Contemporary Issues

Contemporary Issues

https://geniusproessays.com/

Contemporary Issues:

ELSE 6013 Contemporary Issues

Name: Date:

Assignment Overview: After reading this chapter, find a minimum of two additional articles that support the Least Restrictive Environment (LRE) topic and write a double-spaced discussion paper following guidelines posted below. Make sure to include the following in your paper:

● Your experiences with Least Restrictive Environment as a parent, educator, and/or by-stander.

● Addressing the current issue ● Analyze what you see as the two sides of this issue. ● Identify a perceived misconception from either side. (When doing this, list the actual

sentence(s) or portion of the sentence, citing the page number that you are referring to, then write your response as to why you think it is a misconception. The key word is “perceived.”

● And finally, which side do you personally agree with more and why? (Refer to your personal experiences, here. If you have dealt with this issue in your personal life, work, teaching, etc., include that information in your answer.)

Guidelines Discussion paper should be between 1.5-2 pages, not including Title and Reference pages.

✔ Title Page

✔ Introductory paragraph

✔ Appropriate paragraphs discussing topics posted above

✔ Conclusion/summary paragraph

✔ Bibliography/Reference Page

✔ APA Format (latest edition) ✔ Submitted as Word Document or PDF

 

 

Use this rubric to guide your work. All work at the Master’s Level is APA formatted.

Tasks Exemplary Acceptable Unacceptable

Assignment: Discussion Essay Main Idea & Organization

There is one clear, well-focused main idea. Main idea is clear and well supported by detailed and accurate information throughout the paper. Includes title, introduction, statement of main idea, transitions and conclusion/summary.

There is a main idea supported throughout the paper. Good overall organization, includes the main organizational tools.

Shows limited awareness of purpose. Vague sense of a main idea, weakly supported throughout the paper.

Paragraph Organization

All paragraphs have clear ideas, are supported with examples and have smooth transitions.

Most paragraphs have clear ideas, are supported with some examples and have transitions.

Some paragraphs have clear ideas, support from examples may be missing and transitions are weak.

Guidelines The student followed ALL posted guidelines/directions and paper is APA formatted.

Student thoroughly answered all questions posed in the Overview with examples as needed.

The student followed most posted guidelines/directions not missing more than one element. Paper is APA formatted.

Student answered all questions posed in the Overview.

Student did not follow posted guidelines/directions. Formatting guidelines ignored.

Student attempted to address each question posted in the Overview section of the directions.

 

 

Content Exceptionally well-presented and argued; ideas are detailed, well-developed, supported with specific evidence & facts from text as well as examples and specific details from articles.

(up to 10 points)

Well-presented and argued; ideas are detailed, developed and supported with evidence and details, mostly specific.

Content is sound and solid; ideas are present but not particularly developed or supported; some evidence, but usually of a generalized nature.

Style Sentences are clear and varied in pattern,

from simple to complex, with

excellent use of punctuation. There is

clear use of a personal and unique style of writing, suited

to educational audience and

purpose; the paper holds the reader’s interest with ease.

Sentences are clear but may lack variations; a few may be awkward and there may be a few punctuation errors. There is an attempt at personal style but style of writing may be awkward or unsuited to educational audience and purpose; the reader may lose interest in some sections of the paper.

There is little attempt at style; reads as flat and perhaps uninteresting in content, which us usually generalized and cliched.

Grammar and Mechanics

Excellent grammar, spelling, syntax and punctuation.

A few errors in grammar, spelling, syntax and punctuation, but does not distract from overall reading of the paper.

Shows a pattern of errors in spelling, grammar, syntax and/or punctuation. Could also be a sign of lack of proof-reading.

Communication Plan

Communication Plan

https://geniusproessays.com/

Communication Plan: This week the expectation is to write a full draft of the communication plan for Target’s new cargo pants launch. Attached is the grading rubric and the last submission.

On-the-Job Action Plan Rubric (200 points total)
Criteria Expert Proficient Competent

 

Novice
Project Management Knowledge Learner clearly, accurately, and appropriately draws upon and utilizes project management concepts and terminology from the videos and readings to provide a solid foundation for their action plan.

46-50 points

Learner uses project management concepts and terminology from the videos and readings, but does not coherently tie them together in order to provide a solid foundation for their action plan. 40-45 points Learner uses some project management concepts and terminology from the videos and readings. Some concepts are used not accurately or appropriately.

26-39 points

Learner does not use any project management concepts and terminology to support their action plan. Or most or all concepts are used not accurately or appropriately.

0-25 points

Investigate real-work problem or goal / Envision realistic plan(s) Learner provides accurate and appropriate information on the real-work problem or goal; Clearly describes realistic and flexible plan(s) for solving the problem or achieving the goal.

46-50 points

Learner provides information on the real-work problem or goal; Describes working plans for solving the problem or achieving the goal. But the description of the problem/goal is not very clear, accurate, or appropriate. The plan(s) is realistic with some restrictions.

40-45 points

Learner provides limited information on the real-work problem or goal; Describes working plans for solving the problem or achieving the goal. But the description of the problem/goal is very general or vague. The plan may work, but has many restrictions.

26-39 points

Learner does not provide any information on the real-work problem or goal; Learner does not provide any plan, or the plan proposed is not realistic at all.

0-25 points

Identify stakeholders Learner accurately identifies all the appropriate key stakeholders and describes their relationship and importance to the plan. 46-50 points Learner identifies most key stakeholders and describes their relationship and importance to the plan. 40-45 points Learner identifies only some key stakeholders and describes their relationship and importance to the plan. 26-39 points Learner identifies few to no key stakeholders; Or stakeholders are not appropriate. 0-25 points
Motivate and Implement Plan Learner constructs actionable steps and clearly describes the strong motivation to engage the stakeholders to implement the plan.

46-50 points

Learner constructs mostly actional steps and describes the motivation to engage the stakeholders to implement the plan. 40-45 points Learner constructs some actional steps and describes limited motivation to engage the stakeholders to implement the plan. 26-39 points Learner constructs few or no actional steps and describes no motivation to engage the stakeholders to implement the plan.

0-25 points

Lack of Education

Lack of Education

https://geniusproessays.com/

Lack of Education:

DUE SEP 18TH BY 11:59 PM

Reflect: Reflect back on the Week 1 discussion in which you shared with the class the global societal issue that you would like to further address (LACK OF EDUCATION). Explore critical insights that were shared by your peers and/or your instructor on the topic chosen and begin your search for scholarly sources with those insights in mind.

Write: For this assignment, review the Annotated Bibliography Formatting Guidelines

Download Annotated Bibliography Formatting Guidelines

and address the following prompts:

•  Introductory paragraph to topic (refer to the Final Paper guidelines for your topic selection).

◦  Write an introductory paragraph with at least 150 words that clearly explains the topic, the importance of further research, and ethical implications.

•  Thesis statement.

◦  Write a direct and concise thesis statement, which will become the solution to the problem that you will argue or prove in the Week 5 Final Paper. (A thesis statement should be a concise, declarative statement. The thesis statement must appear at the end of the introductory paragraph.)

•  Annotated bibliography.

◦  Develop an annotated bibliography to indicate the quality of the sources you have read.

◦  Summarize in your own words how the source contributes to the solution of the global societal issue for each annotation.

◦  Address fully the purpose, content, evidence, and relation to other sources you found on this topic (your annotation should be one to two paragraphs long—150 words or more.

◦  Include no less than five scholarly sources in the annotated bibliography that will be used to support the major points of the Final Paper.

◦  Demonstrate critical thinking skills by accurately interpreting evidence used to support various positions of the topic.

The Introduction, Thesis Statement, and Annotated Bibliography

•  Must be 1,000 to 1,250 words in length (not including title page) and formatted according to APA style, as outlined in the University of Arizona Global Campus Writing Center’s APA Style (Links to an external site.) resource.

•  Must use at least five scholarly sources.

◦  The Scholarly, Peer Reviewed, and Other Credible Sources (Links to an external site.) table offers additional guidance on appropriate source types. If you have questions about whether a specific source is appropriate for this assignment, contact your instructor. Your instructor has the final say about the appropriateness of a specific source for an assignment. The Integrating Research (Links to an external site.) tutorial will offer further assistance with including supporting information and reasoning.

•  Must document in APA style any information used from sources, as outlined in the University of Arizona Global Campus Writing Center’s Citing Within Your Paper. (Links to an external site.)

Marketing Plan

Marketing Plan

https://geniusproessays.com/

Marketing Plan:

  • Develop a 5-page marketing plan based on research promotion, pricing, distribution, advertising, and product mix.
    Introduction
    Completion of this portfolio work project will help you understand the key components .
    Scenario
    The Vice President of Marketing at MSH Brands (or at your employer or future employer company) has asked you to participate as a member of a marketing management team for the pet food group (or for their product line) for the company. MSH Brands is one of five companies competing in the pet food market. Your membership on the team will require you to make decisions regarding promotion, pricing, distribution, advertising, and product mix.
    Your Role
    You are a Brand Manager at MSH Brands. You are being asked to develop a marketing plan for a new pet food product (or new product or line extension at your employer or future employer.)
    Requirements
    You are to develop a marketing plan including the following elements based on your research promotion, pricing, distribution, advertising, and product mix. Include the following in your marketing plan:
  1. Business context. Describe the new product to be featured. What are the features and benefits? What is the company reason for bringing this to market? What are the corporate objectives for it?
  2. Situation analysis. How will this new product complement the existing product portfolio or product line? Who is the target market? Who are the competitors?
  3. Marketing strategy. What is the overall marketing strategy to support the achievement of the corporate objectives? What is the product positioning statement?
  4. Marketing mix. What is the promotional strategy to support the achievement of the corporate objectives? What is the pricing strategy to support the achievement of the corporate objectives? What is the distribution strategy to support the achievement of the corporate objectives? What is the advertising strategy to support the achievement of the corporate objectives?
  5. Effectiveness. How will you measure the effectiveness of this marketing plan?
  6. Deliverable Format
    Requirements:
  • Marketing plan is 5 pages (in addition to the title, reference, and appendix pages). Use the Marketing Plan Template [DOC] as a resource.
  • The marketing plan is a professional document and should therefore follow the corresponding MBA Academic and Professional Document Guidelines (located in MBA Program Resources), including single-spaced paragraphs.
  • In addition, include the following in your marketing plan:
    • Title page.
    • References page. Use at least three scholarly resources.
    • APA-formatted references.
  • Evaluation
    By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies through corresponding scoring guide criteria:
  • Competency 1: Apply marketing theories and models to develop marketing strategies.
    • Articulate the context of the business.
  • Competency 2: Evaluate the effectiveness of marketing strategies and methods.
    • Evaluate the effectiveness of marketing strategies.
  • Competency 3: Use data to support evidence-based marketing decisions.
    • Evaluate the situation including the product portfolio, target market, and competitive environment of the business.
    • Evaluate the marketing mix for a product.
  • Competency 4: Analyze the role of technology and social media in effective marketing strategies.
    • Analyze the expected effectiveness of the marketing plan.
  • Competency 5: Communicate marketing needs, opportunities, and strategies with multiple stakeholders.
    • Write coherently to support a central idea with correct grammar, usage, and mechanics as expected of a business professional.
  • ePortfolio
    This portfolio work project demonstrates your competency in applying knowledge and skills required of a MBA learner in the workplace. Save this activity to your ePortfolio for future reference in the workplace.
  • attachment

    cf_MBA-FPX5012_marketing_plan_template.doc

Writing Center

Writing Center

https://geniusproessays.com/

Writing Center: Purpose: The primary goal of this weekly assignment is to enable you to understand the revision process and revise your paper with the help of a writing specialist.

Prepare:

Step 1: Prepare a shortened version of your Final Paper (at least four pages) by including the following:

· Introduction paragraph and thesis statement you developed for your Week 3 Assignment.

· Background information of the global societal issue you have chosen.

· Brief argument supporting at least two solutions to the global societal issue.

· Conclusion paragraph.

· Must document any information used from at least five scholarly sources in APA style as outlined in the University of Arizona Global Campus Writing Center’s  Citing Within Your Paper (Links to an external site.)  Note that you will need at least eight scholarly sources for your Final Paper in Week 5.

Step 2: After you have completed a rough draft of your paper, submit that draft to the University of Arizona Global Campus Writing Center by using the instructions found in the  Paper Review (Links to an external site.)  page. Your paper will be returned within 24 hours, so give yourself enough time to complete and submit it prior to the due date.

Reflect: Carefully review the summary feedback found in the email from the tutor and the margin comments that you see on your returned paper. Consider each of the suggestions provided to help you to revise your paper.

Write:

What You Need to Submit to Waypoint:

· Upload the document that contains the feedback from the Writing Center specialist.

· Submit the journal assignment answering the following questions in at least 400 words:

· Identify the top three issues your writing specialist focused on in your rough draft (e.g., paragraph structure, proper use of quotations, thesis statement, etc.).

· In what ways were those issues surprising?

· Describe what you learned from some of the feedback your writing specialist provided as explanations.

· Was this feedback helpful?

· Evaluate the usefulness of the paper review tool.

· In what ways did this activity improve your academic writing skills?

· Will you use the University of Arizona Global Campus Writing Center to review your work in the future? Why or why not?

· Identify Writing Center  Video Tutorials (Links to an external site.)  that you find most useful and explain why. Also, identify tutorial(s) you found least useful and explain why.

Cognitive Changes

Cognitive Changes

https://geniusproessays.com/

Cognitive Changes:

Discussion Thread: Cognitive Changes

As we age, we go through various memory and cognitive changes. The thought of changes in memory and cognitive abilities may seem off-putting at first, but this is a normal part of aging.  Most of these changes are normal, although there are some abnormal changes as well. Healthy habits can help preserve and improve memory and cognitive abilities, helping to ensure normal changes.

Whether memory changes affect daily functioning is how to separate normal from abnormal memory aging (Cavanaugh & Blanchard-Fields, 2019). Different diseases, such as dementia, and other factors such as severe depression and traumatic brain injuries, can impair memory and daily functioning, known as abnormal memory aging (Cavanaugh & Blanchard-Fields, 2019). Normal memory aging does not affect daily functioning as abnormal aging.

There is evidence that working memory, an umbrella term for many short-term holding and computational processes relating to a vast range of cognitive skills and knowledge demands, declines as we age, although the extent of the working memory decline is in doubt (Cavanaugh & Blanchard-Fields, 2019). However, just like training a muscle, memory can be trained to remain fit. For example, by repeating something over and over, known as rehearsal, we are able to keep the information in working memory (Cavanaugh & Blanchard-Fields, 2019).

There are also various memory aids used to improve memory. Eternal aids, memory aids that rely on environmental resources such as notebooks, and internal aids, memory aids that rely on mental processes such as imagery, can be used to improve both explicit and implicit memory (Cavanaugh & Blanchard-Fields, 2019). Learning new skills, exercise, and avoiding the application of memory stereotypes are also factors that improve and preserve memory as we age (Cavanaugh & Blanchard-Fields, 2019).

Much like memory, cognitive ability is preserved and/or improved as we age by repetition or acquiring knowledge through life experience and education, known as crystallized intelligence (Cavanaugh & Blanchard-Fields, 2019). Crystallized intelligence does not normally decline with age, but rather increases until late in life (Cavanaugh & Blanchard-Fields, 2019). This is why older people are considered wise, not because of their age, but because their crystallized intelligence has made them experts over time through education and life experience over many years (Cavanaugh & Blanchard-Fields, 2019).

This is also supported in Scripture, “Wisdom is with the aged, and understanding in length of days.” (English Standard Version Bible, 2001, Job 12:12). Also, the book of Proverbs says, “The glory of young men is their strength, but the splendor of old men is their gray hair.” (English Standard Version Bible, 2001, Proverbs 20:29). This is because gray hair is like a crown of glory gained from living a righteous life (English Standard Version Bible, 2001, Proverbs 16:31). Therefore, do not be afraid of aging. Keep your memory sharp, learn new skills, and share your wisdom with the world.

References

Cavanaugh, J. C., & Blanchard-Fields, F. (2019). Adult development and aging. Cengage Learning.

English Standard Version Bible. (2001). ESV Online. https://esv.literalword.com/

Communicable Disease

Communicable Disease

https://geniusproessays.com/

Communicable Disease:

image1.jpg

Write a paper (2,000-2,500 words) in which you apply the concepts of epidemiology and nursing research to a communicable disease. Refer to  “Chain of Infection,” and the CDC website for assistance when completing this assignment.

Communicable Disease Selection

1. Chickenpox

2. Tuberculosis

3. Influenza

4. Mononucleosis

5. Hepatitis B

6. HIV

7. Ebola

8. Measles

9. Polio

10. Influenza

Epidemiology Paper Requirements

1. Describe the chosen communicable disease, including causes, symptoms, mode of transmission, complications, treatment, and the demographic of interest (mortality, morbidity, incidence, and prevalence). Is this a reportable disease? If so, provide details about reporting time, whom to report to, etc.

2. Describe the social determinants of health and explain how those factors contribute to the development of this disease.

3. Discuss the epidemiologic triangle as it relates to the communicable disease you have selected. Include the host factors, agent factors (presence or absence), and environmental factors. Are there any special considerations or notifications for the community, schools, or general population?

4. Explain the role of the community health nurse (case finding, reporting, data collection, data analysis, and follow-up) and why demographic data are necessary to the health of the community.

5. Identify at least one national agency or organization that addresses the communicable disease chosen and describe how the organizations contribute to resolving or reducing the impact of disease.

6. Discuss a global implication of the disease. How is this addressed in other countries or cultures? Is this disease endemic to a particular area? Provide an example.

A minimum of three peer-reviewed or professional references is required.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. A link to the LopesWrite technical support articles is located in Course Resources if you need assistance.

Attachments

NRS-428VN-RS2-CommunicableDiseaseChain.doc

Communicable Disease Chain

image1.jpg

 

Infectious Agent

 

Microbes – All Types

Pathogenicity

Invasiveness

Virulence

Infective Dose

Resistance

 

 

 

 

Means of Transmission

 

Direct

Indirect

 

 

 

 

Portal of Re-entry

 

Same as Exit

 

 

Portal of Exit

 

Respiratory

Integumentary

Blood

GI

Sexual

 

 

Susceptible Host

 

Defense Mechanisms

Immunity

Natural

Artificial

 

 

Reservoirs

 

Humans

Animals

Plant/Soil

 

 

© 2011. Grand Canyon University. All Rights Reserved.

Future of Nursing

Future of Nursing

https://geniusproessays.com/

Future of Nursing:

As the Institute of Medicine seminal report has progressed through the decades, progress toward goals and new needs are identified. Currently, 2020-2030 plans are being developed.

 

Review the Future of Nursing 2020-2030.

Consider the current and future challenges identified:

  • The role of nurses in improving the health of individuals, families, and communities by addressing social determinants of health and providing effective, efficient, equitable, and accessible care for all across the care continuum, as well as identifying the system facilitators and barriers to achieving this goal.
  • The current and future deployment of all levels of nurses across the care continuum, including in collaborative practice models, to address the challenges of building a culture of health.
  • System facilitators and barriers to achieving a workforce that is diverse, including gender, race, and ethnicity, across all levels of nursing education.
  • The role of the nursing profession in assuring that the voice of individuals, families, and communities are incorporated into the design and operations of clinical and community health systems.
  • The training and competency-development needed to prepare nurses, including advanced practice nurses, to work outside of acute care settings and to lead efforts to build a culture of health and health equity, and the extent to which the current curriculum meets these needs.
  • The ability of nurses to serve as change agents in creating systems that bridge the delivery of health care and social needs care in the community.
  • The research needed to identify or develop effective nursing practices for eliminating gaps and disparities in health care.
  • The importance of nurse well-being and resilience in ensuring the delivery of high-quality care and improving community health.
Consider your role as a leader in developing the Future of Nursing in 2020 and beyond.

Include the following aspects in the discussion:

  • Choose one of the needs above (do not use one a peer has chosen if possible)
  • Search the database for one recent scholarly article that explores the topic
  • Summarize your plan to participate in this need
  • Discuss how your leadership style influences your plan

NOTE- JUST WRITE 100 WORDS

Cybersecurity Incident

Cybersecurity Incident

https://geniusproessays.com/

Cybersecurity Incident: Complete the following using the course text, professional journal articles, or other reputable resources (NO WIKIPEDIA or BLOGS).

· Find a recent cybersecurity incident. A good resource for this may be the FBI, CERT, CISA, SANS, Verizon DataBreach reports and etc.

· Write an attack case study about the incident. Make sure to include all five steps listed in the text (Overview, Perpetrator, Attack Scenario, Risk Management, and References).

Paper Requirements:

· Format: Microsoft Word

· Font: Arial, 12-Point, Double-Space (or equivalent)

· Citation Style: APA or MLA (The point is to use a style that makes your document readable and give credit to the sources you used.)

Length Requirements:

· 2–3 pages

· Coversheet

· List of References Page.

· Proofread – Edit for spelling, grammar, punctuation, etc.

· Use only course text, professional journal articles, or other reputable resources.

Chapter 2 Controlling a Computer

Chapter 2 Overview

Overview of the general strategies for controlling access

Buffer overflow: a well-known technique for subverting computer software

Introduction to attack scenarios and case studies

Mechanisms typically used to control access within a computer

Security planning: describing the protections needed and how to implement them

CPU Hardware: Motherboard

Left: © iStockphoto/Thinkstock; Middle: © Péter Gudella/Dreamstime.com; Right: Courtesy of Dr. Richard Smith.

Programs

Data resides in RAM

Numbers and other coded data

Examined and modified by programs

Stored in consecutively numbered locations

Programs are lists of instructions

Instructions reside in RAM

Each is a single arithmetic operation or comparison

Stored in consecutively numbered locations

Executing a Machine Instruction

Left: Courtesy of Dr. Richard Smith; Right: © iStockphoto/Thinkstock

Organizing RAM into “Sections”

Control sections

Contain instructions to execute

Contain unchanging data

Data sections

Contain variables that change

Contain “free form” RAM

Buffers, stacks

Control and Data Sections

Functions, Procedures, Subroutines

We break programs into pieces

A piece with a particular job = function or procedure or subroutine, all roughly the same

One function can execute another function

PC is pointed to the called function’s address

We save the current function’s “state”

Saving the variables and the caller’s PC

Saved in RAM, often on a “stack”

One Function Calls Another Function

We save the program counter in the “calling function”

We execute the instructions in the “called function”

At the end of the “called function” we restore the program counter

This returns the CPU to where the “calling function” left off

Processes

A program is a group of instructions

A process is a running program

Its PC is, or can be, changing

It has some RAM with instructions and data

Windows example

Run two command shells

One program, two processes

Looking at processes with the Task Manager

List Applications; List Processes

Switching Processes

The “dispatcher” procedure in the operating system (OS) switches running processes

Stops (pauses) one process and starts another

Save the PC for the stopped process

Save other CPU data from the stopped process

Locate the “saved state” for the one to start

Load up the saved CPU data for the process

Load the PC with the starting process’s PC value

The Operating System

Dispatching and process management is only one of its many tasks.

RAM management – assigns RAM to active processes and manages free RAM

I/O management – handles external devices

File management – hard drives & mass storage

User interface management – keyboards and GUIs

Network protocols – connect to other computers

Buffer Overflow: The Morris Worm

Morris Worm – first major Internet worm

1988 – disabled about 10% of Internet computers

Used several attacks

Buffer overflow vulnerability

A program fails to keep track of its input

The input data modifies RAM that it shouldn’t

Attacker can take over the computer if the wrong RAM gets modified

The “finger” Program

Retrieved information about other users

Rarely used today

Command “finger jsl@bu.edu

Retrieved information about JSL at BU.EDU

If the sender typed too many letters, like:

finger jsl@bu.eduXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX and so on… the program overflowed a buffer

What Overflows?

It Overflows the Stack

When we call another procedure, we must save the PC and the current procedure’s working variables inside the CPU

We save the information on a last-in first-out block of RAM called the stack

If a storage area on the stack is overrun, the data may modify the saved PC

When the procedure is finished, it jumps back to the wrong instructions in RAM

The Stack Overflow

The Worm Connection

Why Does the Shellcode Work?

Programs execute from a control section

The stack is in the data section

If the computer has data execution prevention (DEP), it only executes instructions in a control section

Not all systems – or programs – can use DEP

The Worm Released

Released in October 1988

Promptly infected 10% of Internet computers

The worm was designed to infect each computer once

The restricting code did not work

Each computer was infected hundreds of times

Infected computers became unusable

Spread nationwide between 9pm and 11pm

Fighting the Worm

Telephone lines were not affected

Analysts shared information by phone

Many were at a meeting in Berkeley, fortunately

As sites cleaned themselves up, they shared status and defensive data via email

Site cleanup was tricky – a “clean” computer had to be hardened against the worm or it would be infected all over again

Security Alerts and Coordination

The worm incident helped create the Computer Emergency Response Team (CERT)

First nationwide, multi-organization computer security team – tracked and reported problems

Today, reports are tracked by the Common Vulnerability Enumeration (CVE)

Numerous public and private security organizations, like the “Internet Storm Center”

Studying Cyber Attacks

A systematic analysis, based on attack reports

Attack scenarios

May study potential or actual attacks

Elements are all based on recorded attacks

Attack case studies

Report actual attacks

A scenario that includes threat agent data

 

Security Training Program

Security Training Program

Security Training Program:

Please is important to refer to the attached document for the powerpoint presentation.

Urgently due tomorrow.

Module 06 Course Project – Security Training Program

The policies that you have created and modified have received final approval from management.

You have been asked to do the following:

  • Develop a security training program for the staff to ensure that the updated and new policies are fully understood.

For this submission, you will:

  • Create a PowerPoint presentation to be used for training the staff.
  • Highlight ALL changes whether they are new policies or changes to existing policies.
  • Provide 10 – 15 slides and include speaker notes.
  • Make your presentation clear and use an appropriate and influential tone to engage staff so that the new policies and changes are easily understood.
  • Use professional language, proper grammar and spelling.
  • <Project Name> Version: <1.0> Error! Unknown document property name.

    Summary Report Module <Insert Module #>

     

     

     

     

    Summary Report – Module 5

    Version 1

    Prepared By: Jude akassap

     

    Date: 9/11/22

     

    <Project Name> Training Plan Version: <1.0> Error! Unknown document property name.

     

     

     

     

    Revision Date: Error! Unknown document property name. Page 2 of 10

    NOT DONE – CDC_UP_Training_Plan_Template.doc

    VERSION HISTORY

     

    Version # Implemented

    By

    Revision

    Date

    Approved

    By

    Approval

    Date

    Reason
    1.0 Jude Akassap 9/11/22 Jay M. 9/11/22 Approve recommendation
               
               
               

     

     

     

     

    TABLE OF CONTENTS

    1 Introduction 5

    1.1 Purpose 5

    2 Executive Summary 5

    3 Detailed Summary 5

    3.1 LAN Security/Password Policy 5

    3.2 Antivirus 5

    3.3 Acceptable Use 5

    4 Recommendations 5

    5 SuggEstED aCTIONS 5

    Appendix A: Approval 6

    APPENDIX B: REFERENCES 7

    APPENDIX C: KEY TERMS 8

    Introduction

    Purpose

    This Summary Report provides a summary of end users security policies updates and recommendations to improve security

    Executive Summary

    In this report, the end user security policy is examined, and areas where new policies or modifications would be beneficial are noted.

    Detailed Summary

     

    LAN Security/Password Policy

    While the LAN Security policy section does mention some policy parameters regarding password security, certain aspects are left entirely up to the IT Officers discretion. Password policy guidelines such as the complexity, length, and frequency of use should be detailed for increased security. Many organizations follow a password standard such as NIST

    This policy is a bit of a mixed bag when it comes to passwords. It does reference basic parameters about password security such as password complexity, length and frequency of use, but the IT Officers are left entirely on their own in terms of rules regarding components (alphanumeric vs. uppercase vs. lowercase) and rules that may be followed. It’s recommended that organizations follow NIST security guidelines such as those outlined in “Guidelines for Developing Security Policies.”

    The IT Officer in charge will be the primary contact for LAN Security and Password Policy. This can be done by either writing a policy and or delegating this responsibility to an individual or organization. It is recommended that the IT Officer(s) collect information from each employee regarding their password security practices to determine best practices for their organization.

    Antivirus

    According to the 10.1 Detailed Policy Requirements section, BYOD devices must have antivirus software, however company-owned laptops and other devices are not obliged to have antivirus software. All company-owned devices should come with antivirus software installed, and only IT administrators should be allowed to turn it off. Any software installation should be subject to prior authorization and IT administrative rights. By enabling antivirus and carefully examining software before it is loaded, end device security will be much improved.

    Acceptable Use

    There is no definition of acceptable use of an organization resource. Implementing firewall rules to ban specific websites and website categories that are regarded inappropriate for the workplace is a good idea. Policies that outline acceptable and undesirable workplace browsing activity should be made available to employees.

     

    Recommendations

    This report finds there are several critical issues with the current security policy and recommends the above actions be implemented to increase the overall security of the organization.

    · Update LAN security policy- fundamental protections; BitLocker, RAID, Secure Active Directory through monitoring Active connections on internal and external network, leverage encryption across all applications and services, authentication measures, such as hardware tokens or multifactor authentication.

    · Update Password policy- requires change every 90-180 days, make minimum of 10 characters in length, include hard-to- Guess factor.

    ·

    SuggEstED aCTIONS

    Following these recommendations, new policies ought to be developed and included in the upcoming version of the end user information security policy.

    · New guideline policy; for the use of operating systems, browsers and other hardware appliances. That includes 1. No sharing of passwords, PINs or other authentication information with anyone else. 2. Regular reporting of security breaches. 3. Regularly back up all of your personal data and keep it in a safe place in case the worst should happen. 4. Log security alerts and report any new risks as soon as possible

    · New information security policy with specifications: new organizational requirements, such as GDPR compliance, no one may access or leave the network without permission, everyone must log in using their own computer, only authorized extensions may be added to existing accounts and all private information should be kept secure. The policy also demands that everyone in the organization, including admins and power users, know and abide by the policies detailed in this document. The benefit is that the updated policy prevents data exfiltration and unauthorized data access, while enhancing the confidentiality, integrity and availability of the existing systems.

    Appendix A: Approval

    The undersigned acknowledge they have reviewed the and agree with the approach it presents. Changes to this will be coordinated with and approved by the undersigned or their designated representatives.

     

    Signature:   Date:  
    Print Name: Jude Akassap    
    Title: IT Officer    
    Role: Develop, Upgrade, Deploy the infrastructure of the Network, Software, Database    

     

     

    Signature:   Date:  
    Print Name: Dene Kinter    
    Title: Network System Admin    
    Role: Deploy and Maintain the Office LAN Network    

     

     

    Signature:   Date:  
    Print Name: Hunt Jamey    
    Title: Software QA Analyst    
    Role: Maintain, Update, Program the IT software infrastructure    

     

     

    APPENDIX B: REFERENCES

    [Insert the name, version number, description, and physical location of any documents referenced in this document. Add rows to the table as necessary. This is where you would want to reference your Risk Register and any other documents that you need to. For the purposes of this class, please include references to course material or outside sources that you are using in your work.]

    The following table summarizes the documents referenced in this document.

    Document Name and Version Description Location
    <Document Name and Version Number> [IT Security Plan] < https://security.it.iastate.edu/policies/it-security-plan >

     

    APPENDIX C: KEY TERMS

    [Insert terms and definitions used in this document. Add rows to the table as necessary. Keep in mind that you are typically writing a summary report for someone who is not familiar with information technology. Be sure to define any terms here that might need to be explained.]

    The following table provides definitions for terms relevant to this document.

    Term Definition
    Audit An unbiased and independent verification of the IT infrastructure which includes the approach of evaluating and collecting the IT security operations and practices.
    IT Security The preservation of the integrity and confidentiality associated with information system.
    Risk The chance of a specific vulnerability with the Information System either unintentionally or intentionally exploiting the IT threat.

     

     

    1

    Revision Date: Error! Unknown document property name.

    Page 7 of 8

    image1.png