ITNA357 Network Security Management discussion 4

The Discussion Board (DB) is part of the core of online learning. Classroom discussion in an online environment requires the active participation of students and the instructor to create robust interaction and dialogue. Every student is expected to create an original response to the open-ended DB question as well as engage in dialogue by responding to posts created by others throughout the week. At the end of each unit, DB participation will be assessed based on both level of engagement and the quality of the contribution to the discussion.

At a minimum, each student will be expected to post an original and thoughtful response to the DB question and contribute to the weekly dialogue by responding to at least two other posts from students. The first contribution must be posted before midnight (Central Time) on Wednesday of each week. Two additional responses are required after Wednesday of each week. Students are highly encouraged to engage on the Discussion Board early and often, as that is the primary way the university tracks class attendance and participation.

The purpose of the Discussion Board is to allow students to learn through sharing ideas and experiences as they relate to course content and the DB question. Because it is not possible to engage in two-way dialogue after a conversation has ended, no posts to the DB will be accepted after the end of each unit.

Some organizations have gone as far as inserting radio-frequency identification (RFID) chips into their employees to control their access into secure areas and to monitor their movement and location.

   Research and discuss where RFID tags have been used for security measures.

   Discuss your feelings on how these devices are being used.

   Be sure that you fully explain your viewpoint and justify your response.

As the popularity and use of RFID tags increase, the concern about these devices also continues to grow.

 

               

week5 Assignment

Assignment 2: APA Fundamentals

Due Week 5 and worth 75 points

Login to iCampus (https://icampus.strayer.edu/login) and review Strayer University’s APA guidelines located in the Learning Resource Center under the Student Services tab. This information is also available by clickinghere.

Review the following tutorials which demonstrate the use of MS Word to create a paper according to APA Sixth edition standards.

Download and use the text document provided here. (Note: You must use the provided information to complete the assignment.) Using the document’s content, create one (1) APA Sixth edition paper writing template in which you: 

  1. Format a title page according to APA Sixth edition standards.
  2. Format the provided abstract, introduction and thesis statement, body, and conclusion according to APA Sixth edition standards.
  3. Format the provided block quote in the body of the template according to APA Sixth edition standards.
  4. Format the provided references according to APA Sixth edition standards.
  5. Format the overall paper (font, font style, spacing, margins, etc.) according to APA Sixth edition standards.

The specific course learning outcomes associated with this assignment are:

  • Use word processing software to create and format documents.
  • Use technology and information resources to research issues in information systems.  
  • Write clearly and concisely about introductory information systems topics using proper writing mechanics and technical style conventions.

Click here to view the grading rubric for this assignment.

 

human resource project plan

 

Assignment 3: Human Resource Project Plan 

Due Week 6 and worth 280 points

You have recently been appointed head of human resources and are now in charge of managing a small team. Your next project is to revamp the compensation and benefits package employees are receiving at your company. Design a plan for the human resource project without the use of MS Project or similar software. Note: You will have to make assumptions or create fictitious data for this assignment. Be clear about these assumptions and data for your professor to follow along.

Write a eight to ten (8-10) page paper in which you:

  1. Construct a project charter to revamp the compensation and benefits package.
  2. Design a communication plan for the project.
  3. Define the scope of the project.
  4. Create a work breakdown structure including numbered components. Submit your WBS by creating a table inside your assignment.
  5. Use at least four (4) quality academic (peer-reviewed)resources in this assignment.

Your assignment must:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length.

The specific course learning outcomes associated with this assignment are:

  • Determine the characteristics of a successful project plan.
  • Deconstruct the project planning process and how that affects human resource management.
  • Identify the scope of projects and the structure of the accompanying work.
  • Use technology and information resources to research issues in managing human resource projects.
  • Write clearly and concisely about managing human resource projects using proper writing mechanics.

Week 4 Assignment 1 Submission Click the link above to submit your assignment. Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center. Instructors, training on how to grade is within the Instructor Center. Assi

 

Click the link above to submit your assignment.
        

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.  
Instructors, training on how to grade is within the Instructor Center.

Assignment 1: Computer Architecture
Due Week 4 and worth 110 points

Computer architecture is the combination of software and hardware that is organized in such a fashion as to deliver the machine’s intended performance characteristics. Therefore, it is important for you to understand the basics.

Write a four to five (4-5) page paper in which you:

  1. Describe Von Neumann architecture and explain why it is important.
  2. Explain what a system bus is and why it is needed.
  3. Summarize the use of Boolean operators in computer-based calculations.
  4. Categorize the various types of memory and storage.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Illustrate the use of information and communication technologies to solve problems as an information technology professional.
  • Explain how organizational context is influenced by the development and deployment of information technology systems.
  • Use technology and information resources to research issues in information technology.
  • Write clearly and concisely about introductory information technology topics using proper writing mechanics and technical style conventions.
Click here to view the grading rubric. 

Pre-Sentence Investigation ( PSI)

Part I: This essay is a critical thinking exercise. Do not read into this! Just base your decision(s) on the information that you have. There is no one right or wrong response but you will be graded on your knowledge of correctional treatment, their options, supportive input, and logical reasoning.
Instructions: After reading this scenario, assume you are before Judge Judy. Judge ***** *****kes things brief. So keeping that in mind:
A. Prepare and write a PSI review. What would be the highlights of this scenario that you would tell the judge that would cover the core categories?
B. What information is pertinent that would give a good description of the client that would benefit an appropriate sentencing? Remember to be brief in your comments to the judge, but also relay to her the PSI core categories information.
C. What sentence would you recommend to the judge? If you recommend jail time or probation, list an additional intermediate punishment/sanction appropriate to the offender. Explain your response.
Case Scenario:
1. You are a probation officer assigned to the case of Joe, a 21 year old man convicted of burglary from a business during the nighttime. Joe admitted to and was convicted of breaking into the City Liquors And Smokes and stealing cash from the register, and several cases of beer. Joe was quickly apprehended and during his arrest, police found a switchblade in Joe’s pocket. As a teenager, Joe already had a long history of juvenile offenses. His delinquency included truancy, shoplifting, possession of weapons (knives), and marijuana and alcohol possession and consumption. He frequently got into fights while in high school and he was known as a bully. As a juvenile, Joe spent a total of some 10 days in a juvenile facility. For the most part, when in trouble with the law, Joe received probation that included mandatory drug treatment.
Now an adult, Joe did not stop his criminal behavior. At age 19 he served 30 days in jail for drug possession and shoplifting. His current offense is the burglary and theft.
When you compiled Joe’s PSI, you discovered that Joe grew up in a two-parent household in which there was constant domestic abuse. His parents are now unavailable because his father abandoned the family years ago and his mother is currently undergoing inpatient treatment at a local drug clinic. Joe currently lives with his girlfriend who is 4 months pregnant. Joe has a G.E.D. and minimal employment skills. At the time of his current arrest, Joe was unemployed. The only jobs he had are those of unskilled labor. His work history is scant and often Joe was fired from jobs due to tardiness. Joe reports that he is in good health and there is no reported history of out-patient or in-patient treatment for psychological or emotional disorders. He admits to being a heavy alcohol drinker and occasionally smokes marijuana. After compiling information for the PSI, you believe that Joe has a severe alcohol addiction and limited education/skills to obtain steady employment. You must now make a decision about Joe. What mode of correctional treatment, intermediate sanction, or sentence would you choose and why? Remember to address Judge Judy’s questions as written in the instructions.
Part II: On the following questions, please provide a short response.
2. When ordering probation, the court imposes general conditions to follow. Often, the probationer may also be told to follow specific conditions. What is the difference between general and specific conditions of probation?
3. What is Tourniquet Sentencing?
4. List the major functions of probation. (just list the functions, no need to provide additional details.)

Help with Health Informatics!

CASE SCENARIO – WEEK 1—NuWave Health System –
BACKGROUND
You are a Chief Operating Officer for one of the hospitals for an integrated health system that operates hospitals, clinics, health centers – NuWave Health System. You have been appointed to lead a new working group for the system. The group is tasked with improving the governance and management of health information technology
The NuWave Health System has recently adopted new strategic initiatives around transitioning from the acute “sick care” model of healthcare to one focused on wellness and integrated care delivery in the new “wellness” healthcare model.
New business objectives underway include the addition of a home health capability, better outreach to the community, better integration with the physician community, and new and more intimate relationship with the patient community. As always, several continuing business objectives exist to proved best quality of care at most effective cost.
A recent HIPAA violation resulted in the inadvertent release of information that caused the system a significant penalty and bad publicity in the community. It involved personnel sharing passwords and accessing unauthorized information.
The system has an EHR and automated systems for their ancillary (radiology, laboratory, pharmacy) departments and is underway for updates across the board to meet requirements for Meaningful Use within the hospitals but have different systems in their ambulatory facilities.
The system has standardized automated applications in the business side within revenue cycle, finance, supply chain and communication applications.
THE CHALLENGE
You want to make your best contribution to the working group that currently consists of the CIO, IT department directors, the CFO and nursing representatives. Prior to the first meeting, each member is asked to bring input as to suggestions on topics, initiatives, approaches, etc Based on some preliminary communication and your own experience in operations, you know not all the working group members are technology or information management experts, that the organization has previously treated past information technology projects as strictly “IT projects”

ASSIGNMENT:
-Using the information from your reading, please cover the following points in your preparation for this meeting
-Based on your reading, identify some keys for success, describe and tell why they are important

– In framing your working group’s agenda, what are some of the major areas you will need to address in the coming future meetings
-Imagine an application technology that might be useful in helping achieve their new strategies

ITCO331 – Unit 1 Individual Project

Your first task is to download and install SQL Server 2008, Express Edition. Once that is installed, set up the Northwind database, which will be used throughout the class.

Complete the following tasks:

•.Download and install SQL Server 2008, Express Edition.

                           Refer to Appendix A of the textbook.

•.Open and run the attached script to create the Northwind database.

                           To download the script, click here.

•.Create the following tables in the Northwind database:

 

•.

•. 

•.Alter the Employee table to establish a foreign key between Employees and Departments.

                           Employees.DepartmentID references Departments.DepartmentID

•.Alter the Territories table to establish a foreign key between Territories and Regions.

                           Territories.RegionID references Regions.RegionID

•.Update the data in the Employees table so that employees with the following managers are listed as working in the following departments:

•.ReportsTo

•.Department

•.Andrew Fuller

•.Sales

•.Steven Buchanan

•.Marketing

•.All Others

•.CEO

 

Submit the SQL, DDL, and DML scripts needed to complete tasks 2–8 and a database diagram of the final database.

Network Adminstration – ITNA359 DB2

The Discussion Board (DB) is part of the core of online learning. Classroom discussion in an online environment requires the active participation of students and the instructor to create robust interaction and dialogue. Every student is expected to create an original response to the open-ended DB question as well as engage in dialogue by responding to posts created by others throughout the week. At the end of each unit, DB participation will be assessed based on both level of engagement and the quality of the contribution to the discussion.

At a minimum, each student will be expected to post an original and thoughtful response to the DB question and contribute to the weekly dialogue by responding to at least two other posts from students. The first contribution must be posted before midnight (Central Time) on Wednesday of each week. Two additional responses are required after Wednesday of each week. Students are highly encouraged to engage on the Discussion Board early and often, as that is the primary way the university tracks class attendance and participation.

The purpose of the Discussion Board is to allow students to learn through sharing ideas and experiences as they relate to course content and the DB question. Because it is not possible to engage in two-way dialogue after a conversation has ended, no posts to the DB will be accepted after the end of each unit.

How does network address translation (NAT) handle IPv4 addressing issues and network security? Discuss 3 types of NAT devices that can be implemented for a network.

Discussion Board Assignment Guidelines

   Research network address translation (NAT), and answer the following questions:

                           How has NAT handled IPv4 addressing issues and network security?

                           What are 3 types of NAT devices that can be implemented for a network?

   Post a new topic to the Discussion Board that contains your answers to the 2 questions above.

   Respond to 2 other students’ posts on the Discussion Board, and critique their answers.

   Use APA references and citations to support your assertions.

                           Do not include a table of contents or abstract.

Your submitted assignment (60 points) should include the following:

   40 Points: Your Discussion Board topic containing your responses to the 2 questions in the assignment guidelines

 

20 Points: Responses to 2 other students’ Discussion Board posts

Complete the matrix to determine requirements for the policy

Complete the matrix to determine requirements for the policy. Review page 28, table 4.2 to understand how to complete a matrix. Complete the matrix on page 27, table 4.1 based on the scenario below. Fill in the type of threat/vulnerability and your recommendation to correct the threat/vulnerability. Scenario In the organization, there is an insider threat. The employee who is the threat has been discussing a perceived vulnerability in the system. Many of the employees believe this vulnerability in the system and are attempting to create a patch. The insider threat employee has created malware in the system separate from the alleged vulnerability. While the technical team is searching for a vulnerability, the malware is traveling through the system disrupting all network traffic. What is the issue? Identify the threats and vulnerabilities in the matrix for this scenario. Also, identify the resolutions and solutions. Separate the issues from the solutions in a table with two columns and submit to your assignment folder. The issues are provided in Table 1. You will create resolutions/solutions for the threat or vulnerability below.

 

Physical

Cyber

Human/Social

Enabling Infrastructure

Attributes

Hardware (data storage, input/output, clients, servers), network and communications, locality

Software, data, information, knowledge

Staff, command, management, policies, procedures, training, authentication

Ship, building, power, water, air, environment

Singularity

       

Uniqueness

       

Centrality

       

Homogeneity

       

Separability

       

Logic/ implementation errors; fallibility

       

Design sensitivity/ fragility/limits/ finiteness

       

Unrecoverability

       

Behavioral sensitivity, fragility

       

Malevolence

       

Rigidity

       

Malleability

       

Gullibility/ deceivability/naiveté

       

Complacency

       

Corruptibility/ controllability

       

Accessible/ detectable/ identifiable/ transparent/ interceptable

       

Hard to manage or control

       

Self-unawareness and unpredictability

       

Predictability

       

 

 

 

 

 

 

 

 

Deliverable 6 – Successful Change Management

 

Competency

Examine leadership’s role in executing successful change.

Instructions

Delta Pacific Case Study

As the change leader for Delta Pacific Company (DPC), you know certain elements need to be in place by leadership for a change to be successful. DPC wants to change the culture from the more traditional manufacturing environment to one of a contemporary consulting environment. Now it’s time for you to help the leaders execute a successful change:

  • Determine how leadership impacts the organizational culture during this change
  • Examine elements that are critical to making this change sustainable
  • Assess the top mistakes leaders make and determine the best way to avoid those mistakes

As the change leader, it is your responsibility to help ensure a successful change in the shift of DPC’s organizational culture. Part of this includes alerting leadership to how their own behavior impacts change and how change can be sustainable.

Conduct academic research and create a plan to present to the CEO and board in which you complete the following successful change management plan:

  • Explanation of leadership behaviors that impact organizational change.
  • Description of critical factors that ensures this cultural shift will be sustainable.
  • Examination of the top mistakes leaders make during a change.
  • Explanation of your recommendations as to the best ways the leaders can avoid making those mistakes.
  • Remember that this is a proposal. Make sure to format your paper properly for your proposal. A proposal is a persuasive document, so make sure to use proper language and tone. Remember, you are the change leader, and you are writing to the CEO. So use a tone in your proposal that is specific to your audience (the CEO).

Include your APA-formatted reference page with at least two credible sources.

A note about credible sources: Credible sources are reliable, accurate, and trustworthy. These sources are written by authors respected in their fields of study. You want to identify sources where the author of the article is listed if they’ve referenced other information. The sources should be cited so that you can check for the accuracy of and support what they have written.

Please help with my homework and please no plagiarism, I appreciate it.