Categories
Business

This project does not need a cover page.

Please read the uploaded instructions. I have also added the first part of the project so you can see that. Please also read the feedback from that as well. This project does not need a cover page. The first paper was about the expansion into China please continue with that.

Categories
Other

This assignment involves the three common incident response scenarios.

The Incident Response Life Cycle begins with Preparation and moves to the process of Detection & Analysis and Containment Eradication & Recovery. It concludes with Post-Incident Activity.
This assignment involves the three common incident response scenarios. For the threat featured in each scenario, outline three ways that you would protect against the threat, three ways that you would use to detect the threat, and three ways for responding to the threat.
Instructions
Scenario 1: Insider Threat
One of the hardest attacks to mitigate is the attack executed by an insider who has the authorization to take advantage of the rights and privileges bestowed upon the user within the organization. These attacks of opportunity can cause serious damage. One employee that is intent on harming the organization or commits an act of carelessness can leave an organization defenseless.
Please write a paragraph on each of the following (for a total of three paragraphs):
Protect: Three ways to protect your organization from an insider threat.
Detect: Three ways to detect the threat within your organization such as IoCs.
Respond: Three ways to respond to the threat based on the Incident Response Life Cycles.
Scenario 2: Security Gaps
Motivated offenders use a myriad of tools, tactics, and techniques to target organizations through numerous vectors. An environment that does not routinely validate its security posture, policies, and procedures can allow the attackers unauthorized entry into your network. All it takes is one asset within your organization that has been overlooked and it can create a conduit into your network that can cause data compromise.
Please write a paragraph on each of the following (for a total of three paragraphs):
Protect: Three ways to protect your organization from the threat of malware.
Detect: Three ways to detect the threat.
Respond: Three ways to respond to the threat based on the Incident Response Life Cycle.
Scenario 3: DDoS
Distributed denial of service (DDoS) attacks are still one of the major concerns within an organization as they can be leveraged to cause a diversion while data exfiltration takes place in another part of your network. The attacks are designed to overwhelm system resources while not allowing legitimate traffic within the network. These attacks can change their signatures and can be executed within varying levels of sophistication and hence the reason for the concern.
Please write a paragraph on each of the following (for a total of three paragraphs):
Protect: Three ways to protect your organization from the threat.
Detect: Three ways to detect the threat within your organization such as IoCs.
Respond: Three ways to respond to the threat based on the Incident Response Life Cycle.

Categories
Philosophy

First write down what it means then respond and write if you agree or not briefly and in simple language

Choose three passages from the chapter attached and respond to it. First write down what it means then respond and write if you agree or not briefly and in simple language

Categories
Music

– choose one musical example from the lecture.

Your answers will be specific to each week’s lecture material, using the following general topics:
– Discuss, briefly, how the material in the lecture contributes to (1) Toronto and (2) the theme of the unit: for example, place, cultural identity, social relationships, venue.
– What did you find surprising, interesting, or not interesting, difficult, etc.? Why?
– Choose one musical example from the lecture. Why did you choose this example? Describe it, using ideas from the lecture and also from your own background and perspective. What is your own usual approach to listening to music, and how might you try different approaches? For example, if you tend to focus on lyrics, how would focusing on the beat of the music affect what and how you hear it? If you’re used to focusing on particular instruments, how might visualizing colour or texture or images affect what and how you hear?
Resourse:



/1- uses university standard English grammar, spelling and punctuation
/1- properly cites sources (please refer to the instructions about citing sources)
You are expected to use university standard English grammar, spelling and punctuation for assignments.

Categories
Social Work

The clinical director has encouraged you to develop a weekly, strength-based group for teens.

Week 6 Assignment: Strength-Based Group Work Homework Assignment
A framework for strength-based group work practice with children and adolescents was introduced in Chapter 15 (Garvin, Gutierrez and Galinsky, 2017). Your setting is a school-based mental health/day treatment facility. The Clinical Director has encouraged you to develop a weekly, Strength-Based Group for teens. Seven principles were described and illustrated to serve as a foundation to inform group practice. As a clinical social worker, briefly discuss each principle and illustrate its practical application for Derek.
This chapter mentioned above introduces a framework for Strengths based group work practice with children and adolescents. At the heart of the presentation are the 7 practice principles that are described and illustrated:
1.Form groups based on members’ felt needs and wants, not diagnoses.
2.Structure groups to welcome the whole person, not just the trouble parts.
3.Integrate verbal and non-verbal activities.
4.Decentralize authority and turn control over to group members.
5.Develop alliances with relevant other people in group members’ lives.
6.Maintain a dual focus on Individual change and social reform.
7.Understand and respect group development as a key to promoting change.
CASE EXAMPLE:
Derek, 17-year-old male
The client recognized that his main reason for seeking treatment is that his anxiety was “really affecting” him. At times, he felt like his mind turned into “mashed potatoes,” even with basic information that he already knew. He reported sweating, feeling dizzy and losing thoughts or train of thought. He believes he has had anxiety throughout his life, but never gave it much thought until now. He recently became more aware of this, noting that talking on the phone or times when he is put on the spot tends to be the worse. He mentioned that he has functioned in school and sport settings and found ways to deal with his anxiety. He also believed that speaking in front of his peers seems to evoke many discomforts. When asked about previous coping mechanisms, he noted that not looking at the person or group “eye to eye” or focusing on speaking at a level toward people he recognizes is helpful.
SOCIAL HISTORY: In terms of hobbies or interests, the client reported that he enjoys spending time outside. He and his girlfriend enjoy jogging, concerts and writing music.
In terms of his relationships with others, the client reported that he has dated his current girlfriend for about 2 years. In regards to friendships, he reports that he does not have many friends, though he and his girlfriend have a group of people that they spend time with playing cards or having sports or holiday parties. He discussed that he is not much of a “talker,” though he enjoys the parties because he gets to organize an event “so it flows well.” He said that his girlfriend is the “more social one” and participates in various activities with friends. He noted that trust, mutual interest in recreational activities, and good communication are present.
In terms of personal strengths, he is a better listener than a talker. Furthermore, he states that his bedroom may not appear organized to the outsider, though he does take pride in keeping his personal property cleaned and well maintained. In regards to areas that he wants to improve upon, his anxiety is the primary issue. He wants to work on his “people skills,” in terms of speaking and being comfortable engaging others in conversations.
CULTURE: The client stated that he was raised within the Catholic faith system, though participation in such activities tapered off after his parents’ divorce last year. He noted that church made him nervous, even passing out one time. He added that he was unsure why this happened. In terms of cultural influence, his mother was of eastern European descent and his father was of Hispanic descent, both having a strict Catholic upbringing. However, religion or spiritual activities are not an important part of his life currently.
FAMILY HISTORY: The client reported that his relationship with his parents as “really good.” He denied any regular or significant arguments, stating that they probably argue far less than the average family.
He was raised on the outskirts of Chicago for his first 15 years, moving around the Illinois area until relocating to Indiana after his parents divorced. He was raised by his parents; primarily by his mother. He is the youngest of three boys. He noted that this was rough for a few years, though he reestablished a healthier relationship with his father and brothers.
When asked about his current relationship with his father, he believed they were both good, noting that they visit and talk on the phone regularly. In regards to relationships with his siblings, he notes “typical” difficulties with them with occasional disagreements. However, he stated that they both live out of state and all maintain regular contact through email.
SUBSTANCE ISSUES: The client stated that he and his girlfriend drink about six alcoholic drinks a couple times a week. They enjoy a range of alcoholic beverages but prefer only to drink at home unless it would be a party. He noted experimenting with several illegal drugs, though he has not used any legal or illegal drugs since he was 15.

Categories
Human Resource Management

No names please or use a pseudonym.

You have been tasked by the CEO of an organization to research an issue complete with recommendations on how to implement and manage the change process. The deliverables are provided below:
1. Write a 1750-2100-word report in which you design an innovative model for implementing an imposed change in an organization that will likely be opposed by a majority of the staff
2. Required elements:
Give a brief background of the organization. No names please or use a pseudonym. Give an overview of the issue.
Identify the steps of the change process the organization would experience. Design an implementation plan/intervention, including steps to manage the implementation efforts and create buy-in from resistant staff.
Develop an ongoing evaluation plan that measures the effectiveness of the implementation efforts.
Identify strategies for assessing the success or failure of your plan.
Be sure to make implications for future change efforts.
References: Use a minimum of 2-3 current scholarly references as part of your paper, properly cited and referenced in APA format.
3. Other guidelines for the paper:
All references must be dated within the last five years.
As a general rule, do not use wikipedia.com, answers.com, infoplease.com or similar websites for references in graduate-level research.
Limit quotations to no more than two (brief).
Must be submitted electronically in Word format.

Categories
Public Administration

Another for the president of the united states, and a third for a citizen action group that is, if nothing else, pragmatic–it suggests a solution.

Some time ago a significant movement of people and jobs bagan to take place. The general pattern of the move was characterized as being from the Snowbelt states to the Sunbelt states. To many, the possible continuation of this movement into the early twenty-first century is a serious problem.
Develop three well-articulated problem statements:
one for a Snowbelt city mayor,
another for the president of the United States,
and a third for a citizen action group that is, if nothing else, pragmatic–it suggests a solution.
Using chapter 4 book – Basic Methods of Policy Analysis and Planning by Patton|Sawick|Clark

Categories
Criminal Law

Finally, examine the different management issues and their anticipated impact on security operations and, based on your understanding of the ratings and any other independent research you have completed this week, discuss the possible reasons for the responses and what you might do as a security operative to address the first six (6) issues.

The Week 2 readings and assignments introduce students to the study of “risk management” and the application of its principles in designing a cost-effective security program. Students will discuss the process used by security professionals to identify and assess potential events organizations face that may render their assets vulnerable for harm or loss. Students will also begin identifying specific threats to assets and the management challenges confronting security directors.
Finally, students will have an opportunity to consider the critical competencies required of a security director in today’s security environment to assess risk and design and implement a cost- effective security program.
The Forum this week specifically addresses the ASIS International 2003 “General Risk Assessment Guideline” and its seven (7) Practice Advisories in an exercise designed to enhance student skills in assessing risk in a “real world” security setting. Students will be required demonstrate their skill in utilizing these guidelines in the final project for this course.
Students will also reflect upon– and discuss the possible reasons for corporate security director responses to a survey conducted by Securitas Security Services USA, Inc. regarding the most critical threats and security manager challenges their particular organizations are facing at the present time.
EXERCISE #1 – RISK MANAGEMENT PRINCIPLES AND PRACTICES
The ASIS “General Security Risk Assessment Guideline” is a 2003 ASIS International publication and a key resource for security operatives responsible of examining, evaluating, and managing risk to organizational assets and planning security operations.
After thoroughly reading and studying the publication’s contents, particularly the seven (7) Recommended Practice Advisories and the corresponding commentaries, explain why a corporate security officials must understand the various risk management principles and be able to apply those principles when assessing the vulnerability of an organization’s assets. Incorporate into your response the significance of determining not just the various crime-related AND non-criminal threats to assets, but also the impact or “criticality” (losses, harm, and costs) of those threat or “risk” events AND the probability or likelihood of those events occurring. Use examples to demonstrate the points you make in your response.
Finally, identify the various information sources available to corporate security officials to determine the probability of the various threats that may be directed at the organization. Again use examples of sources used by a real-world company (Exxon, Walmart, Apple, Proctor and Gamble, Amazon, Kroger, etc.) to demonstrate the points you make in your response.
NOTE: Students will be required to employ these strategies in their final project.
EXERCISE #2 – SECURITY THREATS AND MANAGEMENT CHALLENGES
“Top Security Threats and Management Issues Facing Corporate America” is a periodic Securitas Security Services USA, Inc., publication that assists security directors in completing their security planning.
After reading the results of the their most recent Survey of Fortune 1000 Companies and the “Emerging Trends” section of the publication, discuss possible reasons for corporate security director responses to the first five (5) security threats.
Also explain why security operatives in different industries place different emphasis on certain threats and provide specific examples. Finally, examine the different management issues and their anticipated impact on security operations and, based on your understanding of the ratings and any other independent research you have completed this week, discuss the possible reasons for the responses and what you might do as a security operative to address the first six (6) issues.
Risk Analysis & The Security Survey

Categories
Other

Whatever your see the my results it does not matter which one you choose

attached is the self-assessment I took, I’m asked to do four of the following; race, religion, gender, age, sexuality & disability

whatever your see the my results it does not matter which one you choose

Categories
Health Care

You have the ear of the hospital’s chief financial officer (cfo) and will work closely with the director of facilities.

Your team has been assigned to expedite the design of a bariatric facility adjacent to the hospital campus. You have the ear of the hospital’s chief financial officer (CFO) and will work closely with the director of facilities. Your team will be presenting to a cross-functional group of investors: hospital stakeholders and members of the community. As you and your team start to work, you find that the standards for developing a bariatric unit are not as well-defined as other units. Your team has several opinions for what this unit may look like but work together to create a presentation that will satisfy the investor’s needs.

Create 3 powerpoint slides regarding the below.
Slide 3-5 Analyze essential environmental elements in bariatric facility design that would be important to the facility stakeholders.
All slides: Include a selection of images of ideal bariatric facility components in the presentation. These may be integrated into slides throughout the presentation or presented together, or both. Use them to drive your points home. Note: Image credit is required for images copied from the internet.
Properly use and cite the Hayward (2016) textbook and at least 4 other peer-reviewed, scholarly, or similar references.

Format your citations according to APA guidelines. Include a title page, detailed speaker notes, and a references page.