Primary Task Response: Within the Discussion Board area, write 400–600 words

 
Primary Task Response: Within the Discussion Board area, write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas:
Using the library and Internet, search for information about security management organizations. One example might be a silo structure, which is vertical or hierarchical with both reporting and responsibilities. A second example might be a security working group (WG), which is a service with enterprise-wide participation. Complete the following:
Begin by making a choice of 3 priority security expectations for any security organization.
Justify your choices, and explain why other choices may not have been sufficient.
For each expectation, compare how it is achieved through both the silo and the WG organizational structures.
For each organizational structure, compare the roles that have security responsibilities.
For example, the chief security officer (CSO) has high visibility in both the silo and WG structures, but significant differences in leadership directions.
Acknowledge role differences, and justify changes with their responsibility assignments for each structure.
 main task 
Project Selection
The first step will be to select a real or hypothetical organization as the target for your Comprehensive Security Management Plan document. This organization will be used as the basis for each of the assignments throughout the course and should conform to the following guidelines:
Nontrivial: The selected organization should be large enough to allow reasonable exercise of the security management analysis and planning processes.
Domain knowledge: You should be familiar enough with the organization to allow focus on the project tasks without requiring significant time for domain education.
Accessibility: You should have good access to the people and other information that is related to the organization because this will be an important part of the process.
The selected organization may already have security management in place, but it may still be used as the basis for the projects in this course.
The selected organization must have a need for some kind of security management as part of its operations.
Feel free to identify a hypothetical organization that meets the requirements.
You may make any necessary assumptions to fulfill the requirements of organization selection.
Select an existing organization or identify a hypothetical organization that fits these requirements, and submit your proposal to your instructor before proceeding further with the assignments in the course. Approval should be sought within the first several days of the course through an e-mail proposal to your instructor.
Assignment
The first task in this process will be to select an organization or identify a hypothetical organization to use as the basis of the projects. Next, you will create the shell document for the final project deliverable that will be worked on during each unit. While you proceed through each project phase, content will be added for each section of the document to gradually complete the final project. Appropriate research should be conducted to support the development of the document, and assumptions may be made.
For the first phase of the Comprehensive Security Management Plan document, you will create an enterprise organizational chart in the first document section. A proposed security working group (WG) organization and its ties to the enterprise will be added. Finally, include a 1-page discussion of the flow of information, decision-making communication, and responsibilities of the chief security officer (CSO). Create the skeleton for the Comprehensive Security Management Plan as follows:
Use Word
Title Page
Course number and name
Project name
Your name
Date
Table of Contents (TOC)
Use an auto-generated TOC.
This must be on a separate page.
This must be a maximum of 3 levels deep.
Be sure to update the fields of the TOC before submitting your project.
Section Headings (Create each heading on a new page with “TBD” as content, except for the sections that are listed under “New Content.”)
Project Outline (Week 1)
Security Requirements (Week 1)
Security Business Requirements (Week 2)
Security Policy (Week 3)
System Design Principles (Week 4)
The Training Module (Week 5)
References
The following are the project deliverables for Week 1:
New Content
Project Outline and Security Requirements
Include a brief description of the real or hypothetical organization in which the Comprehensive Security Management Plan will be implemented.
Include the company’s size, location(s), and other pertinent information.
Initial Security Projects
Corporate organizational chart
WG structure and ties added to corporate organizational chart
Memo discussing communication flows with WG

The post  
Primary Task Response: Within the Discussion Board area, write 400–600 words appeared first on graduate paper help.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

3 pages     Topic:  Microsegmentation and Zero Trust Security Overview:  Explai

3 pages 
  
Topic:  Microsegmentation and Zero Trust Security
Overview:  Explain the difference between physical network segmentation and microsegmentation as they relate to cloud security. Explain what it means to implement a zero trust security strategy. Explain how microsegmentation can support a zero trust network.
Topic:  Microsegmentation and Zero Trust Security
Overview:  Explain the difference between physical network segmentation and microsegmentation as they relate to cloud security. Explain what it means to implement a zero trust security strategy. Explain how microsegmentation can support a zero trust network.

The post 3 pages 
  
Topic:  Microsegmentation and Zero Trust Security
Overview:  Explai appeared first on graduate paper help.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

For the final assessment, you will imagine you are a criminal justice professio

For the final assessment, you will imagine you are a criminal justice professional and apply the tools and techniques you have learned in the course to a specific scenario. Your task is to produce a polished report based on Suspicious Activity Reports (SARs) that have come to your attention from different sources. The report that you produce will eventually be forwarded to an appropriate agency for additional follow-up, and your goal is to facilitate that follow-up by succinctly communicating what you know about the possible threat and what can be done to mitigate it. Your finished intelligence report should identify the type of adversary, ascertain the appropriate agency for eventual follow-up activities, assess the threat level (using an intelligence threat scale), and suggest countermeasures and information protection actions needed to address the threat. 
Prompt
Imagine that you are a member of a law enforcement agency and you have received several pieces of raw intelligence from different sources (Suspicious Activities Reports or SARs), which, when taken together, point to a potential threat from a specific adversary. The SARs can be found in the Assignment Guidelines and Rubrics section of the course. 
 
Your job is to create a clear and comprehensive report that analyzes the intelligence from the SARs in order to pass it on to the appropriate agency. You should structure your report so that the agency, in turn, can respond to the threat in a way that is effective and appropriate given what you have learned. The finished report should sort the information chronologically, funnel it down to a specific adversary, identify the potential target(s) for the adversary’s activities, assess the level of threat, and make suggestions about what can be done to counter the threat and protect critical information so that the adversary does not change the target. Because most intelligence is fragmented, you will need to read all of the SARs carefully in order to gather the necessary information for the finished intelligence report. Remember to use direct language and employ criminal justice terminology appropriate for the type of threat being assessed and the receiving agency. Accuracy and appropriate grammar are also essential for the report’s credibility. 
Specifically, the following critical elements must be addressed: 
I. Executive Summary In this section, you should accurately highlight the essential elements of the intelligence report for quick reference by the agency receiving the report. You should include the name of referring agent (your name), the name of the agency that you are imagining you work for, the current date, dates of the activities being covered in the intelligence report, and a brief summary (two to three sentences) on the adversary, scope, and nature of the potential threat. Although this is the opening section of the report, you may wish to complete it last in order to accurately capture the analysis of the body of your report. 
II. Adversary, Motivation, and Jurisdiction
This section starts with a consolidated summary of the Suspicious Activity Reports (SARs) provided, and covers who may be planning to carry out criminal activities, their motivations, and under whose jurisdiction the activities fall. 
A.   Accurately summarize the intelligence collected from the SARs to date, focusing on the “who, what, when, where, why, and how” of the threat situation. Information should be annotated with dates and times from relevant SARs, and information from each date should be provided in a separate paragraph, from inception to most recent. Your summary should focus on connecting the dots, with as much detail as needed to present all the relevant intelligence. It should highlight information that would be of particular relevance for the law enforcement agency doing follow-up in understanding the potential threat. 
B.   Determine who the adversary is for this potential threat. It may be an individual or a group. You should identify the names of suspects (if known) and also the type of adversary. For example, is the adversary an international terrorist group, a domestic terrorist group, an organized crime, a local or international gang, drug traffickers, an extremist or militia group, a hacker, or a white-collar criminal? Support your answer using relevant information from the SARs.
C.   Analyze the range of the adversary’s operations. Are their activities focused within one city or state or across multiple states? Support your answer with relevant information from the SARs.  
D.   Analyze what is known about the adversary’s motivation and how that might affect their choice of target (individual or location). Might it affect whether they choose one target or many, the type of target they select, or the location of the attack? Support your answer with relevant information from the SARs.  
E.   Based on your analyses in Parts A–C above, determine which agency has jurisdiction in following up on the potential threat. For example, should local or state law enforcement follow up? Should federal law enforcement? Does the adversary’s choice of potential targets fall under a particular jurisdiction? For example, threats to air travel might involve the FAA or TSA, while terrorist threats would go to the FBI. Be sure to justify your answer using relevant information from the SARs.  
 
III. Threat Assessment In this section of the report, you should lay out what is known about the nature and imminence of the potential threat. You may wish to use the Threat Assessment Worksheet, found in the Assignment Guidelines and Rubrics section of the course, to record and analyze relevant information from Suspicious Activities Reports (SARs) in preparing your response. However, you should present the information from the worksheet in narrative form in your finished intelligence report. 
A.   Distinguish the nature of the threat, including specific potential target(s), the location of likely attack (if the target is an individual), and potential means of attack based on the summary information and analysis above. Draw out the elements that would be most important to the agency receiving the report in determining the threat and focusing their efforts.  
B.   Assess whether the adversary has the intent, opportunity, and capability to carry out a threatening behavior. Is the threat being actively pursued? Support your answer with information from the SARs. 
C.   Assess the vulnerabilities of the potential target(s) and law enforcement’s ability to protect the target(s). Support your answer using information from the SARs and reasonable assumptions about potential vulnerabilities. For example, how tight is security for entry into a particular building? Could a target be threatened from a street location? Could law enforcement be impeded from quickly responding to a threat? Note that these questions are illustrative only, and the vulnerabilities that you identify should correspond to your analysis of the specific threat identified.  
D.   Using the analyses in Parts A–C above, assess the current level of risk using a scale from 0–10, with 0 being “no threat” and 10 being “great threat.” How imminent is the threat? Is it going to happen now, next week, in the next year, never? What level of damage could the adversary inflict if they are successful in carrying out the threat? Justify your answer based on your analysis.  
E.   Recommend what countermeasures, if any, might be appropriate for addressing vulnerabilities and mitigating the potential threat that you identified above. Depending on your analysis, you may suggest multiple countermeasures, a single countermeasure, or no countermeasures. Be sure to support your answer using your threat assessment analysis and information from the SARs. 
IV. Information Security In this section of the report, you should address how to protect critical information from falling into the hands of the adversary (i.e., operations security). You may wish to use the Operations Security Worksheet, found in the Assignment Guidelines and Rubrics section of the course, to record and analyze relevant information from the Suspicious Activity Reports (SARs) in preparing your response. However, you should present the information from the worksheet in narrative form in your finished intelligence report. 
A.   Assess what critical information surrounding the potential target and law enforcement activities to mitigate the threat needs to be protected. In other words, what information do we not want the adversary to have and why? Justify your answer.  
B.   Assess the adversary’s methods for collecting intelligence about their target and law enforcement activities. Are they making multiple visits to the target? Are they using informants within the community? Are they doing research on the internet? Monitoring police bands? Taking pictures? What other methods might they be using? Support your answer using information from the SARs and reasonable assumptions. 
C.   Assess potential weaknesses in information security that might give away critical details about the target or law enforcement activities. Support your answer using information from the SARs and reasonable assumptions.  
D.   Risk assessment. Using the analyses in Parts A–C above, assess the current level of risk from information security weaknesses as high, medium, or low. In other words, how high is the risk that the adversary will obtain the critical information, and what level of damage could the adversary inflict if the information is acquired? Support your answer using information from the SARs and reasonable assumptions.  
E.   Recommendations. Suggest what countermeasures, if any, might be appropriate for addressing the information security vulnerabilities you identify above. Justify these suggestions in terms of monetary cost versus effectiveness. How can we prevent or subvert the adversary’s methods for collecting intelligence? How do we keep the adversary from knowing that we are aware of the threat and acting to avert it? Depending on your analysis, you may recommend multiple countermeasures, a single countermeasure, or no countermeasures. Be sure to support your answer using your operations security analysis and information from the SARs. 
Final Project Rubric Guidelines for Submission: Your finished intelligence report should be 5–10 pages in length with double spacing, 12-point Times New Roman font. Remember to write the finished intelligence report in third person and in chronological order. You should also attach a copy of the Suspicious Activity Reports (SARs) as an appendix to your proposal. Although this is not a graded component of the assessment, including it in the appendix provides the agency receiving the report with additional detail and supporting documentation. 

The post For the final assessment, you will imagine you are a criminal justice professio appeared first on graduate paper help.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

In this assignment, you will examine the Darryl Hunt case from 1984 and the imp

In this assignment, you will examine the Darryl Hunt case from 1984 and the impact of his release.
Research the case of State v. Hunt, a 1984 North Carolina case in which Daryl Hunt was accused of the murder of Deborah Sykes. The case can be found easily via an internet search or through the use of CTU library resources.
Assignment Guidelines
Address the following in 2 pages:
The blood type did not match the assailant’s; could this be ignored today? Why or why not? Explain.
Are crimes still tied together today? Explain.
With the today’s studies, it is realized that most murders or rapes are intraracial, not interracial. Should people have realized that in 1984, or was it just a matter of bigotry?
Use scholarly and academic resources to support your argument.
Take this case and make 2 scenarios:
Create 1 in which the perpetrator is Caucasian and 1 in which the perpetrator is a minority.
Explain how it would be handled in this day and time.
Locate 2 cases that are similar to your scenarios, and use them as scholarly sources to back up your opinions.
Explain the legal and ethical details pertaining to your scenarios’ individuals.
Be sure to reference all sources using APA style.

The post In this assignment, you will examine the Darryl Hunt case from 1984 and the imp appeared first on graduate paper help.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Primary Task Response: Within the Discussion Board area, write 400 words that r

Primary Task Response: Within the Discussion Board area, write 400 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.
Judge James Shoreman is up for reelection in 2 months. He has a full docket on Monday morning. Two of the individuals on this docket are Thomas J. Catalano and Abdul Hussein Jabari.
Mr. Catalano has been charged with involuntary manslaughter. His prior record consists of breaking and entering, assault on a police officer, and possession of narcotics. Mr. Catalano has a “high-priced” lawyer with the discretionary funds for an additional investigation. Mr. Catalano has a wife and two children. He has been employed for 5 years for the local banking institution. Mr. Catalano has received a 10-year probation sentence with the stipulation that if he violates this probation, he will serve the remainder of the sentence in the state prison.
Mr. Jabari has been charged with the distribution of a controlled substance (prescription drugs). His prior record consists of possession of narcotics and falsification of identity. Mr. Jabari has a court-appointed lawyer who is on the pro bono list maintained by the judge. His funds are limited but the Muslim community has rallied to his financial aid, and there have been demonstrations at the courthouse. Mr. Jabari has a wife and three children. He has been employed for 8 years as the chief chef at a local restaurant. Mr. Jabari has received 7 years in the state prison, without the possibility of good time.
Looking at the family situations, the employment situations, and community support, give a reason why you think the judge would render such decisions.
How could the judge support his decisions?
Do you think he showed any type of bias? Why or why not?
If he did, what form of bias?
Could the demonstration have had an adverse effect upon the sentencing? How? Why?
Search the Web, and find 2 examples in which minorities were sentenced unfairly.
Explain the reasoning behind this sentencing, and determine if the sentences were fair or biased.

The post Primary Task Response: Within the Discussion Board area, write 400 words that r appeared first on graduate paper help.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Review section 5.4 in your text, “Improved Teacher Training and Professionalism

Review section 5.4 in your text, “Improved Teacher Training and Professionalism.” Your text shares a multitude of examples that demonstrate an increase of quality in teacher training. 
Describe at least three factors (e.g., normal schools broadened their curricula to the training of secondary school teachers, requirement of the completion of high school to be admitted to college for teacher training, teachers must have a bachelor’s degree, development and growth of teacher training courses, Herbartianism, teacher certification, and teacher organizations) that contribute to improved teacher training in the late-19th and early-20th centuries. Select one contribution and determine if it is still prevalent today. Explain how you could improve on this contribution by using technology in your own classroom or school situation. 

The post Review section 5.4 in your text, “Improved Teacher Training and Professionalism appeared first on graduate paper help.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Quiz 4 From Plantation to Ghetto: The Great Migration, Harlem Renaissance, and

Quiz 4
From Plantation to Ghetto: The Great Migration, Harlem Renaissance, and World War, 1915-1954
Directions
Answer the questions below. This quiz requires a discussion of the information presented in the lectures and readings from Module Four. All responses are to be written in essay format and should include citations and details from the lectures and readings to illustrate understanding of the material. Each essay response should be a minimum of 100 words (provide a word count at the end of each question) and is worth 25 points. Remember to use proper grammar, spelling, punctuation and APA  style for all essays.​ This requires proper in text citation and a works cited section at the bottom of the quiz.
Prompts
First Essay
What discrimination did black workers experience when attempting to join labor unions and what benefits would they have gotten from union memberships?
Second Essay
The readings “Black Women Workers during the Great Depression” and “An End of the Neglect of the Problems of the Negro Woman” both address the plight of black female domestic workers.  What oppressive job conditions did black female domestic workers experience during this time period?
Third Essay
The reading, “Adam Clayton Powell Jr., and the Fight for Black Employment in Harlem,” gives an example of a “Don’t Buy Where You Can’t Work” campaign.  Which demands did the protesters present in their job campaign?  Of these demands, which, in your opinion, was the most important one?
Fourth Essay
In the reading, “A. Philip Randolph and the Negro March on Washington Movement,” what reasons did A. Philip Randolph give as reasons for the need for a march in the “Why should we march” section?  In your opinion, should they have canceled the march?
Read (from Let Nobody Turn Us Around)
“Black Workers in the Great Depression” (begins on page 273)
“Adam Clayton Powell Jr., and the Fight for Black Employment in Harlem” (begins on page 298)
“Black Women Workers during the Great Depression” (begins on page 300)
“A. Philip Randolph and the Negro March on Washington Movement” (begins on page 308)
“An End of the Neglect of the Problems of the Negro Woman” (begins on page 316

The post Quiz 4
From Plantation to Ghetto: The Great Migration, Harlem Renaissance, and appeared first on graduate paper help.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

  This week’s chapter readings focused on four mini-case studies with unique ch

  This week’s chapter readings focused on four mini-case studies with unique challenges presented that are highly relevant in the context of ERM.  Provide a brief summary of each of the four case studies by discussing for each case what was the challenge presented and some strengths and weakness in the risk management approaches. Conclude your discussion, based on the case study from chapter 29 “Transforming Risk Management at Akawini Copper”, by providing your thoughts on risk management transformations, specifically discussing  how we can monitor risk transformation progress and performance. 

The post   This week’s chapter readings focused on four mini-case studies with unique ch appeared first on graduate paper help.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Consider a highly visible business person in a leadership position. Discuss thi

Consider a highly visible business person in a leadership position. Discuss this individuals leadership styles/traits in terms of what we have learned from our reading. What characteristics have made this person successful? Since all leaders encounter dissension at some point, what characteristics have helped this person handle conflict and what characteristics have hindered him/her? How could the latter be addressed effectively?  Provide examples and cite all resources.
To recap, focus on applying the various leadership styles to your real world example instead of providing an assessment of leadership qualities and achievement. 

The post Consider a highly visible business person in a leadership position. Discuss thi appeared first on graduate paper help.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"