Security Plan Security Strategy Recommendations Build DMZ

Security Plan Security Strategy Recommendations Build DMZ

This is a paper that is focusing on the development of a plan for security posture at Sifers-Grayson. The paper also provides additional information to use in the writing of the assignment paper. Below is the assessment description to follow:

Development of a plan for security posture at Sifers-Grayson

Overview:

Now that the After Action Reports have been analyzed, the consultants must develop a plan for improving the security posture at Sifers-Grayson. This will be in a Security Strategy Recommendations document. The security strategy will be based upon multiple layers of policies, processes, and technologies that, when implemented, will be used to defend the Information Technology enterprise from both internal and external threats and attacks.

Note: see https://www.techrepublic.com/blog/it-security/understanding-layered-security-and-defense-in-depth/ for a discussion of the differences between these two security strategies: layered security and defense-in-depth. You will need this information for the Security Strategies section of your paper.

Two defensive security strategies have been chosen by the senior members of the team.

1. Defense Strategy #1: Build a DMZ for the R&D Center. The DMZ will host servers accessed by the engineers while teleworking and while reaching back to the R&D center from the test range. The DMZ will require the following: (a) business class routers, (b) business class firewalls, and (c) intrusion detection and prevention system.

Demilitarized Zone (DMZ). For definitions and diagrams see https://www.us-cert.gov/ics/Control_System_Security_DMZ-Definition.html and https://fedvte.usalearning.gov/courses/Security+_v401/course/videos/pdf/Security+_v401_D02_S04_T04_STEP.pdf

2. Defense Strategy #2: Implement Enterprise-wide Protective and Detective Measures to defend against both internal and external attackers. These measures will include (a) controlling access to software documentation and source code, (b) implementing enterprise-wide identity management, and (c) implementing either a Security Information and Event Management (SIEM) tool or a Unified Threat Management (UTM) tool.

Remember, ensure that the pages are exclusive of the cover and the reference pages. Also, ensure that you include all the references you use in finding research for this assignment paper. References should be at least three for the paper. All references, citation, and writing should follow the APA formatting and styling guidelines. Finally, ensure you focus on the assignment topic in detail.

Edna or Lily protagonist’s perception versus the way she sees herself

Edna or Lily protagonist’s perception versus the way she sees herself

This is a paper that is focusing on the Edna or Lily protagonist’s perception versus the way she sees herself. The paper also provides additional information to use in the writing of the assignment paper. Below is the assessment description to follow:

Edna or Lily protagonist’s perception versus the way she sees herself

Based on your close reading of either Kate Chopin’s The Awakening or Edith Wharton’s The House of Mirth

Develop an argument that analyses a particular aspect of either of these novels.

Choose one of the following questions to guide your essay:
What does the novel say about the way others see the protagonist (Edna or Lily) versus the way she sees herself? What is the significance of this perceived split between the outer self and the inner self?

How does the novel comment on gender relations in the United States during the nineteenth century?

How does the novel grapple with (pick one) social class/wealth/marriage/appearances/respect and reputation/morality?
Examine your chosen theme as it is conveyed by the plot, the characters’ actions and words, setting, and symbolism. Find a number of key quotations that deal with the theme (for example, gender relations). Analyze their language and then proceed to your thesis and composition of the essay.

The task in this paper is to show how the language used in the novel reveals something important about your chosen theme. Remember that unlike most argumentative or informative texts, such as newspaper articles, literary texts often rely on their composition. Also, use of language to create and communicate meaning as well as create impressions (both sensual and intellectual) for their respective audiences.

Please choose one of the questions listed above to construct an effective thesis. Remember your thesis should make an argument about your chosen topic. For example, it’s not enough to give examples of morality in the novel. You have to argue that the novel suggests something specific about this theme and support your argument with specific textual evidence.

Stressor or problem from a scenario discussion

Stressor or problem from a scenario discussion

This is a paper that is focusing on the student to document a stressor or problem from a scenario discussion. The paper also provides additional information to use in the writing of the assignment paper. Below is the assessment description to follow:

Document a stressor or problem from a scenario discussion

Instructions

Review the fictitious case study below. Based on this scenario, complete the following:

Document a stressor or problem the client discussed in the scenario.
Using CBT as your evidence-based practice model, plan one intervention that could help your client with her stressor.
Clearly articulate why you chose this particular intervention and the CBT concept(s) that support your choice.

Document a stressor or problem from a scenario discussion

Case Study:

Hannah Johnson is a 24-year-old Caucasian female who was referral to you for outpatient therapy by her primary care physician. Hannah sought treatment from her physician for symptoms of depression and anxiety following an intense argument with her boyfriend of 6 months, which caused him to break-up with her. She informed her physician that she has been having panic attacks daily for the last five days since the break-up. She also stated that she had called into work “sick” each day because she had no motivation, felt “hopeless,” had insomnia nightly, and could not stop crying. Hannah denied feeling suicidal.

Hannah asked her physician for medication to “make the pain go away.” Her physician prescribed her seven pills of .5mg Xanax to take at night, as needed, with no refills. She was told by her physician that what she really needed was therapy to help her address her depression and anxiety and that a quick fix from a medication would not be a long-term solution.

Her physician had seen her request medication numerous times “to make the pain go away” when she was facing the ending of a relationship. At her intake session with you, Hannah disclosed that she had a history of failed romantic relationships and “hated” being single. She described herself as “a romantic” and “fell in love easily,” but her relationships never lasted more than six months. She described her past relationships as “exciting and intense at first” but full of drama as the excitement wore off. Also, she also stated she felt extremely anxious, abandoned, and depressed when her relationships ended.

Support your assignment with at least three scholarly resources. In addition to these specified resources, other appropriate scholarly resources, including seminal articles, may be included.

Length: 3-5 pages, not including title and reference pages

Risk of Nuclear Power Plant – Fukushima Daiichi plant Chernobyl Nuclear Disaster

Risk of Nuclear Power Plant – Fukushima Daiichi plant Chernobyl Nuclear Disaster

This is an essay paper focusing on the risks of a Nuclear Power Plant Facility comparing to the Fukushima Daiichi plant incident that happened some years ago in Japan.

The Risks of a Nuclear Power Plant Facility – Fukushima Daiichi plant

Firstly, you are  going to identify some of the risks of a Nuclear Power Plant Facility. Then, you are to research on the nuclear disaster that occurred at the Fukushima Daiichi plant in Japan on March 11, 2011. All nations that depend on nuclear power have been forced to reevaluate the potential risks they face from continued use of nuclear power.

Secondly, this Case Assignment considers how risks are defined, assessed and managed in light of the Fukushima Daiichi Nuclear Power Plant disaster. Before you begin to answer the questions stated below please review the following sites to become familiar with the issues regarding radiation and the use of nuclear power. Knowledge @ Wharton (2011, March 30). U.S. Energy Policy after Japan: If Not Nuclear, Then What? Retrieved on August 29, 2016 at https://knowledge.wharton.upenn.edu/article.cfm?articleid=2743 IAEA International Atomic Energy Agency (2016).

Topics in Focus. Retrieved on August 29, 2016 from https://www.iaea.org/newscenter/focus/. After reading the information from these sites you must review the required reading for this module before responding to the Case Assignment.
Upon reading the above information, answer the following questions:

  • Explain the concept of “risk” for the layperson. (Consider what “risk” means in general terms.)
  • Define and explain risk management. Is risk management in the context of a nuclear power facility still relevant after a disaster has occurred?
  • Describe the most important policy issues concerning the use of nuclear power that have emerged from the Fukushima Daiichi disaster. Discuss how these policy issues are related to risk assessment and our ability to more effectively define risks. (This is a key question for this assignment.)
  • Explain the differences between risk assessment and risk management. You should approach this assignment from a very practical and logical perspective

Editorial paper article analysis Critical thinking and ethical implications

Editorial paper article analysis Critical thinking and ethical implications

This is a paper discussing an Editorial paper article analysis focusing on the critical thinking and ethical implications on the chosen article.

Editorial paper article analysis – Critical thinking and ethical implications

Firstly. examine the process involved with problem formulation. Then, apply critical thinking to problem identification. Also, evaluate ethical implications of a decision. Prompt: Choose an editorial article (An editorial is an article that presents the writer’s opinion on an issue supported with facts) from the New York Times or the Wall Street Journal.

Secondly, browse the library and choose an editorial that addresses a business issue that interests you.

Thirdly, write an essay describing the following: What are the premise(s) in the article? Also, what evidence is presented? Is it credible? Can you independently verify the evidence presented? Address the counterargument in the article? Does the writer represent a p‌‌‍‌‌‍‍‍‌‍‍‌‍‍‍‌‌‌‍articular interest? How is language used to develop the argument? Do you detect any errors in knowledge, evidence, or thinking? Does the writer use any types of appeals or commit any fallacies? Overall, how compelling is this article?

Lastly, be certain to carefully research your analysis using at least 3 credible sources with proper APA citations. Your submission should be 4-6 pages in length minimum and should be a thorough representation of your ability to critically think through the steps above. The paper should be in APA format style. Citation of the article and a brief summary of its contents

Unmanned Aerial Vehicles (UAVs) into civil airspace

Unmanned Aerial Vehicles (UAVs) into civil airspace

This is an assignment that is focusing on the Integration of Unmanned Aerial Vehicles (UAVs)safely into civil space. The assignment provides a discussion like what are the types these air crafts.

Integration of Unmanned Aerial Vehicles (UAVs) into civil air-space ( Class: A; B)

T‌‌‍‌‌‍‍‍‌‍‍‌‍‍‍‌‌‌‍o define existing safety standards, operational deficiencies and required improvements within the scope of safe unmanned aircraft operations in civil space Defined Objectives

Firstly, review types of unmanned aircraft. What are the purpose of unmanned Aerial Vehicles? How do these vehicles work compared to the others available? Complete the analysis of present requirements and provisions ( ICAO and EASA, UK CAA) applicable to the unmanned aircraft systems. Then, Review safety systems applicable to the aircraft enabling to avoid collisions (partially data has been collected) 4. Review systems, which are potentially suitable for unmanned aerial vehicles Collect data for the same 5. Review opinion of industry professionals by performing open safety survey.

Secondly, review standard operating procedures applied by air traffic controllers and operators.(Research is completed based on independent interviews of air traffic controllers and operators, requires analysis and supporting presentation)

Thirdly, def‌‌‍‌‌‍‍‍‌‍‍‌‍‍‍‌‌‌‍ine existing hazards and risks of UAVs in civil airspace. Also, what are the effects of these risks in the civil air space? (partially data has been collected in the form of surveys and interviews, requires analysis and supporting presentation).

Lastly, review existing risk mitigation techniques. Collection of data to be on surveys and interviews. It requires analysis and supporting presentation

Conclude safety findings and provide effective recommendations ( PENDING) NOTE 1: You are welcome to adjust the Thesis objectives as long as we meet the research aim. NOTE 2: My College ( UK, Cranfield University) has strict regulations on the referencing and formatting rules ( 30% of the grade) ‌‌‍‌‌‍‍‍‌‍‍‌‍‍‍‌‌‌‍.

The assignment to follow the provided writing guidelines.

Homeland security and defence enterprise from the basic equation of risk

Homeland security and defence enterprise from the basic equation of risk

This is an assignment that discusses the Homeland security and defence enterprise from the basic equation of risk. Also, the assignment talks about the benefits that surround the enterprise.

Homeland security and defence enterprise from the basic equation of risk

Essay 1:

Firstly, the basic equation for risk is defined as R = ƒ(C*V*T) where R is the level of risk. C is the consequences (public health, our economy, government action, public confidence in our institutions) of an attack. V is an assessment of the vulnerability of a potential target (how hard or easy it would be for it to be hit by terrorists). T is the threat or the likelihood that a specific target will suffer an attack or disaster from a specific weapon. The Department of Homeland Security has stated that it will apply risk management principles to homeland security operations. Also, it has stated that “Ultimately, homeland security is about effectively managing risks to the Nation’s security” (DHS, 2010, p. 2).

Drawing upon your class readings and additional research:

Examine how usage of risk management is by the homeland security enterprise. Additionally, how that use benefits such aspects as resource allocation, strategic planning, or any of the multitudes of other homeland security issues.

Essay 2:

Secondly, in your readings, you have been provided a variety of definitions for the term homeland security. Additionally, the national strategies and readings have talked to the difference between homeland security and homeland defense. Drawing upon your readings and other class materials, craft two columns; one labeled Homeland Security and the other Homeland Defense.

Essay 3:

Thirdly, critical infrastructure definition in the National Infrastructure Protection Plan as “Systems and assets, whether physical or virtual. So, it is vital that the incapacity or destruction of such may have a debilitating impact on the security, economy, public health or safety, environment, or any combination of these matters, across any Federal, State, regional, territorial, or local jurisdiction” (DHS, 2009, p. 109). One can reasonably presume that protection of these assets is vital to the well-being of the United States and as such, is an essential element of homeland security. Drawing upon the readings provides your assessment of the capability of the nation’s infrastructure protection program to ensure the survivability of its critical infrastructure.

Essay 4:

Lastly, provide an examination of the various elements that comprise the intelligence community from local law enforcement to national agencies and how each of those entities contributes to the development of homeland security intelligence.  Lastly, your examination of the question should include the issue of domestic versus foreign intelligence.

Research article review and analysis of a recent article

Research article review and analysis of a recent article

This is a paper that focuses on an research article review analysis of one done recently. The paper should not be more than three years old.

Research article review and analysis of a recent article

Review a recent, refereed journal article that is research based and critique it. Below are instructions on how to complete the assignment.

1. Locate and read a recent (no more than 3 years old) refereed journal article relating to an instructional strategy or innovation of interest to you.

2. The article needs to be a research article (with either quantitative or qualitative data, or both kinds of data) about an instructional strategy or innovation in education or training where researchers collected data, analyzed it, and present it to the reader.

3. Once you have located your article, read and write a critique using Microsoft Word and the latest APA style. The length of your article review must be at least 4 full double-spaced pages (not including the title page and references section) but should not exceed 5 pages. Include at least one other ref‌‌‍‌‌‍‍‍‌‍‍‌‍‍‍‌‌‌‍erence.

Within your review, include the following elements and headings: 1. A title page 2. A summary of the main issues presented in the article 3. A discussion of issues in the article that you found intriguing, thought were worthwhile, or in some way stimulated your thinking 4. A short discussion (in a paragraph) of how the information presented in the article impacts the strategy/innovation within your setting (teaching, work/job, degree program). 5. Agreement/Disagreement: Discuss whether or not the authors’ findings make sense and whether you agree with them. Not only give us your opinion but provide a rationale based on what you have read by now. 6. Include at least one other article, book, etc., to support your view(s). 7. References: Conclude the review with the citation of the article you reviewed and all other citations you include in APA style‌‌‍‌‌‍‍‍‌‍‍‌‍‍‍‌‌‌‍.

Scientific Working Groups SWGs

Scientific Working Groups SWGs

Do you feel that Scientific Working Groups (SWGs) were of any real value?

Do you feel that Scientific Working Groups (SWGs) were of any real value? 

Scientific Working Group
Research the concept of Scientific Working Groups. Do you feel that Scientific Working Groups (SWGs) were of any real value?  These SWGs have now been replaced with the Organization for Scientific Area Committees (OSAC) groups at NIST and the AAFS Standards Boards (ASBs) at the American Academy of Forensic Sciences.  Are these groups any different?  Explain your point of view, i.e., explain your reasoning.

Since the early 1990s, American and International forensic science laboratories and practitioners have collaborated in Scientific Working Groups (SWGs) to improve discipline practices and build consensus standards. In 2014, the SWGs are being reorganized under the NIST Organization for Scientific Area Committees (OSAC) (organization chart).

As of January 2012, active SWGs included the following

Firstly, FISWG – Facial Identification Scientific Working Group (FISWG)

Secondly, SWGANTH – Forensic Anthropology (SWGANTH)

Thirdly, SWGCBRN – Chemical, Biological, Radiological and Nuclear

Fourthly, SWGDAM – DNA Analysis (SWGDAM)

Fifthly, SWGDE – Digital Evidence (SWGDE )

Sixth, SWGDMI – Medicolegal Death Investigation (SWGDMI )

Further, SWGDOC – Questioned Documents (SWGDOC )

Additionally, SWGDOG – Dogs and Orthogonal Detection (SWGDOG )

Furthermore, SWGDRUG – Analysis of Seized Drugs (SWGDRUG)

Besides, SWGDVI – Disaster Victim Identification (SWGDVI)

In addition to that, SWGFAST – Latent Fingerprints (SWGFAST)

SWGFEX – Fire and Explosives Scenes (SWGFEX)

SWGGEO – Geological Materials (SWGGEO)

SWGGSR – Gunshot Residue (SWGGSR)

SWGGUN – Firearms and Toolmarks (SWGGUN)

SWGIBRA – Illicit Business Records

SWGIT – Imaging Technologies (SWGIT)

SWGMAT – Materials Analysis (SWGMAT)

SWGSTAIN – Bloodstain Pattern Analysis (SWGSTAIN)

Lastly, SWGTOX – Toxicology (SWGTOX)

Finally, SWGTREAD – Footwear and Tire tracks (SWGTREAD)

In conclusion, SWGWILD – Wildlife Forensics (SWGWILD)

Each SWG includes scientists working within the focus field. Although a couple the above-listed SWGs have only American members, most also have international members. Federal, state or local government forensic laboratory scientists are the most common SWG members, but many SWGs also include other experts such as private laboratory scientists, academia, independent consultants, attorneys and judges.

Most SWGs have public websites with discipline-specific resources including approved and draft for comment standards, best practices guidelines and related documents.

 

Analysis of The Pillowman – play reviews or literary criticism

Analysis of The Pillowman – play reviews or literary criticism

Write a well-researched and well documented literary analysis of The Pillowman. This paper uses play reviews or literary criticism to support.

Analysis of The Pillowman-play reviews or literary criticism

Write a well-researched and well documented literary analysis of The Pillowman.

You will use your own logic and analysis to focus on one or more areas of your choosing, and you will use secondary sources like play reviews or literary criticism to support.

The Pillowman by Martin McDonagh is a play about Katurian. It is a fiction writer who lives and works in a police state. As his stories are similar to several murders, the police interrogates him. In 2004, McDonagh received an Olivier Award in the Best New Play category, a New York Drama Critics’ Award for Best New Foreign Play, as well as two Tony Awards. It premiered in 2003 at the Cottesloe Theatre in London. The Pillowman falls into the sub-genre of black comedy.

In the first act,  Ariel and Tupolski interrogates Katurian. Initially, Katurian thinks they’re investigating him because of suspicions that he’s using his fiction to spread political messages speaking out against the totalitarian dictatorship. Ariel leaves the room, and Katurian hears screaming from the other side of the wall. When Ariel returns, hand covered in blood, Ariel says that Michal has confessed to murdering three children—with Katurian. He denies it. Reminding his interrogators that while his stories are gruesome, it’s his job as a storyteller to tell a story; this is not indicative of his being a murderer—even though the details of two of the murders match two of his stories, “The Little Apple Men” and “The Tale of the Town on the River.”

Katurian used to write happy stories. But after he heard someone being tortured at night, his stories took a disturbing turn. He receives a message that for the last seven years, he’s been subjected to his brother’s torture to force him to become a better writer.