Archive for May 19th, 2020

Student Debt

I choose Student Debt because I felt it would be the easiest topic for me. The professor asked that we spoke about something specific in student debt. If you feel like choosing another topic that he provided, please let me know first. Thank you! Please read the attached document as the professor is asking for certain steps and requirements. Make sure there are five resources.

TV Game Shows

Writing about: 1. The history of TV game shows and how are they now. 2. Who is the game shows’ target audience today? 3. Include a specific game show and briefly talk about its pros and cons.

Please cite in MLA format.
Please include QUOTES from scholarly sources.
Please only use SCHOLARLY SOURCES!

Ethics

Ethics Paper

Select an current issue in healthcare. For example: childhood obesity, opioid epidemic, etc. Then go to: https://www.azleg.gov/bills/ (Links to an external site.). Select a bill of interest as it relates to your selected topic of interest. For example: Bill HB2201 is on appropriating money to the department of health services for opioid antagonists: https://www.azleg.gov/legtext/53leg/2R/bills/HB2201P.pdf (Links to an external site.). You can search through the bills. Once you select one, to find out more information on the bill go to the documents tab.

Paper Should Include the following:

One paragraph introducing your topic issue.
Find one article supporting a change to the selected topic. Why is it important to address this topic in healthcare policy? One paragraph.
One paragraph to discuss the selected bill and how this bill will help address your selected topic issue.
One paragraph on how you will implement this change. What groups/individuals will you reach out to (i.e Arizona Nurses Association, legislators, etc). How will reaching out to these selected groups/individuals help you influence a change in policy?
One paragraph conclusion.
Included a reference page. You also must include in-text citations to avoid plagiarism. Owl purdue is a great resource for APA.

Any topic (writer’s choice)

write an essay answering this question :
What is Cronins argument about emerging technologies? Using an example of an emerging security technology not discussed in Cronin’s chapter, discuss why you think this technology will or will not be widely used by violent non-state actors (insurgents, terrorist organizations, paramilitary organizations, etc.)?
the answer should be from at least one of the citation attached below thanks

Germ-be-Gone

Phase 4
Germ-be-Gone
a new product that must be deigned from scratch

Service Delivery Plan

Outlines the method by which your service will be delivered to clients or customers
It is a statement of what resources are needed in terms of both personnel and other assets to be delivered.
Outlines the critical points in the clinical service delivery process
A.  What to Include

}  Service delivery methodology: what methods will your organization use to deliver services-this can be an outline

}  Flow Chart of delivery service, delivery sequence, and timing requirements

      B.  Human Resources

                  1. Organizational Structure/staffing Plan

                        Clinical (full time vs. part time)

                        Non-clinical (full time vs. part times

                  2.  Compensation

Rate
Benefits
Job descriptions-brief
Roles and responsibilities-brief description

Compare and Contrast Apple and Android devices

Follow this checklist

Elements of a Comparison/Contrast Essay
Are there significant points of comparison or contrast between the two subjects you have selected?
Do you make clear comparisons or contrasts between the two subjects within the body paragraphs of the essay?
Are the body paragraphs organized either by point or by subject?
Have you used transitional words or phrases to indicate points being compared or contrasted?
Does the essay have a clear and consistent focus of comparing and contrasting two subjects?
Thesis Statement
Have you included a clear, focused, and detailed thesis statement?
Does your thesis state the subjects to be compared or contrasted and include the two or three points of comparison or contrast?
Is your thesis a single sentence located in the introductory paragraph?
Organization
Is there an introductory paragraph that contains your thesis statement?
Are there four or six total body paragraphs, each with a clear topic sentence?
Is there a conclusion paragraph with a concluding statement?
Have you used transitions to connect ideas between sentences and paragraphs?
Style and Tone
Is the tone of the essay objective and informative?
Have you carefully considered your word choices?
Is the purpose of your essay clearly to inform the reader about the similarities or differences between the two subjects?
Conventions
Have you checked your essay for grammatical and mechanical errors?
Have you used spell check or another method to check spelling?

Project : Risk, Threat, and Vulnerability Management

1. Security Assessment Report (12 pages)
Conduct a Security Analysis Baseline (3 of 12 ages)
Security requirements and goals for the preliminary security baseline activity.
Typical attacks to enterprise networks and their descriptions. Include Trojans, viruses, worms, denial of service, session hijacking, and social engineering.
Include the impacts these attacks have on an organization.
Network infrastructure and diagram, including configuration and connections
Describe the security posture with respect to LAN, MAN, WAN, enterprise.
Network infrastructure and diagram, including configuration and connections and endpoints.
What are the security risks and concerns?
What are ways to get real-time understanding of the security posture at any time?
How regularly should the security of the enterprise network be tested, and what type of tests should be used?
What are the processes in play, or to be established to respond to an incident?
Does the security workforce have the requisite technical skills and command of the necessary toolsets to do the job required?
Is there an adequate professional development roadmap in place to maintain and/or improve the skill set as needed?
Describe the ways to detect these malicious code and what tactics bad actors use for evading detection.
In the network diagram: include  the delineation of open and closed networks, where they co-exist.
In the open network and closed network portion, show the connections to the Internet
Physical hardware components. Include routers and switches. What security weaknesses or vulnerabilities are within these devices?
Discuss operating systems, servers, network management systems.data in transit vulnerabilities
endpoint access vulnerabilities
external storage vulnerabilities
virtual private network vulnerabilities
media access control vulnerabilities
ethernet vulnerabilities
Possible applications. Current and future mobile applications and possible future Bring Your Own Device policy.
Include:

remediation
mitigation
countermeasure
recovery
Provide the methods used to provide the protections and defenses.
From the identification of risk factors in the risk model, identify the appropriate security controls from NIST SP 800-53A and determine their applicability to the risks identified.
Determine a Network Defense Strategy 2/12 pages
Outline how you would test violations.
Identify how you will assess the effectiveness of these controls and write test procedures that could be used to test for effectiveness.
Write them in a manner to allow a future information systems security officer to use them in preparing for an IT security audit or IT certification and accreditation.
Explain the different testing types (black box testing, white box testing).
Plan the Penetration Testing Engagement 2/12 pages
Include all involved processes, people, and timeframe.
Develop a letter of intent to the organization, and within the letter, include some formal rules of engagement (ROE)
Conduct a Network Penetration Test 4/12 pages
After finding the security issues within the network, define which control families from the NIST 800-53 are violated by these issues.
Explain in the SAR why each is a violation, support your arguments with a copy of your evidence
Provide suggestions on improving the security posture of these violations.
Complete a Risk Management Cost Benefit Analysis 1/12 pages
Complete your SAR with a risk management cost benefit analysis. Think about the cost of violations and other areas if you do not add the controls. Then add in the cost for implementing your controls.

Theoretical Perspective

Students will choose a theoretical perspective and, a) provide an intelligent discussion of the theory (citing the original theorist in text and listing the original work on your references page, of course), b) discuss at least four (4) empirical articles testing the theorys validity, c) and conclude with policy implications of the theory.

Research papers are to be exactly five pages of content in length and must be completed in APA format (12 pt. Times New Roman font, double spaced throughout the entire paper, with 1 margins). Research papers do not need an abstract but must include a title page, running head, page numbers, in-text headings that divide the paper’s sections, and a references page.

reflection

Assignment Content

Reflect on the process of writing your own action research proposal and the information contained in it.

Write a 260 to 400 word paper that evaluates your Action Research Proposal. Use the Criteria for Evaluating Action Research located in Ch. 10 of Action Research to guide your evaluation. Do not use first person.

Note: your study hasn’t been conducted yet, so you’ll have to make some assumptions (state that they are assumptions) and/or use future tense when discussing items 4-8 of the Research in Action Checklist. For example: sample response for item #4- The researcher will use appropriate qualitative data collection techniques such as interviews and observations to answer the proposed study’s research questions.

Access the “Criteria for Evaluating Action Research” section by clicking on the Assignment Assistance activity in the Learning Activities folder or by clicking on the attachment below.

medieval and/or early modern philosophy

The paper must focus on some topic found in medival and/or early modern philosophy. You must use at least one primary source and at least one secondary source for this paper. Full references, given either in the body of the paper and/or in a separate bibliography or works cited section, are required. It is not inappropriate to compare/contrast figures from the two time periods (medival and early modern) even perhaps in a dialogue format; nor is it inappropriate to work in some other creative manner. Also, feel free to use the secondary source (I’ve attached below) as a model for this paper. You may also use it as one of your sources for the paper if you so wish to write about that topic. Finally, I also attached my paper on that secondary source that can be recycled into this paper if you decided to do the same topic, but I encourage you to pick whatever topic you’d most enjoy writing about. Thank you.