Cyber warfare Defense Plan.

Cyber warfare Defense Plan. Paper details Purpose This project provides you an opportunity to create a cyberwarfare defense plan that incorporates many of the concepts learned in this course. To complete the project, you will need a computer with: • Access to the Internet • Microsoft Word, Microsoft PowerPoint, and Microsoft Visio, or compatible editing, presentation, and drawing software Learning Objectives and Outcomes You will be able to: • Identify the most likely cyber threat to a critical infrastructure and apply the Cyber Kill Chain • Ensure defense in depth of a network and its underlying computers, devices, and data • Outline mission assurance processes for a critical infrastructure • Identify relevant industrial control systems (ICSs), network defense technologies, and network operational procedures Deliverables The project is divided into three parts, as follows: • Project Part 1: Identifying Cyber Threats and Applying the Cyber Kill Chain • Project Part 2: Ensuring Defense in Depth • Project Part 3: Examining Mission Assurance and Operational Procedures By the end of the course, you are expected to submit a final project report and a project presentation. The electronic presentation, such as Microsoft PowerPoint, is to be presented to the Department of Defense (DoD) chief information officer (CIO) for this project and selected technology staff. The report and presentation will describe the overall scope of the project and address all major tasks as assigned in each part of the project. Final Project Report Submission Requirements • Format: Microsoft Word or compatible • Font: Arial, 12-point, double-space • Citation Style: Follow your school’s preferred style guide • Length: 8–10 pages, including an executive summary Project Presentation Submission Requirements • Format: Microsoft PowerPoint or compatible • Slide Titles: Arial font, 40-point • Slide Body Text: Arial font, 22- to 30-point bullet points; include SmartArt or similar illustrations on at least one-third of the content slides • Citation Style: Follow your school’s preferred style guide • Length: 12–15 slides, including a title slide and a summary slide Introduction You are a security analyst that’s part of the security team at Red Cell 637 Defense, a DoD contractor specializing in cyber operations and defensive strategies. Your team has been informed by high-ranking officials that a foreign, government-based cyberattack group is suspected of hacking into computers that operate the U.S. Western Interconnection power grid to probe and map the network. Group members most likely originate from Russia, are well-funded and well- equipped, and are capable of a large-scale attack. The officials have intelligence that indicates the group may be planning to install malicious software within the grid’s computer network to, at some point, disrupt power to 11 states. To prepare for a possible attack on U.S. critical infrastructures, your team has been tasked with providing three important parts of an overall cyberwarfare defense plan. Your company will work closely with the DoD and the North American Electric Reliability Corp to provide a plan that ensures the security and safety of the Western Interconnection power grid computer network. Project Part 1: Identifying Cyber Threats and Applying the Cyber Kill Chain Scenario The DoD has requested a review of the vulnerabilities of the Western Interconnection power grid computer network, with strategies for reducing or eliminating the vulnerabilities. Tasks Write a report that: • Identifies and describes a specific type of malware that could affect the Western Interconnection power grid computer network. Explain how the malware could be installed in the network covertly, and the action the malware would take to disrupt the network. • Applies the Cyber Kill Chain to the identified malware, including a diagram that shows the steps to be taken to eradicate it.

Additional Files

Developing a PICO(T) question

Developing a PICO(T) question for a specific care issue.. Create a 3-5-page submission in which you develop a PICO(T) question for a specific care issue and evaluate the evidence you locate, which could help to answer the question. PICO(T) is an acronym that helps researchers and practitioners define aspects of a potential study or investigation. It stands for: P – Patient/population/problem. I – Intervention. C – Comparison (of potential interventions, typically). O – Outcome(s). T – Time frame (if time frame is relevant). The end goal of applying PICO(T) is to develop a question that can help guide the search for evidence (Boswell Cannon, 2015). From this perspective, a PICO(T) question can be a valuable starting point for nurses who are starting to apply an evidence-based model or EBPs. By taking the time to precisely define the areas in which the nurse will be looking for evidence, searches become more efficient and effective. Essentially, by precisely defining the types of evidence within specific areas, the nurse will be more likely to discover relevant and useful evidence during their search. You are encouraged to complete the Vila Health PCI(T) Process activity before you develop the plan proposal. This activity offers an opportunity to practice working through creating a PICO(T) question within the context of an issue at a Vila Health facility. These skills will be necessary to complete Assessment 3 successfully. This is for your own practice and self-assessment and demonstrates your engagement in the course. Demonstration of Proficiency By successfully completing this assessment, you will demonstrate your proficiency in the course competencies through the following assessment scoring guide criteria: Competency 1: Interpret findings from scholarly quantitative, qualitative, and outcomes research articles and studies. Explain the findings from articles or other sources of evidence. Competency 2: Analyze the relevance and potential effectiveness of evidence when making a decision. Identify sources of evidence that could be potentially effective in answering a PICO(T) question. Explain the relevance of the findings from chosen sources of evidence to making decision related to a PICO(T) question. Competency 3: Apply an evidence-based practice model to address a practice issue. Define a practice issue to be explored via a PICO(T) approach. Competency 5: Apply professional, scholarly communication strategies to lead practice changes based on evidence. Communicate using writing that is clear, logical, and professional with correct grammar and spelling using current APA style. Reference Boswell, C., Cannon, S. (2015). Introduction to nursing research. Burlington, MA: Jones Bartlett Learning. Professional Context As a baccalaureate-prepared nurse, you will be responsible for locating and identifying credible and scholarly resources to incorporate the best available evidence for the purposes of enhancing clinical reasoning and judgement skills. When reliable and relevant evidence-based findings are utilized, patients, health care systems, and nursing practice outcomes are positively impacted. PICO(T) is a framework that can help you structure your definition of the issue, potential approach that you are going to use, and your predictions related to the issue. Word choice is important in the PICO(T) process because different word choices for similar concepts will lead you toward different existing evidence and research studies that would help inform the development of your initial question. Scenario For this assessment, please use an issue of interest from your current or past nursing practice. If you do not have an issue of interest from your personal nursing practice, then review the optional Case Studies presented in the resources and select one of those as the basis for your assessment. Instructions For this assessment, select an issue of interest an apply the PICO(T) process to define the question and research it. Your initial goal is to define the population, intervention, comparison, and outcome. In some cases, a time frame is relevant and you should include that as well, when writing a question you can research related to your issue of interest. After you define your question, research it, and organize your initial findings, select the two sources of evidence that seem the most relevant to your question and analyze them in more depth. Specifically, interpret each source’s specific findings and best practices related to your issues, as well explain how the evidence would help you plan and make decisions related to your question. If you need some structure to organize your initial thoughts and research, the PICOT Question and Research Template document (accessible from the “Create PICO(T) Questions” page in the Capella library’s Evidence Based Practice guide) might be helpful. In your submission, make sure you address the following grading criteria: Define a practice issue to be explored via a PICO(T) approach. Identify sources of evidence that could be potentially effective in answering a PICO(T) question. Explain the findings from articles or other sources of evidence. Explain the relevance of the findings from chosen sources of evidence to making decision related to a PICO(T) question. Communicate using writing that is clear, logical, and professional with correct grammar and spelling using the current APA style. Example Assessment: You may use the following to give you an idea of what a Proficient or higher rating on the scoring guide would look like: Assessment 3 Example [PDF]. Additional Requirements Your assessment should meet the following requirements: Length of submission: Create a 3–5-page submission focused on defining a research question and interpreting evidence relevant to answering it. Number of references: Cite a minimum of four sources of scholarly or professional evidence that support your findings and considerations. Resources should be no more than 5 years old. APA formatting: Format references and citations according to the current APA style.

Additional Files

The role of social networks

The role of social networks on the opportunity recognition processes of women.  Paper details review paper The essence of a good review paper is one that extends the current thinking of a topic or provides a new prospective on the topic. In addition to summarizing the current literature on the topic, you will need to integrate conflicting areas of research findings and/or provide a new twist (e.g., by applying the topic to a new field/discipline or integrating several topics together) on the relationships among the constructs within the topic. The literature review for this kind of paper will be more extensive than a research proposal designed for an empirical study. Gaps are identified and a new model for possible relationships among constructs within the topic needs to be mapped out and propositions for the model needs to be explained. Finally, a clear direction for future research needs to be provided. The format of a review paper typically includes the following sections: § Introduction (discuss why your paper is important). § Literature Review (discuss past research findings and highlight areas where you note conflicting evidence or gaps in research). § Research Model (diagram a new model that better explains your perspective on entrepreneurship theory, integrate & extend existing theories into the new model, define your constructs, develop propositions to link constructs together). § Directions for future research (suggest how your conceptual idea can be empirically tested and suggest the practical & theoretical implications of your research model). research question 2- How do the opportunity recognition processes of women differ from man? 3- What is the role of social networks on the opportunity recognition processes of women? please try to use the attached references to 10 additional current references but it must be from A,B,C journal

Additional Files

How cyber-attacks can ripple a company’s operations.

How cyber-attacks can ripple a company’s operations. Paper details You must write a 4-6 page term paper on a topic of your choice related to IT Security: Planning and Policy (ALL TOPICS MUST BE APPROVED). Some examples would include, BYOD Policies, Remote Access Policies, DRP, BCP or Privacy Policies. Please write the term paper in a Word document and then upload it for grading. Your term paper outline is due at the end of Week 2. Your term paper is due at the end of Week 7. In addition to the 4-6 pages of the paper itself, you must include a title page and a reference page. Your title page must include the title of your paper, the date, the name of the course, your name, and your instructor’s name. You must have a minimum of 3-5 outside sources. Your reference page must be written in APA citation style, Arial or Time New Roman styles, 12-point font. Page margins Top, Bottom, Left Side, and Right Side = 1 inch, with reasonable accommodation being made for special situations. Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly. It is always better to write the information in your own words than to directly quote. When submitting the paper, it will automatically run through Turnitin for review.

Additional Files

Marketing Metrics

Topic: Marketing Metrics (Click through Rates) 1‌‍‍‍‍‌‌‌‌‌‍‍‌‌‍‍‍‍‍‍. Explain the general purpose of the click through rates metric. In your own words (using the information from the textbook and lecture) what is the point of this metric? 2. Explain the general formula & calculation. Using the formula presented in the lecture & book explain how it works (i.e. how it is constructed, what input data you need)? 3. Showcase an application of the metric in a Business Case using ONE company of your choice. Illustrate the purpose, calculations, and interpretations for a company of your choice. You must use real numbers for your calculations which you obtain from external sources. For example, for industry reports, you can use University databases, such as MarketLine/Data monitor, ‌‍‍‍‍‌‌‌‌‌‍‍‌‌‍‍‍‍‍‍Passport GMID/Euromonitor, IBIS, Mintel, the business press, annual reports. Avoid re-using the examples discussed in the class and textbook. 4. Discuss special considerations & potential problems with the metric in your Business Case. Discuss the potential problems and considerations regarding the metric’s use by the company of your choice. Link the findings from your business case with the information you have from lectures and the textbook to flag specific extra considerations and potential problems or shortcomings of the metric. Contents: 1. Definition 2. Purpose and indication 3. Constructions 4. Application to a Business Case (with data, calculations) 5. Special consideration and problems 6. Referen‌‍‍‍‍‌‌‌‌‌‍‍‌‌‍‍‍‍‍‍ces

Additional Files

They Call Us Monsters

Writing Situation: In the last three years, California has passed the first two bills in three decades (the second of which we followed in the documentary “They Call Us Monsters”) to decrease juvenile sentences. This movement has re-sparked a national debate over the very nature of our most violent juvenile offenders. The only group silent from the debate are the minors themselves. A list of juvenile sentencing reform legislation passed in California since 2012: SB-9 (2012): Eliminates the “life without parole” sentence for juvenile offenders (except for those with special circumstances). SB-260 (2013): Provides parole board hearings at 15 or 25-years for juvenile offenders tried as adults. SB-261 (2015): Expanding the age of those eligible for SB-260 to 22-years old, affecting an additional 16,000 inmates. Writing Prompt: Is California moving in the right direction by making it easier for people who have committed heinous crimes as juveniles to be eligible for parole as adults? Write an essay analyzing the changes being made to the system. Be sure to indicate whether you think California is moving in the right direction or not. Support your position, providing reasons and examples from your own experience and observations, discussions you have participated in, and texts you have read for this module. Your essay should be as clearly focused, well organized, and carefully written as you can make it.

Additional Files

Theories of personality.

psychology, Theories of personality. Paper details The analysis of a person (real or fictional) from two different theoretical perspectives, including a diagnostic assessment and treatment plan for that person with recommended treatment if needed. The format is similar to the Illustrative Biographies at the beginning of each textbook chapter. Requirements for Term Paper: 1. Analyze a person (real or fictional) from two different theoretical perspectives, including strengths and limitations of the theory in understanding this person. 2. The paper should include a brief summary of the person, enough to illustrate the theories you are discussing. 3. The paper should also include a diagnostic assessment and treatment plan for that person with recommended treatment if needed. 4. Must be a minimum of 5 double-spaced pages, double-spaced pages, 12-point font, and 1-inch margins. 5. You should have a minimum of 3 primary source references and 5 total sources. If you have questions about primary sources, please ask. 6. Your paper should follow APA formatting for reference citation. The Publication Manual of the American Psychological Association, 6th ed. Washington, DC: APA, is available at the Reference Desk of New School Library. You can also access this information on the APA website (www.apa.org). CitRef is also helpful and can be found on the New School Library website. 7. I am available to discuss your paper with you throughout the term and will be happy to give you feedback on where to look for references and on drafts. Please ask. 8. Be careful not to plagiarize. If you have any questions about plagiarism, please ask. Remember citing someone else’s idea, even if you paraphrase, without giving them credit is plagiarism. Please see pg. 7 of the Syllabus for further information. Grading Policy for Term Paper: 1. Application of 2 Theoretical Perspectives (30%) 2. Diagnostic Assessment (Diagnosis, assessment) (10%) 3. Treatment Plan/Treatment (type of treatment; how to address difficulties; response to treatment/obstacles) (5%) 4. Development of Ideas (15%) 5. Organization (15%) 6. Follow Directions (length-5 pages, 5 references, formatting) (10%)

Additional Files

Policy Evaluation Paper.

Policy Evaluation Paper.  Final Submission Due: See Syllabus Submission Format: physical, printed copy of FINAL DRAFT Paper Format: · MLA or APA format (cover page not required), which includes typed, double-Spaced, 1 inch margins · Minimum 3 full pages (count does not include References/Works Cited page) · Includes a Works Cited (MLA) or References (APA) page · Includes at least three references/citations to identified policy Policy Evaluation Assignment: Each student is required to review, critique and analyze a technology focused policy used by a company, organization or institution in today’s work environment, specifically, associated with one or more of the following: · Personal Identifiable Information (PII), · Personal Health Information (PHI) · Acceptable Use · Proprietary Information (PI) · Information Protection · Data Security policy. Step 1: Identify a policy(s) used by a company, organization or institution in today’s work environment, specifically associated with one or more of the topics listed above. Some organizations have all encompassing policies, some have individual policies. If the company you work with has multiple polices covering the topics, picking several and seeing how they are interrelated and dependent on each other will provide for a more well-rounded project and presentation. As a suggestion – find a company in the area you would be interested in working for and CALL their HR Department and explain the project objectives. Ask them to e-mail you a copy of one or more appropriate policies or point you to an online version. I am happy to review your policy selection in advance if you would like feedback on its scope. I am happy to offer suggestions on companies if you need. DO NOT USE A ROWAN POLICY. I want you to do outreach and expose yourselves to other companies etc. Step 2: Complete a comprehensive overview of the policy. Provide clear overview & explain assumptions used to guide decision making process. These assumptions impact your final recommendations. Step 3: Analyze and assess the policy. List policy key components, specifically, stakeholders, specific risks being addressed / mitigated, consequences that could result from policy failure (Impact on both the individual and the company, its assets, goodwill etc) , importance of policy in today’s work environment, and magnitude of positive & negative impact of actions. Step 4: Make recommendations for improving the policy! Provide and explain recommended improvements or considerations for the policy. Be sure to begin with a strong introduction and end with a strong conclusion. You must cite/reference your policy at least three times. See below for details about your works cited and in-text citation style for MLA. You must include a Works Cited/References page! Easiest way to cite a web policy, MLA. Works Cited: “Policy Name.” Organization. Website hosting policy. Policy date. Web. Date Accessed. In-Text: (“Policy Name”). Example: “Google’s policy applies to all members of the user community” (“Acceptable Use Policy”).

Additional Files

Case Study on Fetal Abnormality

Based on “Case Study: Fetal Abnormality” and the required topic study materials, write a 750-1,000-word reflection that answers the following questions: What is the Christian view of the nature of human persons, and which theory of moral status is it compatible with? How is this related to the intrinsic human value and dignity? Which theory or theories are being used by Jessica, Marco, Maria, and Dr. Wilson to determine the moral status of the fetus? What from the case study specifically leads you to believe that they hold the theory you selected? How does the theory determine or influence each of their recommendations for action? What theory do you agree with? Why? How would that theory determine or influence the recommendation for action? Remember to support your responses with the topic study materials. While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center. This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

Additional Files

Swan Lake-Kirov Ballet: Dance Review

Swan Lake-Kirov Ballet: Dance Review …Prompt: Put yourself in the shoes of a dance reviewer, assigned to cover this concert for a publication.You will use the three main ingredients of dance writing in your review: Description,Interpretation, and Evaluation. As a dance reviewer, you want to engage your readers, to convince them to see a particular dance, or tell them why they shouldn’t. Use vivid, expressive language in a compelling voice! You have a strict space limit for this publication, as most reviewers do. In order to fill the appropriate column space, 700 words.This review is not intended to be a play-by-play of the concert. Focus your attention more closely on one or two dances. Your review MUST have an introduction and conclusion. Consider how you might draw your reader in with a strong and/or striking opening paragraph. It might also be a good idea to provide some context for the dances you discuss or the concert as a whole.Your paper should address these three ingredients, but you can arrange them in the way that makes the most sense for your review: Description:Describe the movement(s) you found most intriguing, making sure to locate the movement in the dance in which it occurred. Remember to use clear images and vivid, sensory language. In addition to describing the movement itself, include why you were so interested or intrigued in the movement in the first place. What was your kinesthetic response to the movement, or how did it feel to watch that movement?Interpretation: What meanings, ideas, themes, feelings did you find in this dance or dances? How did the dance suggest these meanings to you? Give specific examples to explain your interpretations.Remember that your interpretation does not have to be a clear-cut answer. Really explore the meanings you are making from the dance! Evaluation:Your judgment of the dance may be clear from the way you describe the work, or you may choose to have a separate section in which you reveal your evaluation of the merits of this dance. Be specific, and back your statements up with evidence from the dance. Be sure to explain why you felt a certain way about the dance.Your review should also have a true ending paragraph that resolves and sums up the content of your response. Try to move beyond bland statements such as: “This was a great concert and I think everyone should see it!” You will need to watch the Swan Lake by The Kirov Ballet in order to write this paper.

Additional Files

Powered by WordPress