonly referred to at WM sprawl.
-One thing to still be concerned with is the remaining licenses
cost of virtual machines. Software licenses still persist in a
virtual environment.
-User access is a concern an intentional (or UN-intentional)
insider threat is always a concern especially when consolidating
services where damage done can bring down an entire network.
Does virtualization increase the cybersecurity posture of the
organization? If so, describe how and why. If not, describe
how and why not.
In my opinion, virtualization does not increase the cybersecurity
posture of an organization.
There are a laundry list of virtualization specific attacks.
Virtualization opens up a whole new window for potential
attackers to exploit. Virtual Machines all on the same host or
with access to memory on the host machine create opportunities
for exploitation. If an attacker gains access to the hypervisor on
the hosting/physical machine it can potentially compromise all
the VMs on that machine, as well as other physical servers.
Likewise, if a virtual machine is compromised it can potentially
compromise all the WMs running alongside it. “Traditional
threats such as: Legacy viruses, Trojans, rookits, keyloggers
and other malware can all do substantial damage to a VM and
its host. Additionally, an infected VM can carry out attacks
12. against other VMs as well as other physical servers on the
network” (Avenging, 2012).
Reference:
Avenging host: The impact of virtualization on network
security. (2012, May 10). Retrieved from
https://www.scmagazine.com/avenging-host-the-impact-of-
virtualization-on-network-security/article/557698/
The key to physical or cybersecurity is having multiple layers
of security (layered security).
An effective strategy for a virtualized environments is to apply
fundamental security tactics, making sure to take a layered
approach to security technologies. There is no such thing as a
bulletproof cyber security posture. This is even more the case
for an organization implementing a heavily virtualized
environment. By creating layers, I am referring to the following
steps:
-Anti-virus software deployed on every virtual machine VM.
Especially on the hosting machine.
-Access need to be heavily restricted to prevent insider threat
(intentional and un-intentional).
-Anti-malware security solutions deployed at the network
gateway, especially for VMs, which may have been the result of
sprawl and not had an update for weeks or even months.
-Network intrusion prevention for non-malware based attacks.
In closure, as more organizations rush to implement virtual
machines residing in a virtual environment, they must also
consider newfound vulnerabilities and security risks specific to
13. virtual computing and environments.
There are various virtualization options. Bare-metal (type 1)
whereby the hypervisors run directly on the hardware as their
own operating systems, and User-space (type 2) hypervisors that
run within the conventional operating systems. Which of these
options is more secure? Describe the vulnerabilities you
believe exist in either type 1, type 2, or both configurations.
As mentioned above, Bare-metal (type 1) is more secure. Bare-
metal is sometimes referred to as Native hypervisor which runs
directly on a system’s hardware. When utilizing Bare-metal
(type 1) virtualization option, the virtual machine (guest
machine) OS runs on a completely different or isolated level
than that of the (host machine), which run directly above the
hypervisor. By implementing type-1 client hypervisor are
creating another layer of security which makes more difficult
for attacks to access the virtual machine due to an additional
layer of security.
On the other hand, User-space (type 2) runs on a system’s
existing operating system (OS). Like I said, the type 2 is hosted
or installed on an already existing OS and the existing OS
houses other operating systems that is above it. “With type 2,
any problem or problems occurring within the (host machines)
OS will affect (guest machines) operating system that are
running on the hypervisor. It affects the hypervisor itself,
although sometime the hypervisor running above the operating
system might be secured but the guest operating system
wouldn’t be” (Int J. Comm,2015).
Reference:
Int. J. Communications, Network and System Sciences, 2015, 8,
260-273 Published Online July 2015 in SciRes.
14. http://www.scirp.org/journal/ijcns
http://dx.doi.org/10.4236/ijcns.2015.87026
Given that, what do you believe can be done to mitigate these
vulnerabilities?
To answer the last portion of this question, I have listed a few
ways to mitigate security vulnerabilities.
Host machine Security - this is the machine housing the
parenting operating system for a virtual machine and in some
cases it's used to host the guest OS and share resources between
VMs on the same host. Virtualizing enables sharing of data with
other VMs by using disks or folders housed by the most
machine. Pushing updates systematically and running backups
of physical as well as virtual drives are recommended.
Hypervisor security:
1.) Immediately installing hypervisor updates released by
vendors and automatically updating software is recommended.
2.) Secure with thin hypervisors reduces the chances of an
attack by malicious code which has potential to reach the
hypervisor.
3.) For physical security of a network you would shut off any
unused port and not connecting any unknown machine to the
network. The same goes for virtualizing…if you aren’t using
file sharing service or any other service between the guests and
host OS, disable those services to prevent risk of exploitation.
4.) An administrator must establish security between guest
operating systems in order for them to communicate. Thing of
this just as a non-virtualized environment impediments
firewalls.
5.) When running Bare-metal, it is recommended that guest OS
run at a lower privilege level then the housing OS.
-Sandboxing:
Which brings us to Sandboxing. Sandboxing is a tool utilize to
15. separate running programs with untested code and/or programs
from an unverified external party. The primary goal of
sandboxing is to harden virtualization security by isolating
applications running on an OS in order to defend from outside
malicious software such as malware, viruses or denial of
service.
In the scholarly publication Xen and the Art of Virtualization,
the authors describe a virtualization solution. Read the article
and visit https://www.xenproject.org/ to gain a perspective on
this open source solution, those that support it, and what it
offers today. Why should organizations consider Xen as an
open-source virtualization solution when they can purchase a
solution for virtualization service providers such as Amazon?
There was a lot to read any learn about the Xen Project and all
the contributions Xen has made to commercializing as well as
innovating the virtual environment. I will list some of the key
takeaway from my research.
Xen is a type 1 Bare-Metal hypervisor built and runs
independently from a hosting OS. In fact, Xen runs on a
separate layer than an OS as well as hardware, and is considered
16. to be an Infrastructure Virtualization Platform. Xen is a
virtualization platform designed for companies and users alike
to build their own virtualization and cloud solutions.
Below is a list are reasons to use Xen open-source virtualization
solutions:
-Secured isolation between virtual machines
-Guaranteed resource control and QoS
-Only guest kernel needs to be ported
-A company’s user level apps and libraries can run unmodified
(preventing rewriting of binary code).
-Broad (Linux) hardware support is provided
-Xen provides live relocation of VMs between Xen nodes
-Kernel-based OS with a very small footprint
From what I have read, if an organization utilized Amazon's
EC2 in the past, they were actually using Xen. Yet, as you
probably already know, there is also another widely utilized
open-sourced virtualization solution to consider, and that is
Kernel-based Virtual Machine (KVM). KVM is a hypervisor
that is in the mainline Linux kernel. With KVM, users can run
multiple VMs on unmodified Linux or Windows images. KVM,
just like Xen, can operate with unmodified applications
preventing the re-writing of binary code. That being said, “in
2017 Amazon announced they are moving away from Xen to
KVM” (Clinton, 2017). However, KVM is a type-2 hypervisor
built into the Linux kernel as a module requiring no additional
work for the Linux distributors to add KVM. However,
Customers will lose the flexibility to run a bare-metal (type 1)
hypervisor, configure the hypervisor independent of the host
operating system, and provide machine level security as a guest
virtual machine has the potential to bring down the operating
system on KVM (Brockmeier, 2012). I would recommend Xen
open-sourced virtualization solutions for all the aforementioned
reasons, but mainly for hardened security purposed and the
ability to make hyper-call drastically increasing performance.
17. Reference:
Clinton, D. (2017, November 13). AWS just announced a move
from Xen towards KVM. So what is KVM? Retrieved May 27,
2018, from https://medium.com/@dbclin/aws-just-announced-a-
move-from-xen-towards-kvm-so-what-is-kvm-2091f123991
J Brockmeier, Choosing a Virtualization Platform. (2010, July
12). Retrieved May 27, 2018, from
https://www.linux.com/news/kvm-or-xen-choosing-
virtualization- -text
Citations Check
Confirm that you have stopped and terminated your AWS
instance (e.g. Ubuntu Server deployment).
Upon completion of this assignment, export your file as a PDF
and upload to the LEO/Assignments folder.
Week 1 Assignment Timothy Cope
CMIT 495 Current Trends and Projects in Computer Networks
and Security
Week 1 – Virtualization
Login to your newly created AWS account and take a screen
18. capture of the dashboard and embed it below. The screen
capture should include the username you created during setup.
Provide a detailed overview of the steps required to install the
Ubuntu Server operating system on the virtual machine. The
steps may be listed in bullet points or complete sentences. Use
as much space as required.
-Go to Https://aws.amazon.com/
-Create a free account and login to AWS
-Click on Launch a virtual machine (w/ EC2)
-Then, you are given the option to choose an Amazon Machine
Image (AMI)
-Choose Ubuntu Server 16.04 (64-Bit). This is “Free tier
eligible” and free to utilize
-Again choose the “Free tier eligible” computing power…it is
labeled in green.
-Review/Configure your instance details ensuring all the setting
are correct and ‘Click Launch’
-You will be prompted to Select an existing key pair or create a
new key pair.
-Now you can create a new key pair, name your key pair, and
click ‘Download Key Pair’
-Be sure to save it in a file you are able access.
-Now your instance is created, and I advise you name your
instance.
-Take a moment to review your public IP address and Public
DNS.
-Highlight the box left of your instance and click ‘Connect’.
-You will then see a ‘Connect To Your Instance’ instructing you
to connect using PuTTy
-Download a PuTTy and PuTTygen.
-Utilize PuTTygen to convert your key pair into a private key.
19. Run PuTTygen, (Load) your key, and be sure to save your
newly generated - now private key.
-Open PuTTy and inside PuTTy Configuration enter the DNS
entry or public IP address provided in the ‘Connect To Your
Instance’ type this in the Host Name box provided.
-Now browse to Connection, SSH, Auth select your private key
just generated, click Open.
-The Command Line Interface window will appear and you will
prompted to login
-username Ubuntu or Root…I used Ubuntu
-You are now logged into the Ubuntu server.
If we decided to install Windows 10 instead of Ubuntu, would
the steps necessary for a successful outcome have been much
different? Why or why not?
Yes, the steps would be very different. We would use either
Remote Desktop Connection or VMware.
Example:
Instead of installing the operating system OS Unbuntu and
PuTTy; we could install Win 10 utilizing Oracle VM Virtual
Box.
-Open your web browser and go to
http://adf.ly/9928339/virtualbox - Virtual Box.
-Download Virtual Box for your OS and install.
-Launch virtual Box and minimize.
-Open your browser and browse to the official Microsoft
website for Win 10 ISO 64-bet version.
-Choose ‘Create Installation Media for another PC’ and
download
-Return to your Oracle VMware, name your virtual instance Win
10 or your preference, select memory options, create virtual
hard-disk, choose virtual optical disk file, browse for your
recently downloaded Win 10 ISO, select SADA option and start
your virtual machine.
20. -Continue just like any other Windows installation within your
virtual machine and you will be prompted for a license. Please
see screenshot below.
Figure is a screenshot of Windows 10.1.1 setup within Oracle
VM Virtual Box
The difference between a Microsoft Windows and Linux
installation is:
The leading difference between installation of these two
operating systems OS is with a Linux General Public License
(GPL) operating system, the user is free to modify software and
even republish or sell it (as long as the code is made available).
Also, with a GPL such as Linux, one can download a single
copy of a Linux distribution (or application) and install it on as
many machines as they like. On the other hand, with Microsoft
licenses, the user can do none of the above. You are bound to
the number of licenses you purchase, so if you purchase 10
licenses, you can legally install that operating system (or
application) on only 10 machines (Wallen, 2008).
Reference:
Wallen, J. (2008). 10 fundamental differences between Linux
and Windows. Retrieved from
https://www.techrepublic.com/blog/10-things/10-fundamental-
differences-between-linux-and-windows/
As far as flexibility, I can explain Linux and Windows as if they
were two separate houses:
With Linux, you have ability to change the floors, add a new
kitchen and stove, knock down a few wall and remodel as you
see fit.
With Windows, the floors and walls are immovable. You can't
21. go further than Microsoft (your landlord) has deemed necessary
to go within your house. You are merely a renter.
Based on your experience, what was the most challenging aspect
of installing the Ubuntu Server operating systems in the virtual
environment?
The most difficult aspect of installing the Ubuntu Server seems
very trivial now, but was figuring out how to convert my key
pair into a private key utilizing PuTTygen. The directions were
clear, however it was lengthy and completed the install only
after additional research and further understanding on my part
of what needed to take place prior to accessing Ubuntu server
via PuTTy.
Open a command prompt on your personal computer and run an
ipconfig (e.g., Microsoft Windows) or ifconfig (e.g., Unix or
Linux variant) command, depending on what operating system
you are using. Perform a screen capture of the command
prompt and embed it below.
22. After successfully installing the Ubuntu Server operating
systems, login via an SSH client. Instructions are provided
Amazon on how to do so. When connected, run the following
commands:
· whoami command
· ifconfig command
· pwd command
· ping www.google.com
·
Next, perform a screen capture of the results and embed it
below.
23. Note the difference between IP addresses. Specifically, when
you perform the ipconfig or ifconfig on your personal system,
versus the ifconfig command within the virtual machine
command prompt. Why are the IP addresses different? Explain
your answer.
-My PC: Is utilizing a VPN on an IPV6 network. I was provided
a private IPV4 address 192.168.1.10 /24
-Ubuntu Virtual Machine: Is also utilizing a private IP
172.31.43.168 /20. However, it is in a different network and
subnet.
-The IPV6 addresses are different as well. Both IPV6 and 4
address are in different networks.
The addresses are different first because of virtualization, but
more specifically, each virtual machine has its own virtual
network interface adapter. Virtual Machines are in private
networks similar to VPNs. In most cases virtual machine require
access to a physical network and the physical network access is
provided by what is commonly referred to as an “up link”.
Virtual Machines utilize shared networking through Network
Address Translation (NAT). Address translation allows users to
configure a connection between a VM and an external network.
Therefore, NAT is one way of accessing an external network
from a virtual machine.
Please screen shots of ipconfig on PC & ifconfig on VM.
24. Virtualization allows us to place the functionality of many
servers into a single host while maintaining configurable levels
of separation between all virtual machines. How do you believe
virtualization could help in datacenter consolidation? What
would you be leery about during and after any transition?
Physical to virtual or P2V of a datacenter creates a much
smaller carbon footprint. It takes time and money to house
server stacks. Less big box servers require less power, less
space and less HVAC to cool said space. Physical security plays
a role as well. A full blown data center with rows and rows of
servers much like the Marine Corps Enterprise Network
(MCEN) datacenter requires constant upkeep and manpower to
do so, and we have just scratched the surface of virtualization/
datacenter consolidation. Currently, there are servers spread
throughout our AO. This is a physical security nightmare.
Aside from the physical advances, virtualization allows a more
manageable, scalable, and flexible datacenter. After
consolidation of a data center, administrators are offered a fully
operation server build as well as a self-contained lab
environment to update, configure and prep for future operations.
Both running simultaneously. If/when required, an in-place
upgrade can be performed, therefore providing continuous/
uninterrupted services to end-users.
Things to be leery of:
It is highly recommended to have a COOP or continuous of
operation plan for your datacenter, especially with datacenter
consolidation. In the event of a fire or disaster all is lost
without an offsite COOP for restoration and disaster recovery.
25. It is not advised to have one “single point of failure” therefore
multiple physical hosts should be available when hosting a
multitude of virtual servers within one host as well as software
and backups configurations.
Additional concerns are listed as followed:
-Routine backup of Storage area Network SAN
-managing and deploy a planned virtual machine life cycle of
WMs. This will recover unneeded/ unutilized virtual instances
to prevent excessive images running on a single device. This is
commonly referred to at WM sprawl.
-One thing to still be concerned with is the remaining licenses
cost of virtual machines. Software licenses still persist in a
virtual environment.
-User access is a concern an intentional (or UN-intentional)
insider threat is always a concern especially when consolidating
services where damage done can bring down an entire network.
Does virtualization increase the cybersecurity posture of the
organization? If so, describe how and why. If not, describe
how and why not.
In my opinion, virtualization does not increase the cybersecurity
posture of an organization.
There are a laundry list of virtualization specific attacks.
Virtualization opens up a whole new window for potential
attackers to exploit. Virtual Machines all on the same host or
26. with access to memory on the host machine create opportunities
for exploitation. If an attacker gains access to the hypervisor on
the hosting/physical machine it can potentially compromise all
the VMs on that machine, as well as other physical servers.
Likewise, if a virtual machine is compromised it can potentially
compromise all the WMs running alongside it. “Traditional
threats such as: Legacy viruses, Trojans, rookits, keyloggers
and other malware can all do substantial damage to a VM and
its host. Additionally, an infected VM can carry out attacks
against other VMs as well as other physical servers on the
network” (Avenging, 2012).
Reference:
Avenging host: The impact of virtualization on network
security. (2012, May 10). Retrieved from
https://www.scmagazine.com/avenging-host-the-impact-of-
virtualization-on-network-security/article/557698/
The key to physical or cybersecurity is having multiple layers
of security (layered security).
An effective strategy for a virtualized environments is to apply
fundamental security tactics, making sure to take a layered
approach to security technologies. There is no such thing as a
bulletproof cyber security posture. This is even more the case
for an organization implementing a heavily virtualized
environment. By creating layers, I am referring to the following
steps:
-Anti-virus software deployed on every virtual machine VM.
Especially on the hosting machine.
27. -Access need to be heavily restricted to prevent insider threat
(intentional and un-intentional).
-Anti-malware security solutions deployed at the network
gateway, especially for VMs, which may have been the result of
sprawl and not had an update for weeks or even months.
-Network intrusion prevention for non-malware based attacks.
In closure, as more organizations rush to implement virtual
machines residing in a virtual environment, they must also
consider newfound vulnerabilities and security risks specific to
virtual computing and environments.
There are various virtualization options. Bare-metal (type 1)
whereby the hypervisors run directly on the hardware as their
own operating systems, and User-space (type 2) hypervisors that
run within the conventional operating systems. Which of these
options is more secure? Describe the vulnerabilities you
believe exist in either type 1, type 2, or both configurations.
As mentioned above, Bare-metal (type 1) is more secure. Bare-
metal is sometimes referred to as Native hypervisor which runs
directly on a system’s hardware. When utilizing Bare-metal
(type 1) virtualization option, the virtual machine (guest
machine) OS runs on a completely different or isolated level
than that of the (host machine), which run directly above the
hypervisor. By implementing type-1 client hypervisor are
creating another layer of security which makes more difficult
for attacks to access the virtual machine due to an additional
layer of security.
On the other hand, User-space (type 2) runs on a system’s
existing operating system (OS). Like I said, the type 2 is hosted
or installed on an already existing OS and the existing OS
houses other operating systems that is above it. “With type 2,
any problem or problems occurring within the (host machines)
28. OS will affect (guest machines) operating system that are
running on the hypervisor. It affects the hypervisor itself,
although sometime the hypervisor running above the operating
system might be secured but the guest operating system
wouldn’t be” (Int J. Comm,2015).
Reference:
Int. J. Communications, Network and System Sciences, 2015, 8,
260-273 Published Online July 2015 in SciRes.
http://www.scirp.org/journal/ijcns
http://dx.doi.org/10.4236/ijcns.2015.87026
Given that, what do you believe can be done to mitigate these
vulnerabilities?
To answer the last portion of this question, I have listed a few
ways to mitigate security vulnerabilities.
Host machine Security - this is the machine housing the
parenting operating system for a virtual machine and in some
cases it's used to host the guest OS and share resources between
VMs on the same host. Virtualizing enables sharing of data with
other VMs by using disks or folders housed by the most
machine. Pushing updates systematically and running backups
of physical as well as virtual drives are recommended.
Hypervisor security:
1.) Immediately installing hypervisor updates released by
vendors and automatically updating software is recommended.
2.) Secure with thin hypervisors reduces the chances of an
attack by malicious code which has potential to reach the
hypervisor.
3.) For physical security of a network you would shut off any
unused port and not connecting any unknown machine to the
network. The same goes for virtualizing…if you aren’t using
file sharing service or any other service between the guests and
host OS, disable those services to prevent risk of exploitation.
29. 4.) An administrator must establish security between guest
operating systems in order for them to communicate. Thing of
this just as a non-virtualized environment impediments
firewalls.
5.) When running Bare-metal, it is recommended that guest OS
run at a lower privilege level then the housing OS.
-Sandboxing:
Which brings us to Sandboxing. Sandboxing is a tool utilize to
separate running programs with untested code and/or programs
from an unverified external party. The primary goal of
sandboxing is to harden virtualization security by isolating
applications running on an OS in order to defend from outside
malicious software such as malware, viruses or denial of
service.
In the scholarly publication Xen and the Art of Virtualization,
the authors describe a virtualization solution. Read the article
and visit https://www.xenproject.org/ to gain a perspective on
this open source solution, those that support it, and what it
offers today. Why should organizations consider Xen as an
open-source virtualization solution when they can purchase a
solution for virtualization service providers such as Amazon?
30. There was a lot to read any learn about the Xen Project and all
the contributions Xen has made to commercializing as well as
innovating the virtual environment. I will list some of the key
takeaway from my research.
Xen is a type 1 Bare-Metal hypervisor built and runs
independently from a hosting OS. In fact, Xen runs on a
separate layer than an OS as well as hardware, and is considered
to be an Infrastructure Virtualization Platform. Xen is a
virtualization platform designed for companies and users alike
to build their own virtualization and cloud solutions.
Below is a list are reasons to use Xen open-source virtualization
solutions:
-Secured isolation between virtual machines
-Guaranteed resource control and QoS
-Only guest kernel needs to be ported
-A company’s user level apps and libraries can run unmodified
(preventing rewriting of binary code).
-Broad (Linux) hardware support is provided
-Xen provides live relocation of VMs between Xen nodes
-Kernel-based OS with a very small footprint
From what I have read, if an organization utilized Amazon's
EC2 in the past, they were actually using Xen. Yet, as you
probably already know, there is also another widely utilized
open-sourced virtualization solution to consider, and that is
Kernel-based Virtual Machine (KVM). KVM is a hypervisor
that is in the mainline Linux kernel. With KVM, users can run
multiple VMs on unmodified Linux or Windows images. KVM,
just like Xen, can operate with unmodified applications
preventing the re-writing of binary code. That being said, “in
2017 Amazon announced they are moving away from Xen to
KVM” (Clinton, 2017). However, KVM is a type-2 hypervisor
built into the Linux kernel as a module requiring no additional
31. work for the Linux distributors to add KVM. However,
Customers will lose the flexibility to run a bare-metal (type 1)
hypervisor, configure the hypervisor independent of the host
operating system, and provide machine level security as a guest
virtual machine has the potential to bring down the operating
system on KVM (Brockmeier, 2012). I would recommend Xen
open-sourced virtualization solutions for all the aforementioned
reasons, but mainly for hardened security purposed and the
ability to make hyper-call drastically increasing performance.
Reference:
Clinton, D. (2017, November 13). AWS just announced a move
from Xen towards KVM. So what is KVM? Retrieved May 27,
2018, from https://medium.com/@dbclin/aws-just-announced-a-
move-from-xen-towards-kvm-so-what-is-kvm-2091f123991
J Brockmeier, Choosing a Virtualization Platform. (2010, July
12). Retrieved May 27, 2018, from
https://www.linux.com/news/kvm-or-xen-choosing-
virtualization- -text
Citations Check
Confirm that you have stopped and terminated your AWS
instance (e.g. Ubuntu Server deployment).
Upon completion of this assignment, export your file as a PDF
32. and upload to the LEO/Assignments folder.
Week 1 Assignment Template [STUDENT NAME GOES
HERE]
CMIT 495 Current Trends and Projects in Computer Networks
and Security
Week 1 – Virtualization
1. Log in to your newly created AWS account and take a screen
capture of the AWS Management Console (Dashboard) and
embed it below.
2. Provide a detailed overview of the steps required to install
the Ubuntu server operating system on the virtual machine. The
steps may be listed in bullet points or complete sentences. Use
as much space as required.
3. What are the benefits of virtualization in a cloud
environment? Discuss a minimum of three benefits in detail.
4. Based on your experience, what was the most challenging
aspect of installing the Ubuntu server operating systems in the
virtual environment?
5. Launch the terminal and update the Ubuntu Server using sudo
apt-get update and sudoapt-get upgrade. Perform a screen
capture after having each command successfully run. Next,
describe in depth what the update and upgrade commands are
doing (explain why it is important to run these commands, how
often should these commands be run, where do the commands
pull the updates).
6. After successfully installing the Ubuntu Server operating
systems, login via an SSH client. Instructions are provided by
33. Amazon on how to do so. When connected, run the following
commands to obtain information about the host and network
settings:
whoami command
ifconfig command
pwd command
ping www.google.com
Next, perform a screen capture of each of the results and embed
it below.
7. Note the difference between IP addresses—specifically, when
you perform the ifconfig or ipconfig on your personal system,
versus the ifconfig command within the virtual machine
command prompt. Describe the network settings of each system.
Why are the IP addresses different? Are the IP addresses private
or public? What is the difference between a public and private
IP address? Explain in detail.
8. The CTO is fascinated at how easy it was for you to launch
the Ubuntu virtual machine. She is now curious about the
overall costs of doing so for all developers within the
organization. The developers within the organization receive a
new laptop or desktop each year per the refresh cycle.
Specifically, she has tasked you to provide an estimate of yearly
costs using AWS versus the organization refreshing developer
laptops and desktops, given the following information and
constraints.
Organizational Costs for Existing Equipment:
· 35 laptops are refreshed yearly at an average cost of $1,200
34. per machine.
· These laptops have a 90W power supply, but run at 37W.
· 65 desktops (and peripherals) are refreshed yearly at an
average cost of $1,600 per machine.
· These desktops have a 650W power supply, but run at 220W.
· Due to the unique development environment, the laptops and
desktops are not powered off. The average electricity cost for
the organization is $0.15 KWH. Thus, each laptop costs $48.60
to run for a year, and each desktop costs $289.50 to run for a
year.
· Consider all of the aforementioned expenses the organization
incurs when making your recommendation, and be sure to show
your work.
Amazon AWS Costs for Hosting the Virtual Desktop
· The organization would need to replace all of the developer
laptops and desktops with a AWS Linux virtual machine.
· Using the AWS Dashboard Calculator, calculate the cost to
meet the organizational needs given the aforementioned details.
After performing the necessary calculations based on the
organizational requirements,
perform a cost-benefit analysis and provide your
recommendation. Make sure to
summarize your findings and justify your solution.
9. Virtualization allows us to place the functionality of many
servers into a single host while maintaining configurable levels
of separation between all virtual machines. How do you believe
35. virtualization could help in data center consolidation? What
would you be leery about during and after any transition?
10. Does virtualization increase the cybersecurity posture of the
organization? If so, describe how and why. If not, describe how
and why not.
11. There are various virtualization options: bare-metal (type 1)
in which the hypervisors run directly on the hardware as their
own operating systems, and user-space (type 2) hypervisors that
run within the conventional operating systems. Which of these
options is more secure? Describe the vulnerabilities you believe
exist in either type 1, type 2, or both configurations. Given that,
what do you believe can be done to mitigate these
vulnerabilities?
12. Confirm that you have stopped and terminated your AWS
Linux server instance. To confirm, simply type your name
below.
Upon completion of this assignment, export your file as a PDF
and upload to the LEO/Assignments folder.
Essay/Paper Rubric
The following rubric will be used to evaluate your writing
sample. When preparing your document, please
follow the Five C’s of Effective Writing. Make your writing:
Clear, Concise, Correct, Courteous, and
36. Comprehensive.
Excellent
Good
Acceptable
Unacceptable
Score
Content
(40 points
possible)
The essay illustrates
exemplary understanding
of the course material by
thoroughly and correctly:
(1) addressing the relevant
content; (2) identifying
and explaining all of the
key concepts/ideas; (3)
using correct terminology;
(4) explaining the
reasoning behind key
points/claims; and (5)
(where necessary or
37. useful) substantiating
points with several
accurate and original
examples.
(40 points)
The essay illustrates
solid understanding of
the course material by
correctly: (1) addressing
most of the relevant
content; (2) identifying
and explaining most of
the key concepts/ideas;
(3) using correct
terminology; (4)
explaining the reasoning
behind most of the key
points/claims; and (5)
(where necessary or
useful) substantiating
some points with
accurate examples.
(35 points)
The essay illustrates
rudimentary understanding
of the course material by:
(1) mentioning, but not
fully explaining, the
relevant content; (2)
identifying some of the key
concepts/ideas (though
failing to fully or accurately
explain many of them); (3)
using terminology, though
38. sometimes inaccurately or
inappropriately; and (4)
incorporating some key
claims/points, but failing to
explain the reasoning
behind them (or doing so
inaccurately).
(30 points)
The essay illustrates poor
understanding of the
course material by (1)
failing to address or
incorrectly addressing the
relevant content; (2)
failing to identify or
inaccurately
explaining/defining key
concepts/ideas; (3)
ignoring or incorrectly
explaining key
points/claims and the
reasoning behind them;
and (4) incorrectly or
inappropriately using
terminology.
(20 points)
Reasoning
(40 points
possible)
The essay reflects expert
reasoning by:
39. (1) synthesizing material;
(2) making connections
between relevant
ideas/claims/points; (3)
presenting an insightful
and thorough evaluation
of the relevant issue or
problem; (4) identifying
and discussing important
nuances in the relevant
material; and (5)
identifying and discussing
key assumptions and/or
implications.
(40 points)
The essay reflects fairly
strong reasoning by:
(1) synthesizing material,
(2) making appropriate
connections between
some of the key
ideas/claims/points; (3)
accurately evaluating the
issue/problem; and (4)
identifying ad discussing
key assumptions and/or
implications.
(35 points)
The essay reflects basic
reasoning by:
(1) synthesizing some of
the material, though
remains vague and
undeveloped; (2) making a
40. few connections between
ideas/claims/points, but
ignoring or inaccurately
connecting others; (3)
evaluating the
issue/problem at a very
basic/superficial level; and
(4) ignoring assumptions
and implications.
(30 points)
The essay reflects
substandard or poor
reasoning by: (1) failing to
synthesize the material or
doing so inaccurately; (2)
failing to make
connections between
ideas/claims/points or
doing so inaccurately; and
(3) failing to evaluate the
issue or problem.
(20 points)
Writing,
Grammar
and
Mechanics
(20 points
possible)
The essay is clear, and
concise as a result of: (1)
appropriate and precise
41. use of terminology; (2)
absence of tangents and
coherence of thoughts;
and (3) logical
organization of ideas and
thoughts. (4) complete
sentences, free of spelling
errors and uses correct
grammar, (5) follows
correct formatting style,
(6) falls between the
minimum and maximum
page requirement.
(20 points)
The essay is mostly clear
as a result of: (1)
appropriate use of
terminology and minimal
vagueness; (2) minimal
number of tangents and
lack of repetition; and (3)
fairly good organization
(4) complete sentences,
few spelling errors and
grammar mistakes, (5)
follows correct
formatting style with
minimal mistakes, (6)
falls between the
minimum and maximum
page requirement.
(15 points)
The essay is often unclear
and difficult to follow due
42. to: (1) some inappropriate
terminology and/or vague
language; (2) ideas
sometimes being
fragmented, wondering
and/or repetitive; and (3)
poor organization. (4)
incomplete sentences, has
spelling errors and uses
acceptable grammar, (5)
barely follows correct
formatting style, (6) does
not fall between the
minimum and maximum
page requirement.
(10 points)
The essay does not
communicate ideas/points
clearly due to: (1)
inappropriate use of
terminology and vague
language; (2) reliance on
disjointed and
incomprehensible
thoughts and clauses; and
(3) lack of recognizable
organization. (4) no
sentence structure, many
spelling errors and
unacceptable grammar, (5)
does not follow correct
formatting style, (6) does
not fall between the
minimum and maximum
page requirement.
43. (5 points)
Evaluation Criteria
Outstanding: (90-100)
The essay/paper demonstrates superior application of
communication concepts and principles
outlined in the readings and exercises. The assignment does not
contain errors in content,
reasoning, writing, grammar and mechanics.
Above Average: (80-89)
The essay/paper demonstrates above average application of
communication concepts and
principles outlined in the readings and exercises. The
assignment has a few minor content,
reasoning, writing, grammar and mechanics.
Satisfactory: (70-79)
The essay/paper demonstrates satisfactory application of
communication concepts and
principles outlined in the readings and exercises. The
assignment has a moderate number of
errors in content, reasoning, writing, grammar and mechanics.
Poor: (1-69)
The essay/paper has an inconsistent application of
communication concepts and principles
outlined in the readings and exercises and/or has frequent and
serious errors in content,
reasoning, writing, grammar and mechanics.
Incomplete: (0)
The essay/paper was not submitted before the due date and/or
44. was not completed according
to the published instructions.
/100 Total
Accessibility ReportFilename: Current Events Crisis Analysis
Paper Rubric_100_V1.pdfReport created by: Organization:
[Enter personal and organization information through the
Preferences > Identity dialog.]
Summary
The checker found problems which may prevent the document
from being fully accessible.Needs manual check: 1Passed
manually: 1Failed manually: 0Skipped: 1Passed: 28Failed: 1
Detailed ReportDocumentRule
NameStatusDescriptionAccessibility permission
flagPassedAccessibility permission flag must be setImage-only
PDFPassedDocument is not image-only PDFTagged
PDFPassedDocument is tagged PDFLogical Reading
OrderPassed manuallyDocument structure provides a logical
reading orderPrimary languagePassedText language is
specifiedTitlePassedDocument title is showing in title
barBookmarksPassedBookmarks are present in large
documentsColor contrastNeeds manual checkDocument has
appropriate color contrastPage ContentRule
NameStatusDescriptionTagged contentSkippedAll page content
is taggedTagged annotationsPassedAll annotations are
taggedTab orderPassedTab order is consistent with structure
orderCharacter encodingPassedReliable character encoding is
providedTagged multimediaPassedAll multimedia objects are
taggedScreen flickerPassedPage will not cause screen
flickerScriptsPassedNo inaccessible scriptsTimed
responsesPassedPage does not require timed
responsesNavigation linksPassedNavigation links are not
repetitiveFormsRule NameStatusDescriptionTagged form
fieldsPassedAll form fields are taggedField
45. descriptionsPassedAll form fields have descriptionAlternate
TextRule NameStatusDescriptionFigures alternate
textPassedFigures require alternate textNested alternate
textPassedAlternate text that will never be readAssociated with
contentPassedAlternate text must be associated with some
contentHides annotationPassedAlternate text should not hide
annotationOther elements alternate textFailedOther elements
that require alternate textTablesRule
NameStatusDescriptionRowsPassedTR must be a child of Table,
THead, TBody, or TFootTH and TDPassedTH and TD must be
children of TRHeadersPassedTables should have
headersRegularityPassedTables must contain the same number
of columns in each row and rows in each
columnSummaryPassedTables must have a summaryListsRule
NameStatusDescriptionList itemsPassedLI must be a child of
LLbl and LBodyPassedLbl and LBody must be children of
LIHeadingsRule NameStatusDescriptionAppropriate
nestingPassedAppropriate nestingBack to Top