[Solved] Day 1 Instructions

[Solved] Day 1 Instructions

  • This is a Group Project. Part 1 and Part 2 will be completed during the residency are are worth 1/3 of your grade.-You are a security professional for Tech R Us, an IT (Information Technology) services provider with approximately 400 employees. Tech R Us partners with industry leaders to provide storage, networking, virtualization, and cybersecurity to clients. -Tech R Us recently won a large DoD (U. S. Department of Defense) contract, which will add 30 percent profit to the revenue of the organization. It is a high-priority, high-visibility project. Tech R Us will be allowed to make its own budget, project timeline, and tollgate decisions. (Note: a tollgate decision refers to the gates methodology, which is a process of project progressive definition based on a planned and standardized evaluation at the end of each phase. a gate or tollgate is a standardized control point where the projects phase is reviewed ad/or audited and approved (or not) to continue with the next phase)-As security professionals for Tech R US, you are responsible for developing security policies for this project. These policies are required to meet DoD standards for delivery of IT technology services to the U. S. Air Force Cyber Security Center (AFCSC), a DoD agency.-To do this, you must develop DoD-approved policies, standards, and control descriptions for your IT infrastructure. The policies you create must pass DoD-based requirements. Currently, your organization does not have any DoD contracts and thus has no DoD-compliant security policies, standards, or controls in place.-For Research Project Part 1, each group will research U.S. compliance laws that may affect the firm. -Part 1A Assignment Details: For 135 points your team must:-(1) Develop a list of compliance laws required for DoD contracts.-(2) Your report should include a justification or discussion as to what made the group determine these compliance laws are necessary for Tech R Us to fulfill the DoD contract.-(3) What happens with the awarded contract if Tech R US does not comply to these laws?-This assignment should be two to three pages (500 to 750 words double spaced) and is due during the first half of day 1.-Part 1B:-1. develop a list of list of DoD-compliant policies, standards, and controls that affect the WAN, Remote Access, and System/Application Domains.-and-2. provide a justification or discussion as to why your team selected these policies, standards and controls.-This assignment should be two to three pages and is due during the second half of day 1.-Instructions:-Submission includes:-
    • Format: Microsoft Word
    • Font: Times New Roman, size 12 point, double spaced
    • Citation style: APA format using a hanging indentation of 1/2 inch
    • Length of draft research documents: 2 – 3 pages
    • Two references cited in APA Style
    • All team members names should appear on the title page for this assignment.
    • -This is a group project. Each group is identified in Blackboard. Select a team leader, note taker, and reviewers. 
  • M4 R2 – Residency Group Project Part 2 – Due Day 2 of the ResidencyThe research project is a research-based paper on a current topic in the area of Cyberlaw.  Parts 1 and 2 will be completed during the residency.In this deliverable you will have to provide the following:Part 2  – The Presentations(4) During day 2, your group will present your findings in a PowerPoint Presentation. Your presentation should be at least 5 slides. Your presentation should be NO LONGER than 5 minutes. Time will be kept and you will be notified when your time is up, so it is important to remain within the time allotted.Instructions:Submission includes:
    • Part 2 B – PowerPoint Presentation 5 to 10 slides
    • Two references cited in APA Style
    • include in-text citations for all of your references
    • All team members names should appear on the title page for this assignment.
    • This is a group project. Each group is identified in Blackboard. Select a team leader, note taker, and reviewers. 
  • Project InstructionsPurpose
    This course project is intended to assess your ability to identify, design, and organize information technology (IT) security policies.Learning Objectives and Outcomes
    Successful completion of this project will ensure that you can develop draft IT security policies for an organization and apply learning constructs from the course. By the end of this project, you will be able to do the following:

    • Evaluate compliance laws relevant to the U.S. Department of Defense.
    • Assess policy frameworks appropriate for an organization in a given scenario.
    • Evaluate security controls and standards for the seven domains of a typical IT infrastructure.
    • Develop DoD-compliant policies for an organization’s IT infrastructure.
    • Required Source Information and Tools
      Web References: Links to Web references in this document and related materials are subject to change without prior notice. These links were last verified on January 4, 2022. The following tools and resources will be needed to complete this project:
    • Course textbook
    • Internet access
    • DoD instructions or directives
      https://www.esd.whs.mil/dd/
    • Risk Management Framework (RMF) for DoD Information Technology (IT) https://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodi/851001p.pdf?ver=2019-02-26-101520-300
    • U.S. Department of Defense (DoD) Chief Information Office Library
    • https://dodcio.defense.gov/Library/
    • Department of Defense Information Security Program
      https://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodm/520001m_vol1.pdf?ver=2020-08-04-092500-203
    • Department of Defense Internet Services and Internet-Based Capabilities
      https://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodi/817001p.pdf
    • You may consult other relevant sources, if needed. If so, include citations for those sources in the final deliverable for this report.Deliverables
      This project is divided into several parts, each with a deliverable. The first three parts are research drafts, which should include organized lists and notes gathered during research, sources, and in some cases policy drafts. These documents should be organized and readable, but are not polished reports. ItemDeliverablesProject Part 1U.S. Compliance Laws ResearchDevelop a list of compliance laws required to DoD contracts. Your resport should include a justification or disussion as to what made the group determine these compliance laws are necessary for Tech R Us to fulfill  the DoD contract. What happens with the aswarded contract if Tech R Us does not comply wo these laws?Project Part 2Infrastructure Research ASubmit a draft of (1) which policy framework(s) will be followed for the project and (2) develop a list of DoD-compliant policies, standards, and controls that affect the User, Workstation, LAN, and LAN-to-WAN Domains and (3) provide a justification or discussion as to why your team selected these framework(s) policies, standards, and controls.Project Part 3Infrastructure Research BDevelop a list of list of DoD-compliant policies, standards, and controls that affect the WAN, Remote Access, and System/Application Domains and (2) develop a justificcation or discussion as to why your team selected these policies, standards, and controls.Project Part 4Final ReportSubmit the final report of your class project. This is a group project. Each group is identified in Blackboard. Select a team leader, note taker, and reviewers. Identify when you will hold weekly team meetings as a group to be sure the work is proceeding on schedule.Scenario
      You are a security professional for Tech R Us, an IT services provider with approximately 400 employees. Tech R Us partners with industry leaders to provide storage, networking, virtualization, and cybersecurity to clients.Tech R Us recently won a large DoD contract, which will add 30 percent to the revenue of the organization. It is a high-priority, high-visibility project. Tech R Us will be allowed to make its own budget, project timeline, and tollgate decisions.As a security professional for Tech R Us, you are responsible for developing security policies for this project. These policies are required to meet DoD standards for delivery of IT technology services to the U.S. Air Force Cyber Security Center (AFCSC), a DoD agency.To do this, you must develop DoD-approved policies, standards, and control descriptions for your IT infrastructure (see the “Tasks” section in this document). The policies you create must pass DoD-based requirements. Currently, your organization does not have any DoD contracts and thus has no DoD-compliant security policies, standards, or controls in place.Tech R Us’ computing environment includes the following:
    • 12 servers running the latest edition of Microsoft Server, providing the following:
      • Active Directory (AD)
      • Domain Name System (DNS)
      • Dynamic Host Configuration Protocol (DHCP)
      • Enterprise resource planning (ERP) application (Oracle)
      • A research and development (R&D) engineering network segment for testing, separate from the production environment
      • Microsoft Exchange Server for email
      • Email filter
      • Cloud-based secure web gateway (web security, data loss protection, next-generation firewall, cloud application security, advanced threat protection)
    • Two Linux servers running Apache Server to host your website
    • 400 PCs/laptops running Microsoft Windows 10, Microsoft 365 office applications, and other productivity tools
    • Tasks
    • Develop a list of compliance laws required for DoD contracts.
    • Determine which policy framework(s) will be used for this project.
    • List controls placed on domains in the IT infrastructure.
    • List required standards for common devices, categorized by IT domain.
    • Develop DoD-compliant policies for the organization’s IT infrastructure.
    • Describe the policies, standards, and controls that would make the organization DoD compliant.
    • Develop a high-level deployment plan for implementation of these polices, standards, and controls.
    • Write a professional report that includes all of the above content-related items and citations for all sources.
    • Submission Requirements
    • Format: Microsoft Word
    • Font: Times New Roman, size 12, double-space
    • Citation style: APA format using a hanging indentation of ½”
    • Length of draft research documents: 2–3 pages
    • Length of final report: 8 – 12 pages (4,000 – 6,000 words)
    • Group-Assessment Checklist for Final Report
    • We developed a list of compliance laws required for DoD contracts.
    • We listed controls placed on domains in typical IT infrastructure.
    • We listed required standards for common devices, categorized by IT domain.
    • We developed DoD-compliant policies and standards for my organization’s IT infrastructure
    • We described the policies, standards, and controls that would make my organization DoD compliant.
    • We listed all applicable DoD frameworks in the final report.
    • We developed a high-level deployment plan for implementation of these polices, standards, and controls.
    • We created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
    • We included citations for all sources used in the report.
    • We followed the submission guidelines.

[Solved] Doanh Nghiê ̣ P

[Solved] Doanh Nghiê ̣ P

 

Có thể đặt in tem bộ công an chống giả cho rượu không?

Rượu nếu bị làm giả và được tiêu thụ thì sẽ gây ảnh hưởng nghiêm trọng tới người dùng. Tình huống xấu nhất vẫn có thể xảy ra với rượu giả. Để ngăn chặn tình trạng này, phía doanh nghiệp có thể sử dụng tem chống hàng giả đang được phổ biến trên thị trường. Nhưng nếu muốn dùng tem của bộ công an thì sao? Có thể đặt in >>> tem bộ công an chống giả cho rượu không?

Các mẫu Tem bộ công an chống giả

Đặt tem bộ công an chống giả cho rượu

Tem chống hàng giả là một trong số sản phẩm in được pháp luật quy định. Nên doanh nghiệp hoàn toàn được phép đặt in tem chống hàng giả cho sản phẩm rượu của mình. Yêu cầu là doanh nghiệp có đủ các giấy tờ pháp lý chứng minh được, sản phẩm rượu là chính hãng, có nguồn gốc xuất xứ rõ ràng.

Bên cạnh đó:

Rượu bia là sản phẩm đặc biệt, và được đánh thuế tiêu thụ đặc biệt. Vì vậy, các sản phẩm rượu nhập khẩu hoặc rượu sản xuất để tiêu thụ trong nước thì đều cần được dán tem rượu (hay còn gọi là tem Thuế)  theo Quy định của Bộ Tài chính.

Cơ sở in tem bộ công an chống hàng giả cần đạt yêu cầu gì?

Đối với cơ sở in ấn, cần đạt đủ các điều kiện sau:

– Có các thiết bị phù hợp để phục vụ nhu cầu in ấn, gồm cả in tem BCA chống giả.

– Có mặt bằng, nhà xưởng hợp pháp để thực hiện in ấn.

– Chủ sở hữu là người Việt Nam, sính sống ở Việt Nam và có đủ năng lực hành vi dân sự.

– Có giấy phép kinh doanh hoạt động về lĩnh vực in ấn.

– Có giấy phép in tem chống hàng giả BCA.

Như vậy, để in tem chống giả cho sản phẩm rượu, doanh nghiệp cần liên hệ tới cơ sở in ấn đạt đủ các điều kiện nêu trên.

>>> Tem bộ công an chống giả Tân Hoa Mai là chất lượng, giá rẻ

Kiểm tra tem chống giả bộ công an bằng đèn chuyên dụng

Công ty in tem chống hàng giả uy tín Tân Hoa Mai

Tại HCM, Tân Hoa Mai là công ty dịch vụ in ấn uy tín hơn 10 năm hoạt động. Công ty đầu tư hệ thống nhà xưởng, máy in hiện đại và có giấy phép in tem chống giả. Đáp ứng đủ điều kiện để hoạt động về in tem chống giả.

Khi cần làm tem chống giả cho rượu, doanh nghiệp có thể liên hệ tới THM để được hỗ trợ nhanh chóng, giá thành in rẻ.

Tại THM:

-Tư vấn miễn phí, báo giá nhanh chóng.

-Miễn phí mẫu thiết kế tem chống giả bộ công an cho sản phẩm rượu.

-Nhận in nhanh, in lấy gấp.

-Giá in rẻ, cạnh tranh. Có gói combo để doanh nghiệp lựa chọn. In số lượng càng lớn, giá càng rẻ.

-Giao hàng tận nơi.

Mọi thông tin chi tiết, vui lòng gọi về số Hotline 0919 00 99 30.

>>> Xem thêm: Tại sao nên in tem bộ công an tại Tân Hoa Mai?

[Solved] Five Developmental Domains Three

[Solved] Five Developmental Domains Three

For the purpose of this assignment, you will create a chart providing a general overview of the five developmental domains (cognition, language/communication, physical (gross/fine motor), social-emotional, adaptive/self-care.  

I would like an overall explanation for each domain and at least three supporting sentences on more specific components within the domain. For example, you can explain gross/fine motor for physical or the components of language for language/communication.  

Provide three strategies for promoting this area of development within early childhood (birth-age 8).

This is an individual assignment that will be submitted to the appropriate assignment folder in Canvas.  

This assignment must be submitted in your own words and include references of your sources. If you must use a direct quote, APA format is required. Turnitin will be used for this assignment; plagiarism of any kind is not tolerated.

Required criteria for full credit: 

  • General overview of each of the five developmental domains 
  • Three supporting sentences for each domain discussing relevant components (E.G., explain gross/fine motor for physical development) 
  • Three strategies to promote development in each domain (15 in total) 
  • Grammar accurate/APA formatting 

[Solved] Great Educator ”

[Solved] Great Educator ”

 Prior to beginning this assignment, review the Teacher Vs Educator: Which Are You?Links to an external site. article,

The I Will Be a Great Educator assignment .
 

[Solved] Help Students Activate Prior

[Solved] Help Students Activate Prior

I need someone to help me answer a few questions below.

1. Besides the teacher assisting the families what are other means that exist out there to help families? when the language spoken at the home is not ENGLISH

2. what techniques can teachers use to help students activate prior knowledge and support appropriate transfer of language literacy skills? when the language spoken at the home is not ENGLISH

[Solved] Western Classical Music Evolved

[Solved] Western Classical Music Evolved

In the course of this chapter, you will see how Western classical music evolved from monophonic chant to more complex four-voice polyphony. To get a feeling for the music of the Middle Ages, listen to the opening of an early fifteenth-century Requiem Mass (Mass for the Dead).

 https://youtu.be/kcRku6UL9YQ?list=PLC8C8303D7E9A6B38 

As you listen, ask yourself the following questions: Can I understand the Latin text? Even if I can’t understand it, does this lessen how I feel about these sounds? 

Similarly, do you find this music from 600 years ago any less beautiful than that of today? Judging from this one musical example, have humans gone forward, backward, or sideways?

[Solved] Stoll Et Al

[Solved] Stoll Et Al

 In response to your peers, discuss the positive impacts of using online counseling services. 

1#   Teletherapy has been around for many years. I started becoming more popular once the COVID-19 pandemic hit. I think that counseling via the Internet has its pros and cons. In the other course I am currently taking, we discussed how teletherapy has become popular, the advantages and disadvantages, and how we think it will help us in our practice. I see how teletherapy can be effective and how it can be ineffective. Some specific ethical questions that need to be raised are privacy, confidentiality, security issues/data breaches, and being able to observe the clients’ body language. There are many more ethical questions that should be raised with teletherapy. “Privacy, Confidentiality, and Security Issues Among concerns about privacy, confidentiality, security, and safety in online psychotherapy, one relates to using unsecured websites or unencrypted communication tools, like commercially available software that is easily hacked. Data security may also be compromised when technology fails, with potential breaches of confidentiality that might extend beyond the therapist’s control (Stoll et al., 2020).” ” Ethical issues such as informed consent, confidentiality, privacy, self-disclosure, boundaries, and multiple relationships can have special significance when Internet technologies are involved. A significant ethical concern pertains to who is actually on the other end when providing distance counseling (Corey, 2019).” I would be comfortable with using this form of technology in my counseling practice. I think that teletherapy can be very effective and beneficial as office-based therapy. 

Question: What are some drawbacks to online therapy?

2#  Counseling via the Internet is a form of online therapy that can benefit people who need mental health support. There are many advantages available with this option of treatment. First, online therapy can be more accessible, convenient, and affordable than in-person therapy, providing a greater choice of therapists to suit different needs and preferences. It can also help reduce stigma and barriers associated with seeking help for mental health issues (Cherry, 2022).

However, online therapy also poses some challenges and ethical issues that may need to be addressed. Some disadvantages and concerns of online therapy include that it may not provide the same level of rapport, intimacy, and nonverbal communication as in-person therapy (Cherry, 2022). Because of the lack of familiarity, online treatment may not be suitable for people with severe or complex mental health problems or needing medication or crisis intervention. There may be confidentiality, security, and privacy issues, especially if the online platform is not encrypted or secure (Stringer, n.d.).

How would you handle a patients mental health crisis, thorough online counseling?

[Solved] G Scholarly Articles

[Solved] G Scholarly Articles

AIRPORT ASSESSMENT: INITIAL ASSIGNMENT INSTRUCTIONS OVERVIEW Comprise a comprehensive analysis of all potential threats and vulnerabilities at the Richmond International Airport. This assessment should be conducted without consideration to, or analysis of, existing measures. This is your personal assessment based on your knowledge gained from the information in this course and outside sources (i.e., scholarly, governmental, academic). Prepare a report reflecting the findings from the analysis. At a minimum, the assignment should include:  An introduction that provides a brief outlining the purpose of the report.  identification of stakeholders that are responsible for ensuring security, prevention, and risk management, discussion of the interdependencies, relationships, and legal requirements of the stakeholders.  a description of the threat assessment that outlines all identified threats and hazards and the potential impact on affected resources (organized by natural, accidental, and international or malicious).  A description of the vulnerability assessment that outlines all identified vulnerabilities using potential impact categories (catastrophic, critical, limited, minor, and negligible); develop appropriate definitions for each of the categories. Similarly, definitions should be developed for the likelihood of occurrence (highly likely, likely, possible, unlikely, remote/rate). Do NOT assign weights or probabilities to each category. This will be done in the next assignment.  A summary of your findings. Do NOT make recommendations. This will be done in the next assignment. INSTRUCTIONS  Length of assignment: 900-1400 words o Include in the assignment the following; however, note that these are excluded from the length of the assignment:  Title Page, References, Two Tables  Format of assignment: APA  Number of citations: 4  Acceptable sources (e.g., scholarly articles published within the last five years) Note: Your assignment will be checked for originality via the Turnitin plagiarism tool.

[Solved] Informed Care Approach Enhance

[Solved] Informed Care Approach Enhance

Provide a response 3 discussions prompts that your colleagues provided in their video presentations. You may also provide additional information, alternative points of view, research to support treatment, or patient education strategies you might use with the relevant patient.

Responses exhibit synthesis, critical thinking, and application to practice settings…. Responses provide clear, concise opinions and ideas that are supported by at least two scholarly sources…. Responses demonstrate synthesis and understanding of Learning Objectives…. Communication is professional and respectful to colleagues…. Presenters’ prompts/questions posed in the case presentations are thoroughly addressed…. Responses are effectively written in standard, edited English.

Questions:

1.  What role can patients themselves play in their treatment?

2.  In cases of comorbid bipolar disorder and PTSD, how can a trauma-informed care approach enhance treatment outcomes?

3.  What other diagnosis can you apply to the patient in this case?

[Solved] Binary Logistic Regression Means

[Solved] Binary Logistic Regression Means

Respond to a colleague’s post who has selected a different value. Describe whether or not your colleague’s post swayed your point of view. Does your opinion change when on reporting in different contexts? Why or why not?

_______________________

Colleagues response

Based on previous outcomes of something that has occurred (odds ratio), logically, it gives you the conditional probability that it will continue to occur (Warner, 2013). This is based on a logistic regression. In other words, the regression tests you run to analyze data will yield results proving or disproving a hypothesis.

Whereas a binary logistic regression occurs when the Y variables are predicted from the X variables and do not need the assumptions (Warner, 2013). The goal is to analyze what the odds are of a given outcome. There are linear relationships between both variables as well. The variables have to be independent of each other. If you add to that assumption, the odds will either reinforce the probability or go against it.

Using a binary logistic regression means taking additional steps would be the best way to analyze the data collected. Because you want to show that everything is linked to each other in your study, it would mean taking the extra steps to prove that the hypothesis is valid and that the original idea is what it says it is, especially when a simple regression test would not work with multiple variables.

Reference

Warner, R. M. (2013). Applied statistics: From bivariate through multivariate techniques (2nd ed.). Thousand Oaks, CA: SAGE Publications