Discussion Questions: Incident Response & Disaster Recovery Computer Science Assignment Help. Discussion Questions: Incident Response & Disaster Recovery Computer Science Assignment Help.
- Readings from Incident Response & Disaster Recovery Chapter 9.
- Discussion Questions:
- Discuss the importance of the after-action review and “lessons learned” documents. How will these help to improve the BC plan?
- Develop a list of vulnerabilities that a small business may have in the event of a major hurricane. What strategies and recommendations for business continuity will be appropriate for them?
- The use of after-action reviews has been covered in every aspect of incident response and disaster recovery. How will the BC after-action review differ from the DR after-action review?
- There are a number of in-house processes that may need to be handled by outside vendors during BC operations, what are they and how do you identify those vendors? Provide examples.
Discussion Questions: Incident Response & Disaster Recovery Computer Science Assignment Help[supanova_question]
I need an essay about the First Amendment rights Business Finance Assignment Help
I will expect you to think critically about First Amendment rights as you develop this essay. Four cases will be presented after these instructions. You are to write your essay on only one of the cases. In your essay, address the questions posed following the scenario, but make it all flow as though those questions are thoughts you have and know that they must be considered in arriving at a solution to your journalistic dilemma. Do not list the questions within your essay and then answer them individually. You must fully justify the path you choose. In other words, whether you choose a solution that is provided to you within the case scenario or another one you have come up with on your own, you must explain completely why you have made this choice. Refer to at least two previously decided cases (precedent) as partial support for your decision. Remember: The First Amendment is NOT a precedent. Do not start off writing the scenario as it appears in this assignment simply to add words to your essay. You may begin by briefly explaining the dilemma you are facing.
Specifications: Use this list as your checklist
____ 650–900 words (This is a firm minimum and maximum number of words—not one word fewer nor one word more.)____ 12-pt. Times New Roman, double spaced
____ 1-inch margins on all four sides of page
____ Contact info and name in header on every page
____ Indent paragraphs 1⁄2 inch with NO extra spacing between paragraphs ____ Include page numbers
The cases follow: Case 3
To what lengths should you go to get a story?
You are a correspondent for a major television network. Your producers have done a great deal of research about a national grocery chain; they allege that some of its grocery stores are asking employees to participate in unsanitary food-handling practices.
This is an important story. Consumers may get sick if they eat tainted food, you argue, and they have a right to know that a food store is not handling its food in a safe manner. You want to make sure this story airs on national television. You believe that to get good footage you have to go into the store with cameras and film the store’s workers actually engaging in unsafe practices. You need proof.
As the television correspondent, how will you get your story?
Call the store manager and request an on-site interview, with cameras. Explain that you have some information that consumers will want to know about and give the store a chance to show its side of the story.
Just appear at the store one day, without advance notice to the manager. That way you won’t tip off the staff that you’re onto a story.
C. Pretend to be looking for a job in the store; complete an employment application and actually get hired. Then, while you’re at work, use hidden cameras to document the unsafe practices you see.
D. Your own solution to the dilemma. Be specific.
Will a negative story be allowed to run in a high school newspaper?
As a high school journalist, you have developed several sources of information about the football camp held each year at your school. You hear that brutal hazing is part of athletes’ initiation to the team. Investigating further, you learn that new players are subject to various humiliations and assaults, sometimes with broomsticks, electrical cords and socks stuffed with tennis balls.
This is a big, important story. Kids are being hurt. You work hard to get your facts right and spend a great deal of effort checking and double-checking your sources. Your newspaper’s adviser supports you and your work. But when you are ready to publish the story in the school newspaper, the principal says you can’t run it unless you make substantial changes. You must eliminate a player’s comments and add a prepared statement from the football coach. The coach also says this is “negative journalism” and wants you to hold the story until after the playoffs.
What do you do?
Drop the story. You know you’ve done a good job, but if the principal won’t let you run the story as you have prepared it, you won’t run it at all.
Wait until after the playoffs, as the coach requests, and then print the story according to the principal’s requirements: Drop the player’s comments and run the football coach’s statement. At least some of the information you have uncovered will come out.
Print the story as your principal demands, by dropping the player’s comments and running the football coach’s statement. But add an editor’s note at the end of the story, explaining that school officials, including the coach, reviewed the story and insisted that changes be made to it before it was published.
Your own solution to the dilemma. Be specific.
Please tell me which case you choose. you address any of the legal aspects of this scenario. Including the precedents and possible legal consequences for you.
50 word Response to Each Student Discussion Business Finance Assignment Help
Suppose McDonald’s® was considering bringing a new
kind of hamburger to its stores. What kind of research would it need to do in
order to have some confidence that the new product would sell well, not just in
the United States, but in its locations all over the world?
McDonald’s should use qualitative and quantitative
research. Quantitative research uses graphs, tables, and charts to analyze
information. Qualitative research uses consumers’ perceptions on services and
products. McDonalds is doing market research to see if their new hamburger will
sell. Qualitative research will give McDonalds an idea on how their customers
will feel about the new hamburgers that will be sold. McDonalds can see what
the consumers like and dislike about the new hamburgers. Quantitative research
will help McDonalds present the numbers to corporate by using charts and graphs
to see how well the new hamburgers sold or did not sale across the world.
McDonalds could use other market research, but I feel this would be best.
Business Case Studies. (2014). Types of market
research – Discovering customer needs through research – Barclays | Barclays
case studies and information | Business Case Studies. Retrieved from http://businesscasestudies.co.uk/barclays/discovering-customer-needs-through-research/types-of-market-research.html#axzz3puB3dfJk
What are the trade-offs among all the types of
research addressed? Suppose you are a manager of a small start-up firm with a
limited budget. What kinds of research would be the most valuable? Why?
As with everything in life there are trade offs , the
same holds true for marketing research. For instance there are focus groups
these are a real good picture of what people think and pretty unbiased and
scientific, however they can be expensive and as a small start up may be out of
your budget. Surveys can be useful but not always accurate, people want to get
off the phone quickly and may not give accurate answers yet again by mail
they may never get returned, the best survey would be by social media.
I feel the most valuable research would be face
to face sampling, you get instant feedback and can ask follow up
questions of the customer. There is very small cost involved in this type
of research as well.
Sourcing Methods Business Finance Assignment Help
This is the position that I chose Chief Human Capital Offier position.pdf
Submit the Sourcing Methods portion of your selection and onboarding process project. Refer to the Sourcing Methods Scoring Guide and the project description to ensure you meet all of the evaluation criteria, and be sure to address all of the following required points:
- Evaluate and select effective sourcing methods for your chosen position.
- Assess and describe the advantages and disadvantages of the sourcing methods, along with a rationale for each selection.
- Design an appropriate allocation for each sourcing method based on a fictional recruiting budget. The budget requires no dollar amounts; simply provide allocations to each sourcing method for your chosen position; allocations should total 100 percent (please do not spend time/energy determining actual dollar amounts for each source.)
- This component requires a 2–3-page paper, and please be sure to cite your sources according to APA formatting guidelines.
I need a short executive summary Computer Science Assignment Help
Write a short Executive Summary section for your risk analysis report. This
should summarize the most important risks and recommendations that an executive
manager would read.
* Include an Overview section that
describes the risk analysis, how it was assessed, and the scope of the
* Include a short description of the
analysis steps. You should list in order the various components of the analysis
report used for the midterm like Identifying Critical Assets, Determining the
Threats and Vulnerabilities, etc.
* Finally, include a findings
summary. This is your synopsis of the risks you found, their risk ranking, and
potential mitigation steps.
all of the above in a single Word document. Your document should be
professional with correct grammar, spelling, and punctuation.
Harry & Mae’s Case Study
Instructions: Below are details about a fictitious business requiring improvements to its security. You have been hired as a security consultant for this business. Use the details from this case study according to the directions found in the various class assignments. The text in italics is the transcript from the video. The other text contains details on the hardware and software infrastructure in place at the client.
Video Transcript Welcome! I’m Tom Pierce, the president of Harry and Mae’s Inc. Recently, my company suffered a security breach where hackers obtained credit card data on over 25,000 of our customers. I need your expertise to ensure this doesn’t happen again. Come on, let’s get started. First, I’ll give you a little background about my company and then I will go into detail about the security we currently have in place. Harry and Mae’s Inc. is a diner franchise that supports over 100 diners located in New York, New Jersey, Delaware, and Pennsylvania. Harry and Mae Pierce started the original Harry and Mae’s diner with two railroad passenger cars back in 1954. Since then, his children and grandchildren have transformed the company from a single restaurant into a chain of restaurants, and, most recently, to a publicly traded franchise business. The franchise business provides restaurant owners with everything they need to open and run their own operation, including buildings, fixtures, restaurant products, support services, and food. As another service to franchise owners, we resell credit card payment processing services to them at competitive rates. Harry and Mae’s reimburses, up front, for credit card transactions that are funneled through their payment processing system as an incentive for franchise owners to use our services. As for location of the corporate headquarters, Harry and Mae Inc. call Windsor, Pennsylvania home. Both of the corporate headquarters and warehouses are located there. We built the campus from the ground up at that location because it was central to our operation and both the business climate and tax structure were favorable. The campus currently employs slightly over 400 people that see to the day to day business operations. What about our physical security, you may be asking. Well, the campus’ physical security system was designed by a retired Army general. Its main features include a perimeter fence, cameras, smart card access points, alarms, and a full-time security staff. The campus also features a three-layer wired network infrastructure. Plus, it has full wireless access provided by an Aruba Networks grid. Comcast Business Solutions provides Harry and Mae’s with Internet. We have a number of security appliances and devices already in place, but I’m not sure how effective they are. As for the active directory domain, there is a single one for the entire campus. It was configured using default settings, and uses the default domain group policy with one exception. Password history and complexity requirements have been disabled to make it easier for employees to use passwords they can remember and reuse them if they want. The rationale for making this change was that I had difficulty remembering my password, so I began to write it down. A member of the cleaning crew saw it and used my machine to view pornographic material. When I discovered the breach, I fired the person responsible and directed the password policy change.
Our headquarters also features servers, and web hosting; however, the specifics for each are a bit detailed. Next, let’s focus on the on and off campus workstations. The company has over 400 Dell Optiplex 3020 workstations on campus. Each computer is installed with Windows 7. Plus, all computers are joined to the company’s Active Directory domain. Off campus, the default configuration for new restaurants consists of a high speed Internet connection supplied by a local provider, a Network Address Translation firewall device that includes a wireless access point, an office computer, and two point-of-sale computer systems that include credit card processing software. Even though we try to stay up-to-date with the latest software and hardware, our system is not immune to failure. While all employees have user names and passwords for the system, there have been problems with computers becoming infected with malware because the point-of-sale software can be minimized. Now that I’ve explained the history and background of my company as well as the infrastructure of our system, it’s time to get to work. Visit your course site to check out your assignment. Be sure to ask your instructor any questions that arise. Good luck!
IT & Security Infrastructure Below are details on the Information Technology and Security infrastructure, policies, and equipment currently in place at the client.
The campus physical security system was designed by a retired Army general. Its main features include a perimeter fence, cameras, smart card access points, alarms, and a full-time security staff. Access to all buildings on campus is restricted through smart cards. The server room is a 1600 square foot building within the main headquarters building. It has climate control, redundant uninterruptable power supplies (UPS), and a generator with enough capacity for 36 hours of uninterrupted operation. The walls, floor and ceiling are constructed of reinforced concrete and are two feet thick. In addition, the entire building is shielded against electromagnetic radiation. It has an outer set of vault doors and an inner door that is equipped with a biometric scanner. The interior of the room is equipped with fire, water, and motion sensors, as well as cameras. The sensor and video feeds from the campus are centrally monitored by a staff of three people 24 hours a day, seven days a week.
Wired network Infrastructure:
The wired network infrastructure consists of three layers. The innermost layer consists of consists of two Cisco Nexus 7000 switches populated with M1-Series 8-port fiber optic switches running NX-OS Release 5.0. These switches provide fully redundant 10Gbit connectivity between servers, to the Internet, and to the second layer. The second layer consists of a 10 Gbit dual fiber ring that provides connectivity between the core network and 2 Cisco ME 3600X Series Ethernet Access Switches located in each building on campus. The third layer consists of Gigabit copper local area networks that connect computers and Power over Ethernet (PoE) of phones with Cisco 2960-S PoE switches that are located in communication closets in close proximity to their users. Each subnet in the third layer is connected to the second layer through both Cisco ME 3600X Series Ethernet Access Switches that provide access to the fiber ring for the building. Layers 1 and 2 are fully redundant. Layer 3 doesn’t provide redundant connections, but less than 50% of the available ports are used on each switch. The communication closets are equipped with patch panels that would permit network administrators to manually bypass a defective switch.
Wireless connectivity on the campus:
The campus has full wireless access provided by an Aruba Networks grid. There are two Aruba 6000 Modular Mobility Controllers serving over 100 Aruba Networks AP-125 wireless access points. The wireless network interfaces directly with the corporate headquarters wired network. The mobility controller has the ability to serve as a firewall, but the default settings currently allow all traffic in both directions. In addition, the president of the company has directed that the current wireless system be configured to provide open access without logon capability because he wants to make it as easy as possible for employees to use their mobile devices. When asked about potential security issues, he said that the convenience of mobile devices outweighs the risk. He is emphatically supporting BYOD throughout the company. He had his physical security consultant walk the perimeter with a mobile device to confirm that the signals from wireless devices on the campus were too weak to register.
The Internet connection for the company is provided by Comcast Business Services. Comcast provides a fully redundant 1000Mbps down and 50Mbps up fiber connection to the campus on a fully redundant dual fiber ring consisting of two fiber pairs.
The campus network has two Dell SonicWAll NSA 4600 Firewall Security Appliances that connect the Comcast Internet connections to the core network. These two devices are currently configured to allow all traffic in both directions. These devices are capable of up to 1000 VPN connections each. However, the company chooses to forward VPN traffic through the firewalls and handle it using a Microsoft PPTP solution.The campus also has two Barracuda Spam & Virus Firewall 300 appliances. These devices are located on the core network, and all mail traffic is forwarded through them. However, the company has not activated the subscription that updates the signature files, and some users are complaining about excessive SPAM. Other users (especially Sales and Accounts) are complaining about missing email.
Active Directory Domain:
There is a single Active Directory domain for the entire campus with two Domain Controllers. It was configured using default settings, and uses the default domain group policy with one exception: password history and complexity requirements have been disabled to make it easier for employees to use passwords they can remember and reuse them if they want. The rationale for making this change was that Tom Pierce had difficulty remembering his password, so he began writing it down. A member of the cleaning crew saw it and used Tom’s machine to view pornographic material. When Tom discovered the breach, he fired the person responsible and directed the password policy change. There are five members of the IT group with domain administrative privileges.
There is a second AD Organization Unit set by the Chief Financial Officer for the Accounting and Finance Group. In this OU, all administrative assistants are also administrators in order to quickly add or remove user accounts. This OU has full password complexity turned on.
The headquarters has a 200TByte HP StorageWorks Storage Area Network (SAN) that provides storage for 10 Hewlett Packard ProLiant DL380 G7 servers. The firmware and drivers was last updated in July 2013. The HP servers are running VMware vSphere Hypervisor (ESXi) version 5.1. On that virtual platform, the company currently hosts redundant virtual servers for their domain controllers, Inventory Tracking System (ITS) Point of Sale (POS) system, accounting system, payment processing system, email system, Web site with database support for active content, Windows Routing and Remote Access Server (used for VPN connections,) authentication services, and database management systems. All virtual machines are running Microsoft Windows Server 2012 Datacenter edition. The administrative staff elected to not install antivirus software on any of the virtual servers, as that would slow them down. After all, Web browsers are disabled on all servers and by policy administrators are not allowed direct access or email.
The Web servers (IIS) and Email servers (Microsoft Exchange Server 2010 SP3) have two network connections: an internal one and external one with a public IP address. There are no firewalls on the external connections. The Web Server uses SSLv3.0 for any sensitive pages along with certificates signed by Verisign. Web developers move web pages to the Web server using File Transfer Protocol (FTP). FTP is enabled for both internal and external networks, as some programmers access the Web server from home. Security is enabled, so they must log in using their Active Directory user accounts. In addition, the system administrators have discovered that FTP is a convenient way to move files, and they often log in using their accounts, as well. Using the FTP server as a staging server, it is possible to move files from the outside to the Web server, and then from the Web server to a workstation.
The Web server is used to host the company’s web site. The site has two parts that are both hosted on the same server, a public part that is available over the Internet using the company’s URL http://www.harryandmae.com, and a “private” part that is available on the internal network only that is accessible only by using the internal URL http://www.haryandmae.local. Employees can log into the “private” Web site using their Windows login credentials and view their pay statements, work performance reports, vacation time, and other personal information. The franchise owner in Scranton, PA purchased and uses the domain www.HandMScranton.com for customers at his three restaurants. He also has an active Facebook page and Twitter and Instagram accounts. He often runs contest using these sites.
The company has over 400 Dell Optiplex 3020 workstations with Windows 7 Professional installed. All computers are joined to the company’s Active Directory domain. These computers are configured for IPv4 only, and IPSec is disabled by group policy. All workstations have Symantec Endpoint Protection installed. About 1/3 of employees have local administrator access in order to install and run applications. The company uses WSUS to update Microsoft applications. There is no standard process for updating other programs.
In spite of the new relaxed password rules, some employees still write their passwords down, and they can be found taped to the inside of drawers, on the bottom of mouse pads, or on notes stuck to their monitors. The company uses a Web front end for all of its applications, and the workstations are capable of accessing them using Microsoft’s Internet Explorer. IE10 is the company standard. Some employees have installed and use other browsers. Remote users have access to the same applications via the VPN.
The default configuration for new restaurants consists of a high speed Internet connection supplied by a local provider, a Network Address Translation (NAT) firewall device that includes a wireless access point, an office computer, and two point-of-sale computer systems that include credit card processing software. The WAP router at each store is procured and set-up by the franchise owner. All franchises are supposed to have free Internet WiFi for customers. All computers are Microsoft Windows 7 machines with Norton Antivirus software. All employees have user names and passwords for the system. There have been problems with computers becoming infected with malware because the point-of-sale software can be minimized. Point-of-sale computers connect with the corporate headquarters for payment processing using Microsoft PPTP VPN clients on each machine.
Who can help create an issue-specific security policy Computer Science Assignment Help
Improving Security through Layered Security Control
Learning Objective: Develop an issue-specific security policy (ISSP) that can be used at home or small business.
Consider your incident response plan (IRP) you created last week. Using a similar approach, draft a generic, sample issue-specific policy that would be useful to any home computer user. Let’s use the premise that this policy could be available to the general public. Ensure you’re covering all of the critical aspects of a security policy.
Also, discuss how layered security proved to be a positive solution in the given problem, including the impacts of layered security.
- Format: Microsoft Word
- Font: Arial, 12-Point, Double- Space
- Citation Style: APA
- Length: 1–2 pages (plus a cover sheet)
Who can help create an issue-specific security policy Computer Science Assignment Help[supanova_question]
the population standard deviation, math homework help Mathematics Assignment Help
Assume that a simple random sample has been taken, the population
standard deviation is not known, and the population is normally
distributed. Medical researchers studying cochlear implants, devices
placed behind the bone in the ear to improve hearing, found the
following number of implants over the last twelve years in children
under 3 years old. Use a 90% confidence level and the following sample
data:40 90 99 120 150 220 300 320 460 520 600 650Find the
margin of error E that corresponds to the above statistics and
confidence level. Give your answer with one decimal, e.g., 1223.4 .
MOVIE A BEAUTIFUL MIND IN A PSYCHOLOGICAL MANNER, Movie Assignment help Humanities Assignment Help
Every aspect of this assignment MUST be clearly addressed and it MUST be plagiarism free…
one of the following movies:
A Beautiful Mind (2001)
Good Will Hunting (1997)
Peaceful Warrior (2006)
Rain Man (1988)
One Flew Over the Cuckoo’s Nests
the main characters in the movie you chose, answer the following questions:
This should be a three part assignment…See
grading rubric below…
Define cognition and
provide a description of the cognitive processes.
What is the relationship
between cognition and personality development?
Explain how biological
and environmental factors can shape our cognitive processes.
How do parents influence
a child’s personality according to each theory: evolutionary,
biological/genetic, and behavioral?
How does self-efficacy
relate to personality?
What “nature” and
“nurture” factors contribute to one’s self-efficacy?
Make sure you are using
the reading materials as one of your resources as well as an additional three
outside resources. Apply APA formatting and citations. The total amount of
pages should be at least 6 pages.
I am attaching the Chapter from my
e-textbook to use with this assignment.
Please make sure that you use and the reference is listed on there for
in-text citations. This should be listed as one of the sources in the reference
page and also in-text citations.
Please make sure that everything is covered in this grading
Identifies the movie chosen and the
Clearly addresses Part 1 of the
Clearly addresses Part 2 of the
Clearly addresses Part 3 of the assignment
Paper includes a title page, introduction with thesis statement, conclusion,
Paper is appropriate in length (4 pages, not including the title page or
It is in essay format and includes a minimum of three resources, including
Paper uses Standard American English
Paper is free of typographical errors.
Paper includes a highly developed viewpoint and purpose.
Paper demonstrates superior organization; communication is highly ordered,
ACM Code of Ethics and Professional Conduct, computer science assignment help Computer Science Assignment Help
I need one page and a half or two pages of ACM Code of Ethics and Professional Conduct and pacifically about ((Honor confidentiality.))
The principle of honesty extends to issues of confidentiality of information whenever one has made an explicit promise to honor confidentiality or, implicitly, when private information not directly related to the performance of one’s duties becomes available. The ethical concern is to respect all obligations of confidentiality to employers, clients, and users unless discharged from such obligations by requirements of the law or other principles of this Code.
this website to use examples of
please please make sure its gonna be free and clear
putting together background from each of the four perspectives for a balanced scorecard, business and finance assignment help Business Finance Assignment Help
The purpose of the Session Long Project is to give you the opportunity to explore the applicability of the Module to your own life, work, and place in space and time, and to experiment with the Module to see how the otherwise academically rigorous presentation of a topic may, with more or less work and/or trauma, become “up close and personal”. This is done in a number of different ways — sometimes cumulative papers, sometimes practical hands-on experimentation with a tool of some sort, sometimes reflections on a place of work or life. The common thread is personal application, aimed at demonstrating a cumulative knowledge and understanding of the course’s material.
For this course, the Session Long Project will take the form of putting together background from each of the four perspectives for a balanced scorecard approach to an organization or organizational unit with which you are familiar. In the final module, you will have a go at strategy mapping. You’re not building a complete balanced scorecard — that would be far beyond our current scope – but you’ll have a chance to see what goes into it and how it gets put together into a coordinated whole. As in the cases, you’ll be drawing on your previous course work to help.
The Module 1 assignment has two parts. First, you need to identify an organization to which you have access to at least some information concerning financial data; staffing and human resource systems; marketing and customer relations; information systems; and operations. While most material on the Balanced Scorecard is written from the private, for-profit point of view, it’s perfectly possible to use this approach with public or non-profit organizations as well.
For the second part of this assignment, consider the organization’s mission and strategy from the perspective of its financial operations (from your work on the case, your previous course work, and your background reading, you should be reasonably clear what such operations are). In this section of the assignment you’ll begin to identify objectives and measures relevant to that perspective. If you’re unclear on just what objectives and measures are, here is a presentation that describes what they are and how to write them.
SLP Assignment Expectations
When you have thought about it and made your selection, please specify (2-3 pages):
- The name of your organization
- What this organization does – its mission, vision and overall strategy
- The access you have to information about this organization — remember, you’ll need information about its financial performance, marketing, internal operations, strategy, and management systems.
Once you’re reasonably clear on what’s involved, think about your organization and its finances, and then:
- Identify at least three objectives for improving the organization’s financial position, and show how they relate to the mission, vision and strategy of the organization.
- For each objective, develop at least one meaningful performance measure (metric).
- For each objective, identify at least one expected level of performance (target).
- For each objective, identify at least one new action or program that needs to be developed to ensure successful implementation of the organization’s strategy (initiative).
Here’s a table that you may wish to copy and fill in: