SlideShare a Scribd company logo
Top of Form
Rubric Name: Project 1: Outline for an Enterprise IT Security
Policy v2
Criteria
Excellent
Outstanding
Acceptable
Needs Improvement
Needs Significant Improvement
Missing or Unacceptable
Introduction
10 points
Provided an excellent introduction to the deliverable which
clearly, concisely, and accurately summarized the structure and
contents of the outline. Appropriately used information from 3
or more authoritative sources to support the introduction.
8.5 points
Provided an outstanding introduction to the deliverable which
clearly and accurately summarized the structure and contents of
the outline. Appropriately used information from 2 or more
authoritative sources to support the introduction.
7 points
Provided an acceptable introduction to the deliverable which
summarized the structure and contents of the outline.
Appropriately used information from authoritative sources to
support the introduction.
6 points
Provided an introduction to the deliverable but the section
lacked some required details. Information from authoritative
sources was mentioned and used.
4 points
Attempted to provide an introduction to the deliverable but this
section lacked detail and/or was not well supported by
information drawn from authoritative sources.
0 points
The introduction section was missing or did not present
information about the contents of the deliverable.
Overview of Organization
20 points
Provided an excellent overview of the organization which
clearly and concisely addressed the following:
• mission statement for the client
• brief overview of the client’s organization
• client's critical infrastructure sector
• information, information systems, and information
infrastructure in the enterprise
• major IT related regulations and laws impacting client's IT
operations
• products / services which the organization provides to its
customers
Appropriately used information from 3 or more authoritative
sources.
18 points
Provided an outstanding overview of the organization which
addressed four or more of the following:
• mission statement for the client
• brief overview of the client’s organization
• client's critical infrastructure sector
• information, information systems, and information
infrastructure in the enterprise
• major IT related regulations and laws impacting client's IT
operations
• products / services which the organization provides to its
customers
Appropriately used information from 2 or more authoritative
sources.
16 points
Provided an excellent overview of the organization which
addressed three or more of the following:
• mission statement for the client
• brief overview of the client’s organization
• client's critical infrastructure sector
• information, information systems, and information
infrastructure in the enterprise
• major IT related regulations and laws impacting client's IT
operations
• products / services which the organization provides to its
customers
Appropriately used information from authoritative sources.
11 points
Provided an overview of the organization which addressed at
least two of the following:
• mission statement
• client's critical infrastructure sector
• IT assets needing protection
• laws and regulations
Appropriately used information from authoritative sources.
6 points
Attempted to provide an overview of the organization but this
section lacked detail and/or was not well supported by
information drawn from authoritative sources.
0 points
The overview section was missing or did not present
information about the organization
Outline: Coverage of Required Content Areas
30 points
Provided an excellent, well organized outline which addressed
all 15 required content areas. For each content area in the
outline:
(a) provided a brief introduction,
(b) identified two or more relevant risks / threats which must be
mitigated, and
(c) identified two or more applicable security controls to
mitigate the risks.
Appropriately used three or more authoritative sources.
27 points
Provided a well organized outline which addressed at least 12 of
the required content areas. For each content area in the outline:
(a) provided a brief introduction,
(b) identified at least one relevant risk or threat which must be
mitigated, and
(c) identified two or more applicable security controls to
mitigate the risks.
Appropriately used at least two authoritative sources.
24 points
Provided an acceptable outline which addressed at least 10 of
the required content areas. For each content area in the outline:
(a) provided a brief introduction,
(b) identified at least one relevant risk or threat which must be
mitigated, and
(c) identified two or more applicable security controls to
mitigate the risks.
Appropriately used authoritative sources.
21 points
Provided an outline which addressed at least 7 of the required
content areas. For each content area in the outline:
(a) provided a brief introduction,
(b) identified at least one relevant risk or threat which must be
mitigated, and
(c) identified at least one applicable security controls to
mitigate the risk(s).
Appropriately used authoritative sources.
11 points
Attempted to provide an outline which address some of the
client's requested content areas. Mentioned risks and security
controls. OR, outline was not well supported by authoritative
sources.
0 points
Outline was missing or did not address the required content
areas.
Outline: Coverage of "Protective
Solution
s"
15 points
Identified 10 or more relevant and appropriate protective
solutions (technologies) which can be used to implement
required security controls. Protective solutions are provided for
at least 5 of the enterprise areas covered in the outline.
13 points
Identified 8 or more relevant and appropriate protective
solutions (technologies) which can be used to implement
required security controls. Protective solutions are provided for
at least 4 of the enterprise areas covered in the outline.
11 points
Identified 7 or more relevant and appropriate protective
solutions (technologies) which can be used to implement
required security controls. Protective solutions are provided for
at least 4 of the enterprise areas covered in the outline.
8 points
Identified 5 or more protective solutions (technologies) which
can be used to implement required security controls. Protective
solutions are provided for at least 3 of the enterprise areas
covered in the outline.
4 points
Identified relevant protective technologies for at least 2
enterprise areas.
0 points
Not included or no submission
APA Formatting for Citations and Reference List
5 points
Work contains citations and a reference list with entries for all
cited resources. Reference list entries and in-text citations are
correctly formatted using the appropriate APA style for each
type of resource.
4 points
Work contains citations and a reference list with entries for all
cited resources. One or two minor errors in APA format for in-
text citations and/or reference list entries.
3 points
Work contains citations and a reference list with entries for all
cited resources. No more than 3 minor errors in APA format for
in-text citations and/or reference list entries.
2 points
Work contains a reference list with entries for most of the cited
resources (no more than 2 omissions). No more than 5 minor
errors in APA format for in-text citations and/or reference list
entries.
1 point
Work attempts to credit sources but demonstrates a fundamental
failure to understand and apply the APA formatting standard as
defined in the Publication Manual of the American
Psychological Association (6th ed.).
0 points
Not included or no submission.
Professionalism Part I: Organization & Appearance
5 points
Submitted work shows outstanding organization and the use of
color, fonts, titles, headings and sub-headings, etc. is
appropriate to the assignment type.
4 points
Submitted work has minor style or formatting flaws but still
presents a professional appearance. Submitted work is well
organized and appropriately uses color, fonts, and section
headings (per the assignment’s directions).
3 points
Organization and/or appearance of submitted work could be
improved through better use of fonts, color, titles, headings, etc.
OR Submitted work has multiple style or formatting errors.
Professional appearance could be improved.
2 points
Submitted work has multiple style or formatting errors.
Organization and professional appearance need substantial
improvement.
1 point
Submitted work meets minimum requirements but has major
style and formatting errors. Work is disorganized and needs to
be rewritten for readability and professional appearance.
0 points
Submitted work is poorly organized and formatted. Writing and
presentation are lacking in professional style and appearance.
Work does not reflect college level writing skills. Or, no
submission.
Professionalism Part II: Execution
15 points
No formatting, grammar, spelling, or punctuation errors.
14 points
Work contains minor errors in formatting, grammar, spelling or
punctuation which do not significantly impact professional
appearance.
13 points
Errors in formatting, spelling, grammar, or punctuation which
detract from professional appearance of the submitted work.
11 points
Submitted work has numerous errors in formatting, spelling,
grammar, or punctuation. Work is unprofessional in appearance.
4 points
Submitted work is difficult to read / understand and has
significant errors in formatting, spelling, grammar, punctuation,
or word usage.
0 points
Submitted work is poorly executed OR does not reflect college
level work. Or, no submission
Overall Score
Excellent
90 or more
Outstanding
80 or more
Acceptable
70 or more
Needs Improvement
56 or more
Needs Significant Improvement
36 or more
Missing or Unacceptable Work
0 or more
Bottom of Form
University Library System
This case is a simplified version of a new system for the
University Library. Of course, the library system must keep
track of books. Information is maintained both about book titles
and the individual book copies. Book titles maintain
information about title, author, publisher, and catalog number.
Individual copies maintain copy number, edition, publication
year, ISBN, book status (whether it is on the shelf or loaned
out), and date due back in.
The library also keeps track of its patrons. Because it is a
university library, there are several types of patrons, each with
different privileges. There are faculty patrons, graduate student
patrons, and undergraduate student patrons. Basic information
about all patrons is name, address, and telephone number. For
faculty patrons, additional information is office address and
telephone number. For graduate students, information such as
graduate program and advisor information is maintained. For
undergraduate students, program and total credit hours are
maintained.
The library also keeps information about library loans. A library
loan is a somewhat abstract object. A loan occurs when a patron
approaches the circulation desk with a stack of books to check
out. Over time a patron can have many loans. A loan can have
many physical books associated with it. (And a physical book
can be on many loans over a period of time. Information about
past loans is kept in the database.) So, in this case, an
association class should probably be created for loaned books.
If a patron wants a book that is already checked out, the patron
can put that title on reserve. This is another class that does not
represent a concrete object. Each reservation is for only one
title and one patron. Information such as date reserved, priority,
and date fulfilled is maintained. When a book is fulfilled, the
system associates it with the loan on which it was checked out.
Patrons have access to the library information to search for
book titles and to see whether a book is available. A patron can
also reserve a title if all copies are checked out. When patrons
bring books to the circulation desk, a clerk checks out the books
on a loan. Clerks also check books in. When books are dropped
in the return slot, clerks check in the books. Stocking clerks
keep track of the arrival of new books.
The managers in the library have their own activities. They will
print reports of book titles by category. They also like to see
(online) all overdue books. When books get damaged or
destroyed, managers delete information about book copies.
Managers also like to see what books are on reserve.
Class Diagram and Use Case Diagram for the University Library
System
2
Testimonies
RAND testimonies record testimony presented by RAND
associates to federal, state, or local legislative
committees; government-appointed commissions and panels;
and private review and oversight bodies.
C O R P O R A T I O N
For More Information
Visit RAND at www.rand.org
Explore RAND Testimony
View document details
Support RAND
Browse Reports & Bookstore
Make a charitable contribution
Limited Electronic Distribution Rights
This document and trademark(s) contained herein are protected
by law as indicated in a notice appearing
later in this work. This electronic representation of RAND
intellectual property is provided for non-
commercial use only. Unauthorized posting of RAND electronic
documents to a non-RAND website is
prohibited. RAND electronic documents are protected under
copyright law. Permission is required from
RAND to reproduce, or reuse in another form, any of our
research documents for commercial use. For
information on reprint and linking permissions, please see
RAND Permissions.
Skip all front matter: Jump to Page 16
The RAND Corporation is a nonprofit institution that helps
improve policy and
decisionmaking through research and analysis.
This electronic document was made available from
www.rand.org as a public service
of the RAND Corporation.
CHILDREN AND FAMILIES
EDUCATION AND THE ARTS
ENERGY AND ENVIRONMENT
HEALTH AND HEALTH CARE
INFRASTRUCTURE AND
TRANSPORTATION
INTERNATIONAL AFFAIRS
LAW AND BUSINESS
NATIONAL SECURITY
POPULATION AND AGING
PUBLIC SAFETY
SCIENCE AND TECHNOLOGY
TERRORISM AND
HOMELAND SECURITY
http://www.rand.org/congress/testimony.html
http://www.rand.org/
http://www.rand.org/congress/testimony.html
http://www.rand.org/pubs/testimonies/CT439.html
http://www.rand.org/pubs/online.html
http://www.rand.org/giving/contribute.html
http://www.rand.org/pubs/permissions.html
http://www.rand.org/
http://www.rand.org/topics/children-and-families.html
http://www.rand.org/topics/education-and-the-arts.html
http://www.rand.org/topics/energy-and-environment.html
http://www.rand.org/topics/health-and-health-care.html
http://www.rand.org/topics/infrastructure-and-
transportation.html
http://www.rand.org/topics/international-affairs.html
http://www.rand.org/topics/law-and-business.html
http://www.rand.org/topics/national-security.html
http://www.rand.org/topics/population-and-aging.html
http://www.rand.org/topics/public-safety.html
http://www.rand.org/topics/science-and-technology.html
http://www.rand.org/topics/terrorism-and-homeland-
security.html
Testimony
Perspective on 2015 DoD Cyber Strategy
Lara Schmidt
RAND Office of External Affairs
CT-439
September 2015
Testimony presented before the House Armed Services
Committee on September 29, 2015
This product is part of the RAND Corporation testimony series.
RAND testimonies record testimony presented by RAND
associates
to federal, state, or local legislative committees; government-
appointed commissions and panels; and private review and
oversight
bodies. The RAND Corporation is a nonprofit research
organization providing objective analysis and effective
solutions that address
the challenges facing the public and private sectors around the
world. RAND’s publications do not necessarily reflect the
opinions of
its research clients and sponsors. R ® is a registered trademark.
C O R P O R A T I O N
Published 2015 by the RAND Corporation
1776 Main Street, P.O. Box 2138, Santa Monica, CA 90407-
2138
1200 South Hayes Street, Arlington, VA 22202-5050
4570 Fifth Avenue, Suite 600, Pittsburgh, PA 15213-2665
RAND URL: http://www.rand.org/
To order RAND documents or to obtain additional information,
contact
Distribution Services: Telephone: (310) 451-7002;
Email: [email protected]
http://www.rand.org/
mailto:[email protected]
1
Lara Schmidt1
The RAND Corporation
Perspective on 2015 DoD Cyber Strategy2
Before the Committee on Armed Services
United States House of Representatives
September 29, 2015
Chairman Thornberry, Ranking Member Smith, and
distinguished members of the House Armed
Services Committee, thank you for inviting me here today to
testify at this important hearing,
“Outside Perspectives on the Department of Defense Cyber
Strategy.”
In April 2015, the DoD released a new cyber strategy in order to
“guide the development of DoD’s
cyber forces and strengthen [its] cyber defense and cyber
deterrence posture.”4 The Strategy
identifies three cyber missions for DoD: (1) defending its own
networks, systems, and data; (2)
defending U.S. national interests against cyberattacks of
“significant consequence,” including loss
of life, significant damage to property, serious adverse U.S.
foreign policy consequences, and
serious economic impact; and (3) when directed by the
President or Secretary of Defense,
supporting military operations and contingency plans with cyber
operations, including by
disrupting an adversary’s military-related networks.
DoD further laid out strategic goals aimed at ensuring its ability
to accomplish these cyber
missions, including goals to:5
• Build and maintain ready forces and capabilities to conduct
cyber operations;
• Defend DoD networks, secure DoD data, and mitigate risks to
DoD missions;
• Build and maintain viable cyber options, and plan to use them
to control conflict
escalation and shape the conflict environment at all stages.
1 The opinions and conclusions expressed in this testimony are
the author’s alone and should not be
interpreted as representing those of RAND or any of the
sponsors of its research. This product is part of the
RAND Corporation testimony series. RAND testimonies record
testimony presented by RAND associates to
federal, state, or local legislative committees; government-
appointed commissions and panels; and private
review and oversight bodies. The RAND Corporation is a
nonprofit research organization providing objective
analysis and effective solutions that address the challenges
facing the public and private sectors around the
world. RAND’s publications do not necessarily reflect the
opinions of its research clients and sponsors.
2 This testimony is available for free download at
http://www.rand.org/pubs/testimonies/CT439/.
4 Department of Defense, The DoD Cyber Strategy, April 2015.
5 Two additional goals of the DoD Cyber Strategy not discussed
in this Testimony are: (a) Be prepared to
defend the U.S. homeland and U.S. vital interests from
cyberattacks of significant consequence; and (b)
Build and maintain international alliances and partnerships to
deter shared threats and increase international
security and stability.
http://www.rand.org/pubs/testimonies/CT439/
2
Implementation initiatives – and the attendant resources – to
achieve these goals are needed in
order to meet challenges associated with the rapid rate of
change in technology, the growing
cyber threat, and the need to integrate cyber operations with
operations in other warfighting
domains.
Cyber Workforce
Building and maintaining a qualified workforce underlies all of
the goals of the Strategy. However,
U.S. Cyber Command reports that it is “hard pressed” to
identify, train, and retain qualified
personnel.6 How can DoD ensure a ready-workforce of military,
civilian, and contractor personnel,
capable of meeting the demands of the nation? Like the
commercial sector, DoD requires staff to
perform IT functions (e.g., configure databases, install and
manage applications, provide
customer support, securely configure networks, test new
designs, develop system architectures),
and cybersecurity functions (e.g., identify and analyze network
intrusions or other threats,
develop security tools, respond to security emergencies, assess
threats and vulnerabilities and
remediate risk).7 Furthermore, DoD requires specialized
workforces associated with military cyber
operations that are not commonly found in the commercial
sector, though applicable skillsets
overlap to some extent with elite commercial cybersecurity
personnel. How can DoD compete
with the rest of the technology sector – e.g., cybersecurity
companies, software and hardware
developers, the defense industrial base, not to mention IT
departments in companies across the
country – also seeking to identify an educated and capable
workforce? It is helpful to understand
how the commercial sector identifies staff.
Commercial practice is to hire cyber staff with a bachelor’s
degree, which provides a strong
foundation of relevant knowledge, and demonstrates an ability
to succeed in a professional
setting. Companies usually recruit graduates of reputable
colleges with STEM degrees – science,
technology, engineering, and mathematics – especially computer
science, information security,
information technology, computer engineering, and electrical
engineering.8 However, unlike the
commercial sector, the majority of DoD’s military cyber
workforce is enlisted and, therefore, not
typically required to have college degrees. Therefore, DoD will
need to implement substantially
more-rigorous selection criteria in order to vet non-degreed
candidates to ensure enlisted
accessions and new civilian hires are likely to succeed in the
cyber workforce . For example,
6 Admiral Michael Rogers, Statement before the House
Committee on Armed Services, Subcommittee on
Emerging Threats and Capabilities, 4 March 2015.
7 National Initiative for Cybersecurity Careers and Studies,
Interactive national Cybersecurity Workforce
Framework, Washington, D.C.: Department of Homeland
Security, undated.
8 Schmidt, Lara and Caolionn O’Connell et al, Cyber Practices:
What Can the U.S. Air Force Learn from the
Commercial Sector?, Santa Monica, Calif.: RAND Corporation,
RR-847-AF, 2015.
3
cyber aptitude- or skills-testing or possession of professional
certificates9 can evaluate a
candidate’s expertise or mind-set for a particular discipline.
Participation in activities such as,
cyber competitions, open-source or ethical-hacker forums, or
bug bounty programs can indicate a
personal interest in and affinity for cyber. In fact, commercial
practice for elite, highly paid
cybersecurity jobs is to screen for such indications of aptitude
and affinity in addition to formal
educational requirements. These practices merit evaluation for
implementation in DoD to ensure
military and civilian staff are qualified to meet the challenges
the Department faces.
Furthermore, the commercial sector reports that their ability to
retain skilled personnel is closely
linked to job satisfaction gained through good working
environments, belief in the mission,
opportunities for training and professional development, and
access to interesting assignments.
Research indicates that corporate retention programs also seek
to provide satisfying career paths
for their cyber workforces, including not only a track to
promotion through management but also a
technical track. They also provide high performers opportunities
to rotate among units to learn the
business, and exposure to professional interaction outside the
company.
10
Though some worry that DoD hiring and retention suffers
because it cannot keep pace with
commercial pay, median salaries for corporate IT and
cybersecurity professionals are similar to
the pay and benefits for military personnel, when accounting for
additional allowances and tax
advantages.11 One exception relates to the most elite
cybersecurity professionals, those with
unique skills that few possess (e.g., software reverse
engineering, advanced malware analysis,
identifying advanced stealthy attacks). These cyber “ninjas” are
the competitive advantage for
cutting-edge cybersecurity firms and are increasingly in demand
in other corporate settings. The
relative scarcity of these skill sets allows qualified individuals
to command high salaries.12
Therefore, DoD might similarly find personnel with these
unique skills to be worthy of retention
programs not offered to the majority of the cyber workforce.13
9 To name just a few: Microsoft Certified

More Related Content

Similar to Top of FormRubric Name Project 1 Outline for an Enterprise IT .docx

Project 2Develop an executive-level PowerPoint presentation that.docx
Project 2Develop an executive-level PowerPoint presentation that.docxProject 2Develop an executive-level PowerPoint presentation that.docx
Project 2Develop an executive-level PowerPoint presentation that.docx
wkyra78
 
Discussion 1Preparation for collective bargaining involves four .docx
Discussion 1Preparation for collective bargaining involves four .docxDiscussion 1Preparation for collective bargaining involves four .docx
Discussion 1Preparation for collective bargaining involves four .docx
duketjoy27252
 
Week 3 Assignment 2 Grading GuideTotal Possible Score 5.00I.docx
Week 3 Assignment 2 Grading GuideTotal Possible Score 5.00I.docxWeek 3 Assignment 2 Grading GuideTotal Possible Score 5.00I.docx
Week 3 Assignment 2 Grading GuideTotal Possible Score 5.00I.docx
cockekeshia
 
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
shyaminfo30
 
PA.docx
PA.docxPA.docx
PA.docx
pauline234567
 
Ashford 3 - Week 2 - AssignmentGlobal Supply Chain Management Qu.docx
Ashford 3 - Week 2 - AssignmentGlobal Supply Chain Management Qu.docxAshford 3 - Week 2 - AssignmentGlobal Supply Chain Management Qu.docx
Ashford 3 - Week 2 - AssignmentGlobal Supply Chain Management Qu.docx
lauricesatu
 
Rubric Name Project 7 Organization Enterprise Plan and Security P.docx
Rubric Name Project 7 Organization Enterprise Plan and Security P.docxRubric Name Project 7 Organization Enterprise Plan and Security P.docx
Rubric Name Project 7 Organization Enterprise Plan and Security P.docx
SUBHI7
 
Criteria18-20 PointsProposed solution is appropriate to proces.docx
Criteria18-20 PointsProposed solution is appropriate to proces.docxCriteria18-20 PointsProposed solution is appropriate to proces.docx
Criteria18-20 PointsProposed solution is appropriate to proces.docx
williejgrant41084
 
n this assignment, you will demonstrate your mastery of the followin.docx
n this assignment, you will demonstrate your mastery of the followin.docxn this assignment, you will demonstrate your mastery of the followin.docx
n this assignment, you will demonstrate your mastery of the followin.docx
veachflossie
 
Balance SheetPollys Pet ProductsBalance Sheet as of December 31, .docx
Balance SheetPollys Pet ProductsBalance Sheet as of December 31, .docxBalance SheetPollys Pet ProductsBalance Sheet as of December 31, .docx
Balance SheetPollys Pet ProductsBalance Sheet as of December 31, .docx
jasoninnes20
 
Ashford 3 - Week 2 - AssignmentVoice of the CustomerIn the Und.docx
Ashford 3 - Week 2 - AssignmentVoice of the CustomerIn the Und.docxAshford 3 - Week 2 - AssignmentVoice of the CustomerIn the Und.docx
Ashford 3 - Week 2 - AssignmentVoice of the CustomerIn the Und.docx
lauricesatu
 
Week 4 Written Assignment Stored Procedures as a Security Measure.docx
Week 4 Written Assignment Stored Procedures as a Security Measure.docxWeek 4 Written Assignment Stored Procedures as a Security Measure.docx
Week 4 Written Assignment Stored Procedures as a Security Measure.docx
cockekeshia
 
18-20 PointsProposed solution is appropriate to process and case.docx
18-20 PointsProposed solution is appropriate to process and case.docx18-20 PointsProposed solution is appropriate to process and case.docx
18-20 PointsProposed solution is appropriate to process and case.docx
tangyechloe
 
Stage 1 Assignment InstructionsUsing the case study, the overv.docx
Stage 1 Assignment InstructionsUsing the case study, the overv.docxStage 1 Assignment InstructionsUsing the case study, the overv.docx
Stage 1 Assignment InstructionsUsing the case study, the overv.docx
susanschei
 
Provided an excellent overview of disaster recovery IT service con.docx
Provided an excellent overview of disaster recovery  IT service con.docxProvided an excellent overview of disaster recovery  IT service con.docx
Provided an excellent overview of disaster recovery IT service con.docx
bfingarjcmc
 
Win the contract aerospace drones is gaining visibility in
Win the contract aerospace drones is gaining visibility inWin the contract aerospace drones is gaining visibility in
Win the contract aerospace drones is gaining visibility in
SALU18
 
ComputerizationIn a four- to five-page paper (not including .docx
ComputerizationIn a four- to five-page paper (not including .docxComputerizationIn a four- to five-page paper (not including .docx
ComputerizationIn a four- to five-page paper (not including .docx
sheenaat5wa
 

Similar to Top of FormRubric Name Project 1 Outline for an Enterprise IT .docx (17)

Project 2Develop an executive-level PowerPoint presentation that.docx
Project 2Develop an executive-level PowerPoint presentation that.docxProject 2Develop an executive-level PowerPoint presentation that.docx
Project 2Develop an executive-level PowerPoint presentation that.docx
 
Discussion 1Preparation for collective bargaining involves four .docx
Discussion 1Preparation for collective bargaining involves four .docxDiscussion 1Preparation for collective bargaining involves four .docx
Discussion 1Preparation for collective bargaining involves four .docx
 
Week 3 Assignment 2 Grading GuideTotal Possible Score 5.00I.docx
Week 3 Assignment 2 Grading GuideTotal Possible Score 5.00I.docxWeek 3 Assignment 2 Grading GuideTotal Possible Score 5.00I.docx
Week 3 Assignment 2 Grading GuideTotal Possible Score 5.00I.docx
 
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
 
PA.docx
PA.docxPA.docx
PA.docx
 
Ashford 3 - Week 2 - AssignmentGlobal Supply Chain Management Qu.docx
Ashford 3 - Week 2 - AssignmentGlobal Supply Chain Management Qu.docxAshford 3 - Week 2 - AssignmentGlobal Supply Chain Management Qu.docx
Ashford 3 - Week 2 - AssignmentGlobal Supply Chain Management Qu.docx
 
Rubric Name Project 7 Organization Enterprise Plan and Security P.docx
Rubric Name Project 7 Organization Enterprise Plan and Security P.docxRubric Name Project 7 Organization Enterprise Plan and Security P.docx
Rubric Name Project 7 Organization Enterprise Plan and Security P.docx
 
Criteria18-20 PointsProposed solution is appropriate to proces.docx
Criteria18-20 PointsProposed solution is appropriate to proces.docxCriteria18-20 PointsProposed solution is appropriate to proces.docx
Criteria18-20 PointsProposed solution is appropriate to proces.docx
 
n this assignment, you will demonstrate your mastery of the followin.docx
n this assignment, you will demonstrate your mastery of the followin.docxn this assignment, you will demonstrate your mastery of the followin.docx
n this assignment, you will demonstrate your mastery of the followin.docx
 
Balance SheetPollys Pet ProductsBalance Sheet as of December 31, .docx
Balance SheetPollys Pet ProductsBalance Sheet as of December 31, .docxBalance SheetPollys Pet ProductsBalance Sheet as of December 31, .docx
Balance SheetPollys Pet ProductsBalance Sheet as of December 31, .docx
 
Ashford 3 - Week 2 - AssignmentVoice of the CustomerIn the Und.docx
Ashford 3 - Week 2 - AssignmentVoice of the CustomerIn the Und.docxAshford 3 - Week 2 - AssignmentVoice of the CustomerIn the Und.docx
Ashford 3 - Week 2 - AssignmentVoice of the CustomerIn the Und.docx
 
Week 4 Written Assignment Stored Procedures as a Security Measure.docx
Week 4 Written Assignment Stored Procedures as a Security Measure.docxWeek 4 Written Assignment Stored Procedures as a Security Measure.docx
Week 4 Written Assignment Stored Procedures as a Security Measure.docx
 
18-20 PointsProposed solution is appropriate to process and case.docx
18-20 PointsProposed solution is appropriate to process and case.docx18-20 PointsProposed solution is appropriate to process and case.docx
18-20 PointsProposed solution is appropriate to process and case.docx
 
Stage 1 Assignment InstructionsUsing the case study, the overv.docx
Stage 1 Assignment InstructionsUsing the case study, the overv.docxStage 1 Assignment InstructionsUsing the case study, the overv.docx
Stage 1 Assignment InstructionsUsing the case study, the overv.docx
 
Provided an excellent overview of disaster recovery IT service con.docx
Provided an excellent overview of disaster recovery  IT service con.docxProvided an excellent overview of disaster recovery  IT service con.docx
Provided an excellent overview of disaster recovery IT service con.docx
 
Win the contract aerospace drones is gaining visibility in
Win the contract aerospace drones is gaining visibility inWin the contract aerospace drones is gaining visibility in
Win the contract aerospace drones is gaining visibility in
 
ComputerizationIn a four- to five-page paper (not including .docx
ComputerizationIn a four- to five-page paper (not including .docxComputerizationIn a four- to five-page paper (not including .docx
ComputerizationIn a four- to five-page paper (not including .docx
 

More from edwardmarivel

deadline 6 hours 7.3 y 7.47.4.docx
deadline  6 hours 7.3 y 7.47.4.docxdeadline  6 hours 7.3 y 7.47.4.docx
deadline 6 hours 7.3 y 7.47.4.docx
edwardmarivel
 
Deadline 6 PM Friday September 27, 201310 Project Management Que.docx
Deadline 6 PM Friday September 27, 201310 Project Management Que.docxDeadline 6 PM Friday September 27, 201310 Project Management Que.docx
Deadline 6 PM Friday September 27, 201310 Project Management Que.docx
edwardmarivel
 
DEADLINE 15 HOURS6 PAGES UNDERGRADUATECOURSEWORKHARV.docx
DEADLINE 15 HOURS6 PAGES UNDERGRADUATECOURSEWORKHARV.docxDEADLINE 15 HOURS6 PAGES UNDERGRADUATECOURSEWORKHARV.docx
DEADLINE 15 HOURS6 PAGES UNDERGRADUATECOURSEWORKHARV.docx
edwardmarivel
 
De nada.El gusto es mío.Encantada.Me llamo Pepe.Muy bien, grac.docx
De nada.El gusto es mío.Encantada.Me llamo Pepe.Muy bien, grac.docxDe nada.El gusto es mío.Encantada.Me llamo Pepe.Muy bien, grac.docx
De nada.El gusto es mío.Encantada.Me llamo Pepe.Muy bien, grac.docx
edwardmarivel
 
DDBA 8307 Week 4 Assignment TemplateJohn DoeDDBA 8.docx
DDBA 8307 Week 4 Assignment TemplateJohn DoeDDBA 8.docxDDBA 8307 Week 4 Assignment TemplateJohn DoeDDBA 8.docx
DDBA 8307 Week 4 Assignment TemplateJohn DoeDDBA 8.docx
edwardmarivel
 
DDL 24 hours reading the article and writing a 1-page doubl.docx
DDL 24 hours reading the article and writing a 1-page doubl.docxDDL 24 hours reading the article and writing a 1-page doubl.docx
DDL 24 hours reading the article and writing a 1-page doubl.docx
edwardmarivel
 
DCF valuation methodSuper-normal growth modelApplicatio.docx
DCF valuation methodSuper-normal growth modelApplicatio.docxDCF valuation methodSuper-normal growth modelApplicatio.docx
DCF valuation methodSuper-normal growth modelApplicatio.docx
edwardmarivel
 
ddr-.docx
ddr-.docxddr-.docx
ddr-.docx
edwardmarivel
 
DDBA 8307 Week 2 Assignment ExemplarJohn Doe[footnoteRef1] .docx
DDBA 8307 Week 2 Assignment ExemplarJohn Doe[footnoteRef1] .docxDDBA 8307 Week 2 Assignment ExemplarJohn Doe[footnoteRef1] .docx
DDBA 8307 Week 2 Assignment ExemplarJohn Doe[footnoteRef1] .docx
edwardmarivel
 
DBM380 v14Create a DatabaseDBM380 v14Page 2 of 2Create a D.docx
DBM380 v14Create a DatabaseDBM380 v14Page 2 of 2Create a D.docxDBM380 v14Create a DatabaseDBM380 v14Page 2 of 2Create a D.docx
DBM380 v14Create a DatabaseDBM380 v14Page 2 of 2Create a D.docx
edwardmarivel
 
DBA CAPSTONE TEMPLATEThe pages in this template are correctl.docx
DBA CAPSTONE TEMPLATEThe pages in this template are correctl.docxDBA CAPSTONE TEMPLATEThe pages in this template are correctl.docx
DBA CAPSTONE TEMPLATEThe pages in this template are correctl.docx
edwardmarivel
 
DB3.1 Mexico corruptionDiscuss the connection between pol.docx
DB3.1 Mexico corruptionDiscuss the connection between pol.docxDB3.1 Mexico corruptionDiscuss the connection between pol.docx
DB3.1 Mexico corruptionDiscuss the connection between pol.docx
edwardmarivel
 
DB2Pepsi Co and Coke American beverage giants, must adhere to th.docx
DB2Pepsi Co and Coke American beverage giants, must adhere to th.docxDB2Pepsi Co and Coke American beverage giants, must adhere to th.docx
DB2Pepsi Co and Coke American beverage giants, must adhere to th.docx
edwardmarivel
 
DB1 What Ive observedHave you ever experienced a self-managed .docx
DB1 What Ive observedHave you ever experienced a self-managed .docxDB1 What Ive observedHave you ever experienced a self-managed .docx
DB1 What Ive observedHave you ever experienced a self-managed .docx
edwardmarivel
 
DB Response 1I agree with the decision to search the house. Ther.docx
DB Response 1I agree with the decision to search the house. Ther.docxDB Response 1I agree with the decision to search the house. Ther.docx
DB Response 1I agree with the decision to search the house. Ther.docx
edwardmarivel
 
DB Response prompt ZAKChapter 7, Q1.Customers are expecting.docx
DB Response prompt  ZAKChapter 7, Q1.Customers are expecting.docxDB Response prompt  ZAKChapter 7, Q1.Customers are expecting.docx
DB Response prompt ZAKChapter 7, Q1.Customers are expecting.docx
edwardmarivel
 
DB Topic of Discussion Information-related CapabilitiesAnalyze .docx
DB Topic of Discussion Information-related CapabilitiesAnalyze .docxDB Topic of Discussion Information-related CapabilitiesAnalyze .docx
DB Topic of Discussion Information-related CapabilitiesAnalyze .docx
edwardmarivel
 
DB Instructions Each reply must be 250–300 words with a minim.docx
DB Instructions Each reply must be 250–300 words with a minim.docxDB Instructions Each reply must be 250–300 words with a minim.docx
DB Instructions Each reply must be 250–300 words with a minim.docx
edwardmarivel
 
DB Defining White Collar CrimeHow would you define white co.docx
DB Defining White Collar CrimeHow would you define white co.docxDB Defining White Collar CrimeHow would you define white co.docx
DB Defining White Collar CrimeHow would you define white co.docx
edwardmarivel
 
DAVID H. ROSENBLOOMSECOND EDITIONAdministrative Law .docx
DAVID H. ROSENBLOOMSECOND EDITIONAdministrative Law .docxDAVID H. ROSENBLOOMSECOND EDITIONAdministrative Law .docx
DAVID H. ROSENBLOOMSECOND EDITIONAdministrative Law .docx
edwardmarivel
 

More from edwardmarivel (20)

deadline 6 hours 7.3 y 7.47.4.docx
deadline  6 hours 7.3 y 7.47.4.docxdeadline  6 hours 7.3 y 7.47.4.docx
deadline 6 hours 7.3 y 7.47.4.docx
 
Deadline 6 PM Friday September 27, 201310 Project Management Que.docx
Deadline 6 PM Friday September 27, 201310 Project Management Que.docxDeadline 6 PM Friday September 27, 201310 Project Management Que.docx
Deadline 6 PM Friday September 27, 201310 Project Management Que.docx
 
DEADLINE 15 HOURS6 PAGES UNDERGRADUATECOURSEWORKHARV.docx
DEADLINE 15 HOURS6 PAGES UNDERGRADUATECOURSEWORKHARV.docxDEADLINE 15 HOURS6 PAGES UNDERGRADUATECOURSEWORKHARV.docx
DEADLINE 15 HOURS6 PAGES UNDERGRADUATECOURSEWORKHARV.docx
 
De nada.El gusto es mío.Encantada.Me llamo Pepe.Muy bien, grac.docx
De nada.El gusto es mío.Encantada.Me llamo Pepe.Muy bien, grac.docxDe nada.El gusto es mío.Encantada.Me llamo Pepe.Muy bien, grac.docx
De nada.El gusto es mío.Encantada.Me llamo Pepe.Muy bien, grac.docx
 
DDBA 8307 Week 4 Assignment TemplateJohn DoeDDBA 8.docx
DDBA 8307 Week 4 Assignment TemplateJohn DoeDDBA 8.docxDDBA 8307 Week 4 Assignment TemplateJohn DoeDDBA 8.docx
DDBA 8307 Week 4 Assignment TemplateJohn DoeDDBA 8.docx
 
DDL 24 hours reading the article and writing a 1-page doubl.docx
DDL 24 hours reading the article and writing a 1-page doubl.docxDDL 24 hours reading the article and writing a 1-page doubl.docx
DDL 24 hours reading the article and writing a 1-page doubl.docx
 
DCF valuation methodSuper-normal growth modelApplicatio.docx
DCF valuation methodSuper-normal growth modelApplicatio.docxDCF valuation methodSuper-normal growth modelApplicatio.docx
DCF valuation methodSuper-normal growth modelApplicatio.docx
 
ddr-.docx
ddr-.docxddr-.docx
ddr-.docx
 
DDBA 8307 Week 2 Assignment ExemplarJohn Doe[footnoteRef1] .docx
DDBA 8307 Week 2 Assignment ExemplarJohn Doe[footnoteRef1] .docxDDBA 8307 Week 2 Assignment ExemplarJohn Doe[footnoteRef1] .docx
DDBA 8307 Week 2 Assignment ExemplarJohn Doe[footnoteRef1] .docx
 
DBM380 v14Create a DatabaseDBM380 v14Page 2 of 2Create a D.docx
DBM380 v14Create a DatabaseDBM380 v14Page 2 of 2Create a D.docxDBM380 v14Create a DatabaseDBM380 v14Page 2 of 2Create a D.docx
DBM380 v14Create a DatabaseDBM380 v14Page 2 of 2Create a D.docx
 
DBA CAPSTONE TEMPLATEThe pages in this template are correctl.docx
DBA CAPSTONE TEMPLATEThe pages in this template are correctl.docxDBA CAPSTONE TEMPLATEThe pages in this template are correctl.docx
DBA CAPSTONE TEMPLATEThe pages in this template are correctl.docx
 
DB3.1 Mexico corruptionDiscuss the connection between pol.docx
DB3.1 Mexico corruptionDiscuss the connection between pol.docxDB3.1 Mexico corruptionDiscuss the connection between pol.docx
DB3.1 Mexico corruptionDiscuss the connection between pol.docx
 
DB2Pepsi Co and Coke American beverage giants, must adhere to th.docx
DB2Pepsi Co and Coke American beverage giants, must adhere to th.docxDB2Pepsi Co and Coke American beverage giants, must adhere to th.docx
DB2Pepsi Co and Coke American beverage giants, must adhere to th.docx
 
DB1 What Ive observedHave you ever experienced a self-managed .docx
DB1 What Ive observedHave you ever experienced a self-managed .docxDB1 What Ive observedHave you ever experienced a self-managed .docx
DB1 What Ive observedHave you ever experienced a self-managed .docx
 
DB Response 1I agree with the decision to search the house. Ther.docx
DB Response 1I agree with the decision to search the house. Ther.docxDB Response 1I agree with the decision to search the house. Ther.docx
DB Response 1I agree with the decision to search the house. Ther.docx
 
DB Response prompt ZAKChapter 7, Q1.Customers are expecting.docx
DB Response prompt  ZAKChapter 7, Q1.Customers are expecting.docxDB Response prompt  ZAKChapter 7, Q1.Customers are expecting.docx
DB Response prompt ZAKChapter 7, Q1.Customers are expecting.docx
 
DB Topic of Discussion Information-related CapabilitiesAnalyze .docx
DB Topic of Discussion Information-related CapabilitiesAnalyze .docxDB Topic of Discussion Information-related CapabilitiesAnalyze .docx
DB Topic of Discussion Information-related CapabilitiesAnalyze .docx
 
DB Instructions Each reply must be 250–300 words with a minim.docx
DB Instructions Each reply must be 250–300 words with a minim.docxDB Instructions Each reply must be 250–300 words with a minim.docx
DB Instructions Each reply must be 250–300 words with a minim.docx
 
DB Defining White Collar CrimeHow would you define white co.docx
DB Defining White Collar CrimeHow would you define white co.docxDB Defining White Collar CrimeHow would you define white co.docx
DB Defining White Collar CrimeHow would you define white co.docx
 
DAVID H. ROSENBLOOMSECOND EDITIONAdministrative Law .docx
DAVID H. ROSENBLOOMSECOND EDITIONAdministrative Law .docxDAVID H. ROSENBLOOMSECOND EDITIONAdministrative Law .docx
DAVID H. ROSENBLOOMSECOND EDITIONAdministrative Law .docx
 

Recently uploaded

UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 

Recently uploaded (20)

UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 

Top of FormRubric Name Project 1 Outline for an Enterprise IT .docx

  • 1. Top of Form Rubric Name: Project 1: Outline for an Enterprise IT Security Policy v2 Criteria Excellent Outstanding Acceptable Needs Improvement Needs Significant Improvement Missing or Unacceptable Introduction 10 points Provided an excellent introduction to the deliverable which clearly, concisely, and accurately summarized the structure and contents of the outline. Appropriately used information from 3 or more authoritative sources to support the introduction. 8.5 points Provided an outstanding introduction to the deliverable which clearly and accurately summarized the structure and contents of the outline. Appropriately used information from 2 or more authoritative sources to support the introduction. 7 points Provided an acceptable introduction to the deliverable which
  • 2. summarized the structure and contents of the outline. Appropriately used information from authoritative sources to support the introduction. 6 points Provided an introduction to the deliverable but the section lacked some required details. Information from authoritative sources was mentioned and used. 4 points Attempted to provide an introduction to the deliverable but this section lacked detail and/or was not well supported by information drawn from authoritative sources. 0 points The introduction section was missing or did not present information about the contents of the deliverable. Overview of Organization 20 points Provided an excellent overview of the organization which clearly and concisely addressed the following: • mission statement for the client • brief overview of the client’s organization • client's critical infrastructure sector • information, information systems, and information infrastructure in the enterprise • major IT related regulations and laws impacting client's IT operations • products / services which the organization provides to its customers Appropriately used information from 3 or more authoritative sources. 18 points
  • 3. Provided an outstanding overview of the organization which addressed four or more of the following: • mission statement for the client • brief overview of the client’s organization • client's critical infrastructure sector • information, information systems, and information infrastructure in the enterprise • major IT related regulations and laws impacting client's IT operations • products / services which the organization provides to its customers Appropriately used information from 2 or more authoritative sources. 16 points Provided an excellent overview of the organization which addressed three or more of the following: • mission statement for the client • brief overview of the client’s organization • client's critical infrastructure sector • information, information systems, and information infrastructure in the enterprise • major IT related regulations and laws impacting client's IT operations • products / services which the organization provides to its customers Appropriately used information from authoritative sources. 11 points Provided an overview of the organization which addressed at least two of the following: • mission statement • client's critical infrastructure sector • IT assets needing protection
  • 4. • laws and regulations Appropriately used information from authoritative sources. 6 points Attempted to provide an overview of the organization but this section lacked detail and/or was not well supported by information drawn from authoritative sources. 0 points The overview section was missing or did not present information about the organization Outline: Coverage of Required Content Areas 30 points Provided an excellent, well organized outline which addressed all 15 required content areas. For each content area in the outline: (a) provided a brief introduction, (b) identified two or more relevant risks / threats which must be mitigated, and (c) identified two or more applicable security controls to mitigate the risks. Appropriately used three or more authoritative sources. 27 points Provided a well organized outline which addressed at least 12 of the required content areas. For each content area in the outline: (a) provided a brief introduction, (b) identified at least one relevant risk or threat which must be mitigated, and (c) identified two or more applicable security controls to mitigate the risks. Appropriately used at least two authoritative sources. 24 points
  • 5. Provided an acceptable outline which addressed at least 10 of the required content areas. For each content area in the outline: (a) provided a brief introduction, (b) identified at least one relevant risk or threat which must be mitigated, and (c) identified two or more applicable security controls to mitigate the risks. Appropriately used authoritative sources. 21 points Provided an outline which addressed at least 7 of the required content areas. For each content area in the outline: (a) provided a brief introduction, (b) identified at least one relevant risk or threat which must be mitigated, and (c) identified at least one applicable security controls to mitigate the risk(s). Appropriately used authoritative sources. 11 points Attempted to provide an outline which address some of the client's requested content areas. Mentioned risks and security controls. OR, outline was not well supported by authoritative sources. 0 points Outline was missing or did not address the required content areas. Outline: Coverage of "Protective
  • 6. Solution s" 15 points Identified 10 or more relevant and appropriate protective solutions (technologies) which can be used to implement required security controls. Protective solutions are provided for at least 5 of the enterprise areas covered in the outline. 13 points Identified 8 or more relevant and appropriate protective solutions (technologies) which can be used to implement required security controls. Protective solutions are provided for at least 4 of the enterprise areas covered in the outline. 11 points Identified 7 or more relevant and appropriate protective solutions (technologies) which can be used to implement required security controls. Protective solutions are provided for at least 4 of the enterprise areas covered in the outline. 8 points
  • 7. Identified 5 or more protective solutions (technologies) which can be used to implement required security controls. Protective solutions are provided for at least 3 of the enterprise areas covered in the outline. 4 points Identified relevant protective technologies for at least 2 enterprise areas. 0 points Not included or no submission APA Formatting for Citations and Reference List 5 points Work contains citations and a reference list with entries for all cited resources. Reference list entries and in-text citations are correctly formatted using the appropriate APA style for each type of resource. 4 points Work contains citations and a reference list with entries for all cited resources. One or two minor errors in APA format for in- text citations and/or reference list entries. 3 points
  • 8. Work contains citations and a reference list with entries for all cited resources. No more than 3 minor errors in APA format for in-text citations and/or reference list entries. 2 points Work contains a reference list with entries for most of the cited resources (no more than 2 omissions). No more than 5 minor errors in APA format for in-text citations and/or reference list entries. 1 point Work attempts to credit sources but demonstrates a fundamental failure to understand and apply the APA formatting standard as defined in the Publication Manual of the American Psychological Association (6th ed.). 0 points Not included or no submission. Professionalism Part I: Organization & Appearance 5 points Submitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type. 4 points
  • 9. Submitted work has minor style or formatting flaws but still presents a professional appearance. Submitted work is well organized and appropriately uses color, fonts, and section headings (per the assignment’s directions). 3 points Organization and/or appearance of submitted work could be improved through better use of fonts, color, titles, headings, etc. OR Submitted work has multiple style or formatting errors. Professional appearance could be improved. 2 points Submitted work has multiple style or formatting errors. Organization and professional appearance need substantial improvement. 1 point Submitted work meets minimum requirements but has major style and formatting errors. Work is disorganized and needs to be rewritten for readability and professional appearance. 0 points Submitted work is poorly organized and formatted. Writing and presentation are lacking in professional style and appearance.
  • 10. Work does not reflect college level writing skills. Or, no submission. Professionalism Part II: Execution 15 points No formatting, grammar, spelling, or punctuation errors. 14 points Work contains minor errors in formatting, grammar, spelling or punctuation which do not significantly impact professional appearance. 13 points Errors in formatting, spelling, grammar, or punctuation which detract from professional appearance of the submitted work. 11 points Submitted work has numerous errors in formatting, spelling, grammar, or punctuation. Work is unprofessional in appearance. 4 points Submitted work is difficult to read / understand and has significant errors in formatting, spelling, grammar, punctuation, or word usage. 0 points
  • 11. Submitted work is poorly executed OR does not reflect college level work. Or, no submission Overall Score Excellent 90 or more Outstanding 80 or more Acceptable 70 or more Needs Improvement 56 or more Needs Significant Improvement 36 or more Missing or Unacceptable Work 0 or more Bottom of Form
  • 12. University Library System This case is a simplified version of a new system for the University Library. Of course, the library system must keep track of books. Information is maintained both about book titles and the individual book copies. Book titles maintain information about title, author, publisher, and catalog number. Individual copies maintain copy number, edition, publication year, ISBN, book status (whether it is on the shelf or loaned out), and date due back in. The library also keeps track of its patrons. Because it is a university library, there are several types of patrons, each with different privileges. There are faculty patrons, graduate student patrons, and undergraduate student patrons. Basic information about all patrons is name, address, and telephone number. For faculty patrons, additional information is office address and telephone number. For graduate students, information such as graduate program and advisor information is maintained. For undergraduate students, program and total credit hours are maintained. The library also keeps information about library loans. A library loan is a somewhat abstract object. A loan occurs when a patron approaches the circulation desk with a stack of books to check out. Over time a patron can have many loans. A loan can have
  • 13. many physical books associated with it. (And a physical book can be on many loans over a period of time. Information about past loans is kept in the database.) So, in this case, an association class should probably be created for loaned books. If a patron wants a book that is already checked out, the patron can put that title on reserve. This is another class that does not represent a concrete object. Each reservation is for only one title and one patron. Information such as date reserved, priority, and date fulfilled is maintained. When a book is fulfilled, the system associates it with the loan on which it was checked out. Patrons have access to the library information to search for book titles and to see whether a book is available. A patron can also reserve a title if all copies are checked out. When patrons bring books to the circulation desk, a clerk checks out the books on a loan. Clerks also check books in. When books are dropped in the return slot, clerks check in the books. Stocking clerks keep track of the arrival of new books. The managers in the library have their own activities. They will print reports of book titles by category. They also like to see (online) all overdue books. When books get damaged or destroyed, managers delete information about book copies. Managers also like to see what books are on reserve.
  • 14. Class Diagram and Use Case Diagram for the University Library System 2 Testimonies RAND testimonies record testimony presented by RAND associates to federal, state, or local legislative committees; government-appointed commissions and panels; and private review and oversight bodies. C O R P O R A T I O N For More Information Visit RAND at www.rand.org
  • 15. Explore RAND Testimony View document details Support RAND Browse Reports & Bookstore Make a charitable contribution Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non- commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. Skip all front matter: Jump to Page 16
  • 16. The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. This electronic document was made available from www.rand.org as a public service of the RAND Corporation. CHILDREN AND FAMILIES EDUCATION AND THE ARTS ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INFRASTRUCTURE AND TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY
  • 17. POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY TERRORISM AND HOMELAND SECURITY http://www.rand.org/congress/testimony.html http://www.rand.org/ http://www.rand.org/congress/testimony.html http://www.rand.org/pubs/testimonies/CT439.html http://www.rand.org/pubs/online.html http://www.rand.org/giving/contribute.html http://www.rand.org/pubs/permissions.html http://www.rand.org/ http://www.rand.org/topics/children-and-families.html http://www.rand.org/topics/education-and-the-arts.html http://www.rand.org/topics/energy-and-environment.html http://www.rand.org/topics/health-and-health-care.html http://www.rand.org/topics/infrastructure-and- transportation.html http://www.rand.org/topics/international-affairs.html
  • 18. http://www.rand.org/topics/law-and-business.html http://www.rand.org/topics/national-security.html http://www.rand.org/topics/population-and-aging.html http://www.rand.org/topics/public-safety.html http://www.rand.org/topics/science-and-technology.html http://www.rand.org/topics/terrorism-and-homeland- security.html Testimony Perspective on 2015 DoD Cyber Strategy Lara Schmidt RAND Office of External Affairs CT-439 September 2015 Testimony presented before the House Armed Services Committee on September 29, 2015 This product is part of the RAND Corporation testimony series.
  • 19. RAND testimonies record testimony presented by RAND associates to federal, state, or local legislative committees; government- appointed commissions and panels; and private review and oversight bodies. The RAND Corporation is a nonprofit research organization providing objective analysis and effective solutions that address the challenges facing the public and private sectors around the world. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. R ® is a registered trademark. C O R P O R A T I O N Published 2015 by the RAND Corporation 1776 Main Street, P.O. Box 2138, Santa Monica, CA 90407- 2138 1200 South Hayes Street, Arlington, VA 22202-5050 4570 Fifth Avenue, Suite 600, Pittsburgh, PA 15213-2665
  • 20. RAND URL: http://www.rand.org/ To order RAND documents or to obtain additional information, contact Distribution Services: Telephone: (310) 451-7002; Email: [email protected] http://www.rand.org/ mailto:[email protected] 1 Lara Schmidt1 The RAND Corporation Perspective on 2015 DoD Cyber Strategy2 Before the Committee on Armed Services United States House of Representatives September 29, 2015
  • 21. Chairman Thornberry, Ranking Member Smith, and distinguished members of the House Armed Services Committee, thank you for inviting me here today to testify at this important hearing, “Outside Perspectives on the Department of Defense Cyber Strategy.” In April 2015, the DoD released a new cyber strategy in order to “guide the development of DoD’s cyber forces and strengthen [its] cyber defense and cyber deterrence posture.”4 The Strategy identifies three cyber missions for DoD: (1) defending its own networks, systems, and data; (2) defending U.S. national interests against cyberattacks of “significant consequence,” including loss of life, significant damage to property, serious adverse U.S. foreign policy consequences, and
  • 22. serious economic impact; and (3) when directed by the President or Secretary of Defense, supporting military operations and contingency plans with cyber operations, including by disrupting an adversary’s military-related networks. DoD further laid out strategic goals aimed at ensuring its ability to accomplish these cyber missions, including goals to:5 • Build and maintain ready forces and capabilities to conduct cyber operations; • Defend DoD networks, secure DoD data, and mitigate risks to DoD missions; • Build and maintain viable cyber options, and plan to use them to control conflict escalation and shape the conflict environment at all stages. 1 The opinions and conclusions expressed in this testimony are
  • 23. the author’s alone and should not be interpreted as representing those of RAND or any of the sponsors of its research. This product is part of the RAND Corporation testimony series. RAND testimonies record testimony presented by RAND associates to federal, state, or local legislative committees; government- appointed commissions and panels; and private review and oversight bodies. The RAND Corporation is a nonprofit research organization providing objective analysis and effective solutions that address the challenges facing the public and private sectors around the world. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. 2 This testimony is available for free download at http://www.rand.org/pubs/testimonies/CT439/. 4 Department of Defense, The DoD Cyber Strategy, April 2015. 5 Two additional goals of the DoD Cyber Strategy not discussed in this Testimony are: (a) Be prepared to defend the U.S. homeland and U.S. vital interests from cyberattacks of significant consequence; and (b) Build and maintain international alliances and partnerships to deter shared threats and increase international security and stability. http://www.rand.org/pubs/testimonies/CT439/
  • 24. 2 Implementation initiatives – and the attendant resources – to achieve these goals are needed in order to meet challenges associated with the rapid rate of change in technology, the growing cyber threat, and the need to integrate cyber operations with operations in other warfighting domains. Cyber Workforce Building and maintaining a qualified workforce underlies all of the goals of the Strategy. However, U.S. Cyber Command reports that it is “hard pressed” to identify, train, and retain qualified
  • 25. personnel.6 How can DoD ensure a ready-workforce of military, civilian, and contractor personnel, capable of meeting the demands of the nation? Like the commercial sector, DoD requires staff to perform IT functions (e.g., configure databases, install and manage applications, provide customer support, securely configure networks, test new designs, develop system architectures), and cybersecurity functions (e.g., identify and analyze network intrusions or other threats, develop security tools, respond to security emergencies, assess threats and vulnerabilities and remediate risk).7 Furthermore, DoD requires specialized workforces associated with military cyber operations that are not commonly found in the commercial sector, though applicable skillsets
  • 26. overlap to some extent with elite commercial cybersecurity personnel. How can DoD compete with the rest of the technology sector – e.g., cybersecurity companies, software and hardware developers, the defense industrial base, not to mention IT departments in companies across the country – also seeking to identify an educated and capable workforce? It is helpful to understand how the commercial sector identifies staff. Commercial practice is to hire cyber staff with a bachelor’s degree, which provides a strong foundation of relevant knowledge, and demonstrates an ability to succeed in a professional setting. Companies usually recruit graduates of reputable colleges with STEM degrees – science, technology, engineering, and mathematics – especially computer
  • 27. science, information security, information technology, computer engineering, and electrical engineering.8 However, unlike the commercial sector, the majority of DoD’s military cyber workforce is enlisted and, therefore, not typically required to have college degrees. Therefore, DoD will need to implement substantially more-rigorous selection criteria in order to vet non-degreed candidates to ensure enlisted accessions and new civilian hires are likely to succeed in the cyber workforce . For example, 6 Admiral Michael Rogers, Statement before the House Committee on Armed Services, Subcommittee on Emerging Threats and Capabilities, 4 March 2015. 7 National Initiative for Cybersecurity Careers and Studies, Interactive national Cybersecurity Workforce Framework, Washington, D.C.: Department of Homeland Security, undated.
  • 28. 8 Schmidt, Lara and Caolionn O’Connell et al, Cyber Practices: What Can the U.S. Air Force Learn from the Commercial Sector?, Santa Monica, Calif.: RAND Corporation, RR-847-AF, 2015. 3 cyber aptitude- or skills-testing or possession of professional certificates9 can evaluate a candidate’s expertise or mind-set for a particular discipline. Participation in activities such as, cyber competitions, open-source or ethical-hacker forums, or bug bounty programs can indicate a personal interest in and affinity for cyber. In fact, commercial practice for elite, highly paid cybersecurity jobs is to screen for such indications of aptitude and affinity in addition to formal
  • 29. educational requirements. These practices merit evaluation for implementation in DoD to ensure military and civilian staff are qualified to meet the challenges the Department faces. Furthermore, the commercial sector reports that their ability to retain skilled personnel is closely linked to job satisfaction gained through good working environments, belief in the mission, opportunities for training and professional development, and access to interesting assignments. Research indicates that corporate retention programs also seek to provide satisfying career paths for their cyber workforces, including not only a track to promotion through management but also a technical track. They also provide high performers opportunities to rotate among units to learn the
  • 30. business, and exposure to professional interaction outside the company. 10 Though some worry that DoD hiring and retention suffers because it cannot keep pace with commercial pay, median salaries for corporate IT and cybersecurity professionals are similar to the pay and benefits for military personnel, when accounting for additional allowances and tax advantages.11 One exception relates to the most elite cybersecurity professionals, those with unique skills that few possess (e.g., software reverse engineering, advanced malware analysis, identifying advanced stealthy attacks). These cyber “ninjas” are the competitive advantage for cutting-edge cybersecurity firms and are increasingly in demand in other corporate settings. The
  • 31. relative scarcity of these skill sets allows qualified individuals to command high salaries.12 Therefore, DoD might similarly find personnel with these unique skills to be worthy of retention programs not offered to the majority of the cyber workforce.13 9 To name just a few: Microsoft Certified