DSRT 734 University of the Cumberlands Network Security Benefits for Customers Paper Computer Science Assignment Help. DSRT 734 University of the Cumberlands Network Security Benefits for Customers Paper Computer Science Assignment Help.
(/0x4*br />
- Spring 2021 – Infer Stats in Decision-Making (DSRT-734-M21) – Full Term
- You will review both quantitative and qualitative research. The topic is up to you as long as you choose a peer-reviewed, academic research piece. I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there. There are no hard word counts or page requirements as long as you cover the basic guidelines. You must submit original work, however, and a paper that returns as a large percentage of copy/paste to other sources will not be accepted. (Safe Assign will be used to track/monitor your submission for plagiarism.) Please use APA formatting and include the following information:
- Introduction/Background: Provide context for the research article. What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
- Methodology: Describe how the data was gathered and analyzed. What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
- Study Findings and Results: What were the major findings from the study? Were there any limitations?
- Conclusions: Evaluate the article in terms of significance, research methods, readability and the implications of the results. Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.)
- References
DSRT 734 University of the Cumberlands Network Security Benefits for Customers Paper Computer Science Assignment Help[supanova_question]
University of Maryland Global Campus Online Terrorism Discussion Response Writing Assignment Help
Do you believe that we are winning the war on terrorism online? Why or why not? Suggest one policy implication that you think should be put in place to target one area of national security and/or terrorism online and discuss how this policy would help to thwart terroristic activities online or better protect people in the online environment.
Respond to this post (Gio):
I believe that the question of whether or not we are winning the war on terrorism online is a general question that cannot be answered with a simple yes or no but rather can draw to specific areas of online terrorism where there have been an increase of recent victories. One primary example is that I do believe based upon my research that we are winning the war against terrorist propaganda online. In modern age terrorist groups have taken to the internet to spread ideology as a method of instilling fear or even with the goal of radicalizing new recruits and will use a variety of social media sources to spread such ideology. Social media companies such as facebook have reached a rate of 99% efficiency in being able to detect terror related content before it is even able to be reported by users of the platform or even life on the website. This is accomplished through the use of audio and video matching technology which allows for the detection of terror propaganda and provides the company with the ability to delete up to 83% of content copies within one hour alone.
In addition to the use of automated technology to combat and detect the spread of terrorist ideology via the internet and social media, a further deterrent and perhaps more important is the knowledge of trained experts. Through the collaboration of cyber experts across various social media and technology platforms with the common goal of combating online terrorism, major platforms will be able to share insights and findings on recent trends in methodology used by terrorists online as well as findings on ways to combat them. Industries are also able to share databases of hashes uncovered from terrorist propaganda which can be used as fingerprints allowing companies to detect each attempt of potential terror related content.
Bickert, Monika, Fishman, Brian (28 November, 2017) Hard Questions: Are We Winning the War On Terrorism Online? Retrieved: https://about.fb.com/news/2017/11/hard-questions-are-we-winning-the-war-on-terrorism-online/
Ines von Behr, Anaïs Reding, Charlie Edwards, Luke Gribbon (Accessed: 17 February, 2021) Radicalisation in the digital era. Retrieved: https://learn.umgc.edu/content/enforced/544170-027246-01-2212-OL1-6384/Radicalisationinthedigitalera.pdf?_&d2lSessionVal=jpsqIZuBBxDoVxXYmBfctgBFn&ou=544170
[supanova_question]
EU Environmental & Occupational Health Pediatric Lead Poisoning Essay Writing Assignment Help
For this week’s assignment:
- Identify an environmental or occupational exposure to a chemical or group of chemicals in which you are interested—the topic for your final project. For ideas about topics, you can consult the following sources:
- The textbook
- The environmental health topics section of the CDC website
- The environmental health topics section of the National Institute of Environmental Health Sciences (NIEHS) website
- The toxic substances section of the Environmental Protection Agency’s (EPA’s) website
- The case studies in environmental medicine from the Agency for Toxic Substances and Disease Registry (ATSDR) website
- The hazards and exposures section and the chemicals section of the National Institute for Occupational Safety and Health’s (NIOSH’s) website. NIOSH is a part of the CDC.
- Determine how your chosen exposure affects human populations, i.e., the health problems or disease caused by this chemical or group of chemicals.
- Choose a topic that is not overly broad. For example:
- Choose one chemical: Lead exposure will make a better topic than exposure to toxic heavy metals, which include lead, mercury, chromium, cadmium, etc. (described in the textbook).
- Choose a specific population at risk: This population is exposed either to one chemical or to a closely related group of chemicals, such as pesticide exposure to children in agricultural families or occupational exposure to organic solvents among pregnant women.
- Write a 3 to 5-page paper in a Microsoft Word document addressing the following:
- Describe the chosen environmental or occupational exposure.
- Explain the importance of this exposure problem to human health in terms of both of the following issues:
- The extent of exposure, e.g., the estimated number of people exposed
- The seriousness of disease or diseases associated with the exposure to the substance or group of substances
- Describe the population you will study (e.g., the whole population, individuals living in poverty, children, pregnant women, workers in specific occupations, etc.)
- Explain why you are interested in the environmental or occupational public health problem you selected and the population you selected.
[supanova_question]
HLS 571 Trident University How Might the US Respond to Cyber Attacks Response Law Assignment Help
Discussion Requirements
A substantive comment should be approximately 300 words or more for the response.
Read the initial comments posted by your classmates and reflect upon them.
Before writing your comments:
- Review the Discussion grading rubric to see what is expected for an excellent discussion, in order to earn full credit.
- Review some resources to help you synthesize, such as the following:
Sullivan, J. (2011). Strategies for Synthesis Writing. Retrieved from http://www.findingdulcinea.com/features/edu/Strategies-for-Synthesis-Writing.html
NOTE: You are required to cite sources and include a reference list for the second post if it is simply your opinion. However, if your opinion is based on facts (as it should be), it is good practice to strengthen your position by citing sources.
Be sure to meet all of the criteria in the rubric, as noted in the instructions above.
Third post for each module discussion:
Read the initial and secondary comments posted by your classmates and reflect upon them.
Directly respond to at least one classmate in a way that extends meaningful discussions, adds new information, and/or offers alternative perspectives.
MY DISCUSSION (DO NOT RESPOND TO THIS POST PLEASE)
Classmates and Professor,
Considering a cyber-attack that was traced to another state-sponsored group, what actions should be taken?
Cyber-attacks are common in the complicated technological world, According to the article, by Mark Pomerleau 2015, the cyber world is still in its “Wild West” stages, hence, there exists an urgent need for precautionary measures to be taken in cyberspace to prevent vulnerability to cyber-attacks and at the same time respond to cyber-attack threats (Bakjhi, 2013). With the rise of state-sponsored cyber-attacks, the US needs to have a strong policy against such practices to help reduce the frequency or possibility of an attack. Therefore, considering the threat of cyber-attacks on the security of US citizens and the globe at large there exists an urgent need to respond to cyber-attacks with swiftness and stern measures as possible (Surfwatch, 2021).
Considering cyber-attacks are criminal offenses in the cyber world, cyber-attacks orchestrated and funded by state-sponsored groups are categorized under acts of war, and efforts to mitigate these kinds of threats go beyond cybersecurity defense upgrade of systems (Barnatt, 2017). The US responds to such aspects as acts of war, and as an aspect that jeopardizes the US national security, hence, several precautionary steps are taken to respond to cyber-attacks. Initially, considering that these activities happen in cyberspace, the US is limited to the use of policy and investigative actions against these threats, hence, cyber attackers are indicted and brought to justice by US investigative agencies (Bissell, 2019). They use the suspects to gain information on the level of breach against their cyber systems and if found guilty are subjected to trials including being charged with war crimes.
Finally, the US military cybersecurity team considers a cyber-attack from state-sponsored groups as an act of force against the US systems, hence the need for the response to be swift and in line with war rules and regulations. In this case, the US military can respond to cyber-attacks with sanctions against the state involved, criminal trials for those involved (Pomerleau, 2015, PR 30). For instance, in the incident of the Sony hack in 2013 where North Korea was responsible for the attack, the US reached out to other nations with similar problems and improved their cybersecurity systems while implementing sanctions on North Korea in response to the cyber-attack (U.S. Government Publishing Office, 2015).
Pedro
References:
Bakjhi, S. (2013, May 6). 25 Biggest cyber-attacks In history. Retrieved from http://list25.com/25-biggest-cyber-attacks-in-hist…
Barnatt, C. (2017, May 14). Computing security. Retrieved from https://www.explainingcomputers.com/security.html
Bissell, K., Lasalle, R. M., & Dal Cin, P. (2019, March 6). The cost of cybercrime: Ninth annual cost of cybercrime study. Retrieved from https://www.accenture.com/_acnmedia/PDF-96/Accentu… Read pp. 6–13.
Pomerleau, M. (2015, June 10). How might the US respond to cyber-attacks? Retrieved from: https://defensesystems.com/Articles/2015/06/10/US-response-scenario-cyber-attack.aspx
Pomerleau, M. (2015, Sep 30). Intelligence officials: Cyber domain is still the ‘Wild West.’ Retrieved from https://defensesystems.com/articles/2015/09/30/ic-congress-cyber-wild-west.aspx
Surfwatch. (2021) Cyber Risk Intelligence. Retrieved from https://www.surfwatchlabs.com/threat-categories#Ac…
U.S. Government Publishing Office. (2015, January 13). The North Korean Threat: Nuclear, Missiles and Cyber. Retrieved from Committee on foreign Affairs: https://www.govinfo.gov/content/pkg/CHRG-114hhrg92…
__________________________________________________________________________________________________
RESPONSE 1 (RESPONSE NEEDED)
Classmates and Professor,
Due to the complexity of cyber networks, it is often very difficult to figure out who exactly conducted an attack. “In cyber incidents… attribution can be the most difficult component, in part because cyberspace allows for a great deal of anonymity and attacks can be routed through servers all over the globe to mask its origins” (Pomerleau, 2015). The first step during or after an attack is to share information with other government agencies to see if anyone else has supplemental information and to ensure that everyone knows what is going on. The second step is to put the pieces of the puzzle together to accurately identify who generated the attack and the location in which it came from.
Before diving into what actions should be taken when an attack has been attributed to a state-sponsored group, one must first understand who is involved. The United States (U.S.) Department of Homeland Security (DHS) has a role to secure the homeland – this includes securing the homeland against cyber wars (Anderson, p. 108). The U.S. Department of Defense (DOD) has a role to defend the homeland – this includes cyberwar defense (Anderson, p. 110). Although these two organizations conduct vastly different operations, some responsibilities tend to overlap in the realm of cyber-attacks – and they work with local/state governments of impacted locations. Due to the attack coming from a state-sponsored group, the U.S. will investigate – this would lead to using law enforcement resources, DHS and DOD resources, and prosecution of attackers (Pomerleau, 2015).
Murphy
References
Anderson, L. R. (n.d.). Countering State-Sponsored Cyber Attacks: Who Should Lead? United States Army.
Pomerleau, M. (2015, June 10). How might the US respond to cyber attacks? Defense Systems. https://defensesystems.com/Articles/2015/06/10/US-response-scenario-cyber-attack.aspx
Pomerleau, M. (2015, September 30). Intelligence officials: Cyber domain is still the ‘Wild West’. Defense Systems. https://defensesystems.com/articles/2015/09/30/ic-congress-cyber-wild-west.aspx
[supanova_question]
HSA 3109 Rasmussen Is Original Medicare Better than Medicare Advantage Discussion Health Medical Assignment Help
Choose a common myth associated with managed care. You may use one of the myths discussed in this week’s reading assignment, or come up with one on your own. Write a 2 page analysis on why you think this myth came about and why it still may be prevalent today. Explain to what degree the myth is based on facts, truths, and misunderstandings.
Summarize the evidence from research that counters or supports the premise of your myth. Conduct research in at least two sources, not including your textbook. Cite your sources using APA style guidelines.
Submit your completed assignment to the drop box below. Please check the Course Calendar for specific due dates.
Save your assignment as a Microsoft Word document. (Mac users, please remember to append the “.docx” extension to the filename.) The name of the file should be your first initial and last name, followed by an underscore and the name of the assignment, and an underscore and the date. An example is shown below:
Jstudent_exampleproblem_101504
[supanova_question]
[supanova_question]
Cumberlands Enterprise Risk Management and Investigative Forensics Discussion Computer Science Assignment Help
The readings this week discusses broad context of risk and investigative forensics. Part of risk management is to understand when things go wrong, we need to be able to investigate and report our findings to management. Using this research, or other research you have uncovered discuss in detail how risk and investigate techniques could work to help the organization. ERM helps to protect an organization before an attack, where as forensics investigate technique will help us after an attack – so lets discus both this week.
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
Cumberlands Enterprise Risk Management and Investigative Forensics Discussion Computer Science Assignment Help[supanova_question]
ELM 533 Alcorn State University Teacher Interview on Lesson Planning Questions Humanities Assignment Help
Assignment Content
[supanova_question]
Risk Management Capital Structure Financial Plan Capstone Economics Assignment Help
PART ONE (one citation and reference only) ***** Needed for Thursday ******
Systematic and Unsystematic Risk (250 words)
You are the Chief Risk Officer for a company and you’ve been tasked with identifying the areas where your company is exposed to systematic and unsystematic risks.
- what approach would you take in explaining how systematic and unsystematic risks affect risk planning?
- Describe your approach.
- Name 3 or more systematic or unsystematic risks your company might face.
- Think of some implications if your company decides not to be proactive and plan for these risks.
PART TWO (One citation and reference only)
Venture Capital (250 words)
You are a business consultant who works with new business owners. A new client wants to start a bakery and seeks your advice.
- Discuss the advantages and disadvantages of using venture capital as startup funding for a business.
- Describe what approach you would recommend for the client by using the information you researched.
- How does your approach differ from the recommendations of everyone else?
PART THREE (introduction, conclusion, citations, references, table, and graph)
Financial Plan (1200 words)
Prepare a financial plan for Johnson and Johnson (JNJ), versus an existing publicly traded company. This financial plan will be included in your final business plan in your capstone course. Be creative and think about a franchise or business that you have always wanted to create.
Describe the business that you would like to start, including the type of business (what industry, product offering, etc).
Create the business case, which is your justification of why the business is needed in the market.
- Determine why funding is needed for the company. (200 words)
- Determine the sources of funding. Considerself-funding, borrowing, equity, venture capital, etc.(200 words)
- Evaluate the requirements of each funding source you determined appropriate. (200 words)
- Analyze the associated risks of each funding source. (200 words)
- Decide which sources are the best fit for your company based on the requirements of each. Justify your decision. (200 words)
- Estimate the cost of capital for both short-term and long-term funding sources. Research current estimated APRs for your selected sources of funding. Consider creating a table or chart to display this information. (200 words)
Create a profit-and-loss statement for a 3-year period. Project revenue, stating realistic assumptions, such as growth per year, in your projections. You will have to develop these numbers and provide details.
Estimate direct costs, including capital, marketing, labor, and supply costs, which should be included in your P&L statements for all 3 years.
Avoid copying information from outside sources such as financial statements, illustrations, charts, or graphs.
[supanova_question]
BUSI 740 Liberty From Contract Manufacturer to Global Supply Chain Integrator Case Study Business Finance Assignment Help
Case Study 3 Instructions
Read the Solectron: From Contract Manufacturer to Global Supply Chain Integrator Case Study in the Simchi-Levi et al. text. Submit a response to each of the end-of-case discussion questions. Each question must be answered thoroughly, and responses must be supported by the concepts introduced in the reading/study materials. Each question/answer must be delineated under a heading in current APA format. Include a title page and reference page also in current APA format. Incorporate a minimum of 5 peer-reviewed sources with at least 1 source per question.
Submit this assignment by 11:59 p.m. (ET) on Sunday of Module/Week 5.
[supanova_question]
University of the Cumberlands Week 5 Leader Traits and Attributes Discussion Computer Science Assignment Help
After completing the reading this week, we reflect on a few key concepts this week:
- Discuss and identify leader traits and attributes that are most beneficial in implementing the best decisions in an organization.
- Explain the differences in charismatic and transformational leadership and how both leadership styles impact organizational effectiveness. Please note how these leadership styles affect implementing new innovative technologies.
- Review table 8.1 in the reading this week, note the work characteristics and the traditional versus high-performance focus, note which focus is best for strategic decisions and which is best for operational decisions. Please explain.
At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread. Please ensure to use information from your readings and other sources from the UC Library. Use APA references and in-text citations
[supanova_question]
https://anyessayhelp.com/