Posts

[Solved] Assignment Deliverables Another Core

[Solved] Assignment Deliverables Another Core

Assignment Deliverables

Another core function of asset management is monitoring the assets in the environment for known vulnerabilities. This is done through a well-managed vulnerability management program. As the CCISO for CB Drifter Technologies you need to understand the core function of vulnerability asset management responsible for monitoring the assets in the environment for known vulnerabilities.

In 2-3 paragraphs, describe the key components of the vulnerability management program you would implement. 

[Solved] Layers Osi Reference Model

[Solved] Layers Osi Reference Model

  

Overview​

In this assignment, you map the layers of the TCP/IP protocol architecture to the layers OSI Reference Model.

Preparation

Identify an appropriate graphics or diagramming tool (such as Visio) to complete the assignment diagram.

Directions

  • Create a diagram that accurately maps the layers of the TCP/IP protocol architecture to the layers OSI Reference Model.​ Make sure to make the diagram clear and use common conventions for symbols and design. Copy and paste the diagram into a Word document.
  • Describe the encapsulation process starting from the application layer down to the physical layer of the OSI Reference Model.

Submission Requirements

  • Submit a single Word document.
  • Font: Times New Roman, 12 point.
  • Format: Double spaced lines. Use current APA style and format.

[Solved] Entity Level Control Network

[Solved] Entity Level Control Network

As you begin to perform the information systems audit for PVSS, assume the identity of a different person in the scenario. For this Discussion Board, you are now the Network Systems Manager for PVSS.

As the Network Systems Manager, how would you create the following four controls (or policies) to be used by PVSS:

  • Entity level control
  • Network level control
  • Operating system level control
  • Web or database server level control

Keep in mind that each control should focus on a specific topic and offer the following structure:

  • The Policy Statement: This is a statement defining the specific action or regulation.
  • Responsibilities: Who is responsible for various actions?
  • Enforcement: How the policy will be validated?
  • Violations: What are the consequences for violation?

[Solved] Aiu Apa Guide Includes

[Solved] Aiu Apa Guide Includes

In the Individual Project from unit 2, you were tasked to identify four vulnerabilities for various network assets. For this assignment, describe the following in 5-6 pages:

  • Cover page (does not count towards the page length requirement)
  • List and discuss the vulnerabilities and assets.
  • Rank the top six most vulnerable assets. Justify your rankings.
  • Given an existing scenario where there is an Information System audit:
    • Describe how the team would approach an audit of the six assets against the controls from Part 1.
    • Describe the types of tests that would be performed and any anticipated findings that could arise based on the climate described to this point for PVSS.
  • References page (does not count towards the page length requirement)

Cover page and reference page are not included in page count. Document formatting, citations, and references must follow APA format. The AIU APA Guide includes sections for paper formatting, as well as reference and citation examples. For example, 250 words equals one page of content.

[Solved] Properly Cited Using Either

[Solved] Properly Cited Using Either

Reconstruction Discussion Board3232 unread replies.3232 replies.

Explain and analyze the different plans for or phases of Reconstruction. Evaluate the successes and failures of Reconstruction. What can we learn about Reconstruction from Jourdan Anderson’s letter? 

Be clear, specific and precise. Demonstrate that you have read/viewed and understood the material. Use your own words. Only use your text and the materials provided for you in Canvas. Submit one initial post before midnight Friday (minimum 100-200 words) and one substantive classmate response (minimum 75 words) before midnight Sunday. All responses must be properly cited using either MLA, APA, or Chicago. Remember that you must do more than just say that you liked what someone wrote. You must substantively add to the discussion. Posts must be in complete sentences and proofread. Classmate response posts that simply talk about how someone made a good point and you liked it or agreed with it, without delving into the substance of the content will not earn any points. Your posts must be substantive and add to the discussion in order to earn credit.

https://www.smithsonianmag.com/smart-news/free-mans-1865-letter-his-former-slave-owner-180957278/

https://historymatters.gmu.edu/d/6369/quotthere-was-never-any-pay-day-for-the-negroesquot-jourdon-anderson-demands-wages

[Solved] Week 3 Discussion (Rubric)

Where do a company’s most valuable assets come from? Do their most valuable assets come from their people, the information their people know about how to operate the business, their technology (e.g., computers, servers, and networks), or the data collected and stored about the company and customers? Based on your thoughts, where should a company focus its primary security systems and policies?

Discussion Requirements

For all discussions, the primary response is due by Thursday at 11:59 p.m. Pacific Time. 

The primary response must be at least 200 words in length and fully address the topic, demonstrating critical thinking and understanding. Each student must then also post a minimum of two responses to other students in the discussion by Sunday night at 11:59 p.m. Pacific Time. 

Each peer response must be at least 50 words in length and substantively engage with the other student’s original post, continuing the discussion in a professional manner. If at any time information or material is brought in from an outside source or website, it must be properly cited following APA 7th edition guidelines and a full reference must be provided.

[Solved] Week 2 Assignment

Week 2 Assignment (Rubric)

The purpose of this assignment is to review a Tech Coast Angels (TCA) meeting, summarize, and draw relationships from the meeting content to this course (please see question 4).

Please complete the Non-Disclosure Agreement (NDA) using the appropriate link below, then email your instructor to request access to session recordings which can then be used to complete the assignment.

Faculty NDA: https://docs.google.com/document/d/1j4lZYuMw5v5irHz15Nso3o3gMu23pC92/edit?usp=share_link&ouid=104514329486234032080&rtpof=true&sd=true

Student NDA: https://docs.google.com/document/d/1-MfoHtnSVtSCl1pEc8kisMWVx38Wktw7/edit?usp=share_link&ouid=104514329486234032080&rtpof=true&sd=true

Review a TCA meeting

In 1-2 paragraphs, summarize one company’s pitch that was presented to the board.

In one paragraph, give your opinion about what your selected company did especially well.

In one paragraph, give your opinion about what your selected company did poorly in their pitch.

In 1-2 paragraphs, answer the following: What are possible technology-related security risks that may exist with their proposal?

Submit your answers in an MS Word document.

[Solved] Discussion Question – CLO 1, 2, 3, 4, 5

Ethics are always important, both personally and in business. For this discussion, share an experience that you may have had this past week in which either you or someone in your organization’s leadership demonstrated ethical behavior.

Each week, students must post one (1) initial response answer and one (1) peer response for every discussion question. Please see Grading Criteria for Discussion Board Participation in the University Policies for Discussion Question and Response expectations.

[Solved] Restricting Autonomy Limit Human

[Solved] Restricting Autonomy Limit Human

 

Some weeks I will add a challenge question which “counts” as one of your discussion responses. One situation that was in the news quite a bit about a year ago was Britney Spears being released from her conservatorship, which I was interested to learn more about as it is concerning that a young person who is able to work would have their autonomy so limited.

We do not know Britney’s diagnosis (and it really does not matter if she has mental health challenges as mentally ill people still should have rights), but we can look at her case through a child development lens. In terms of child development, looking at Chapter 1 and 2, what could you say about Britney’s development? A few key points to consider:

* From when she was a baby, her mom objectified her saying she was like a doll for her to dress up.

* She was heavily scheduled in dance, singing, and gymnastics lessons as a young child.

* Her role in the family was to perform and made the family laugh, which helped to relieve tension in the family (her mom at one point had a restraining order against her husband, and by all accounts it was a tumultuous relationship). In addition, she became the primary breadwinner (at one point her family almost lost their house, but her successful album at age 16 was able to avoid foreclosure on their house). 

* Her father was an alcoholic and played little role in Britney’s life. His mother killed himself when he was a child, so he experienced trauma at a young age (and again when he was older, he was involved in a car accident where a teammate died). He has had multiple restraining orders against him. Yet, this is the person that Britney had to get permission from to see friends, do daily activities, and to approve any purchases. 

* Britney worked from the age of 8 and had very little time at home in Louisiana. Prior to her marriage to Kevin Federline, there were reports from friends of hers saying she frequently cried and said all she wanted was a “normal life” and to get married and have kids. Should kids be working full time and being the breadwinner for the family with very little time off (to socialize and/or relax and/or develop their own interests)?  

* After Britney’s marriage broke up, there were reports of her having post partum depression and mental health challenges while being hounded by paparazzi while going through a public divorce and custody battle.  

* As I’m sure some of you have heard, over the past 13 years, despite working and making over $100 million dollars, Britney was extremely restricted in her autonomy.

Britney Spears’s Conservatorship Nightmare | The New Yorker

What does restricting autonomy do to one’s mental health? For example, Britney reported not being able to drive her car, decide what to eat, or even to be allowed to have her kitchen cabinets painted a different color, but was required to work (but did not have control over the money). How does restricting autonomy limit human development? 

[Solved] “ New ” Global

[Solved] “ New ” Global

 

Analyze and critically evaluate the impact of early exploration and settlement on both Europe and North America. What do you believe was the greatest negative and positive impact of the interaction between Europeans and Native societies? In what respect did these interactions not only change Europe and North America, but instead create a “new” global society?

When responding to classmates, include additional information for why you agree with their position or information explaining why you do not agree with their position.

Make sure to provide cited information to support your positions. All work must be in APA format.