Marge’s Retail Store Network Infrastructure Threat Assessment

Take a look at the attachment. This gives you a visual of Marge’s retail store’s current IT infrastructure. Marge is looking to enhance her online sales but before she does she has called you to conduct a thorough threat assessment and recommend threat mitigations and controls prior to moving forward with the new project she is calling Using the Internet to Increase Sales.

Write a 3 to 5 page paper with proper APA formatting using the threat modeling techniques we have gone over thus far to uncover any threats that jump out from the attachment. Use critical thinking, look for information flows, exposures, vulnerabilities, and so on. Once you have identified threats suggest mitigations that would reduce the risk of those threats. Also, note that Marge is using a public IP space of 200.200.200.0/24 for the entire network infrastructure i.e. one Local Area Network.

You should at a minimum uncover 5 potential threats within this architecture.


 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

Employee Retention Plan 101 Forbes Article Review Discussion

Retention Plan

Prior to beginning this interactive assignment, review the Employee Retention 101: How to Keep a Talented Team Intact (Links to an external site.)Links to an external site. article. This is a small sampling of the content available on employee retention, how to keep employees satisfied, and how to avoid turnover. For this discussion, you are tasked with describing key factors in a retention plan. Your retention plan must include a minimum of five key points and strategies to retain employees in your organization. Describe your rationale for each strategy. Support your discussion with a minimum of one scholarly and/or credible sources.

Your initial post must be a minimum of 300 words.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

The Mexican Revolution discussion

this project is a 2 parter but the only part that should give you difficulty should be the paper the research Data forms should be fairly easy but the actual paper may proof to be more difficult but if you do have knowledge of the revolutions this should all be easy

copy of Research Data form #1 https://docs.google.com/document/d/1NF23vG-kIloVhQ…

copy of research data form #2 https://docs.google.com/document/d/1FUxu4pu9TI2hyn…

copy of research data form #3 https://docs.google.com/document/d/15fMJo_gaz4uCpJ…

these are the readings for the Research Data forms

reading #1 https://oakschristian.myschoolapp.com/ftpimages/12…

reading #2 https://oakschristian.myschoolapp.com/ftpimages/12…

reading #3 https://oakschristian.myschoolapp.com/ftpimages/12…

you do not have to use all of the readings you may use only one if you like and if there is a problem with anything please contact me on here.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

PSYCH331 CSU Fullerton Personal Opinion On Political Structure Of USA

turn the topics that i have and the answers in parentheses into a 3 page paper

  • Identify yourself
    • Socially ( introvert and realist)
    • Economically (lower middle class. my family and i struggled heavy when we first moved to Texas from California)
    • Politically/Philosophically ( democrat/ liberal and explain what that means to be a democrat and why i associate with this political party)
  • Your Perception of the Political Structure
    • Identify your place in this system
      • Do you belong ( i dont belong in this system because it wasnt made for black males like myself to)
      • Do you feel you belong? ( i do not feel like i belong in the system because the system was made for people of my color to fail)
      • Are you an American ( i am an american because this is where i was born and raised and i am ignorant about where in africa do my ancestors originate)
      • Are you a hyphenated American? ( i am a african- american so yes)
    • What is right with the system
      • Justify and support ( i appreciate that the system allows us to be anything we want and doesnt control what we do as long as its not deemed as unacceptable to the public, everybody can make a life for themselves in america)
    • What is wrong with the system
      • Where would you place the blame ( i place the blame in the founding fathers that didnt want to make the country accessible for people of my skin color)
      • Find support to justify what you think went wrong ( while the system allows us to be anything you want it makes it extremely hard to succeed as a minority this system is designed to keep minorities in jail and keep the family broken so the sons grow up and repeat the same cycle)
    • How you would fix or change the system
      • What is your ideology of perfecting the system? ( making the system equal for all to succeed so that no minority is singled out and everybody has the same opportunity to make the best life that they can)
      • What is your ideology to eliminate the present system? (realistically the only way to eliminate the present system would be to start over but i dont even think that it would work unless the previous generations die off so that no one remembers the old system and would try to have it put back in place)
  • In reference to this Course __________.
    • Who are you Politically? (democrat/liberal)
    • Who are you Ethnically? (an african american male)
 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

Community Health Work Internship Plan

Please post the plan for your internship as agreed upon by the Agency Preceptor, Student and Faculty.

use the plan below and the attachmendt


Revise & Update Senior Guide with ECH Social Worker, Lisa Burke

A variety of independent living products and services are now available to help seniors remain in their own homes despite their changing physical needs. This helps delay and, in many cases, will totally avoid moving into assisted living or nursing homes. Every senior is different and has a unique set of reasons for wanting to stay in their homes, but we have common reasons among seniors:

1. The physical stress of moving

2. The fear of losing independence

3. Anxiety over leaving a community

4. Emotional ties to the family home

5. The fear of the unknown

My Internship Plan focus on update, revise every possible source to help seniors to stay in their homes. My plan focus areas are:

  1. Assist with Biological, Psychological & Social Wellness needs
  2. Planning to Stay safe in Home includes: fall prevention, Personal care, Home chores, prepare meals and money management.
  3. Health care includes: Health Insurance, Medical Appointment, Medication
  4. Legal Services and Financial assistance

References to my plan sources

  1. Federal Government sources
  2. Mayo Clinic
  3. Southeastern Minnesota Area Agency on Aging
  4. Aging and Disability Resource Centers
  5. Senior LinkAge Line
 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

Business assignment 3 – Burger King

Burger King, the national franchise, is banned from opening a restaurant within 20 miles of Mattoon, Illinois. So, there is not a Burger King there; no problem, right? Not so fast! In the late 1950s, Gene and Betty Hoots trademarked the iconic name. Well, they trademarked it in Illinois at least. When the national company decided to open a chain close by, the Hoots sued and won their case. However, the national chain was able to keep the name Burger King, but the Hoots were also able to keep the name in accordance with the stipulation that the national chain could not open a store within a 20-mile radius of the original store in Mattoon, Illinois.

In a minimum of 500 words, explain the reasons why this decision was made, and discuss the significance of this case in U.S. trademark law jurisprudence.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

You are a mystery shopper

(Part C of final project).

Instructions: Follow carefully

Complete & submit your report here.

1. Download the Mystery Shopping Questionnaire (Word document) and go mystery shop your chosen establishment. Remember that you are utilizing a manager’s or entrepreneur’s point of view and you are preparing to present a business report that your VP or CEO will likely see.

Utilizing the information gathered in the questionnaire, create

2. a one to two page report in APA format summarizing your findings, with recommendations for improvement and/or recognition; whatever is applicable to the different areas of your assessment of the business.

3. a PowerPoint Presentation with a minimum of 8 slides, summarizing your findings. Include pictures if possible, do not write paragraphs, use bullets and prepare presentation as if you were presenting to the CEO and senior management team.

It is essential that you use business terms, correct grammar and proofread your presentation and paper for errors. Check resources on how to create a good business PowerPoint presentation – remember you are a business professional.

Upload or submit here ………………………….

  1. the completed questionnaire
  2. one to two page report
  3. PowerPoint presentation

All three (3) items must be uploaded in order to receive full credit.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

Introduction to Information Security Exercises

Exercise – Chapter 1 (pg. 45)

  1. Look up “the paper that started the study of computer security.” Prepare a summary of the key points. What in this paper specifically addresses security in previously unexamined areas?

Exercise – Chapter 2 (pg. 117)

  • 1.Consider that an individual threat agent, like a hacker, can be a factor in more than one threat category. If a hacker breaks into a network, copies a few files, defaces a Web page, and steals credit card numbers, how many different threat categories does the attack fall into? Explain each threat category.
 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

cybersecurity question

1. “Managing Network Security Through Policies” Please respond to the following:

  • Analyze the importance of having acceptable use policies, remote access policies, and network security control policies. Choose one acceptable use policy, remote access policy, or network security control policy and give three reasons why you believe this policy is an effective way to manage network security.
  • Assess the risks and threats that may occur if these policies are underdeveloped or unavailable. Recommend three technical appliances that may be used to implement a network security function within your assessment and justify your recommendations.

2. “Developing Personnel Security” Please respond to the following:

  • Determine three reasons why an organization should define the boundaries of control, identify personnel security functions based on risks, and manage change within the work force. Select what you believe to be the most important reason and explain why.
  • Propose three activities that could be performed by the Human Resources Department to screen and hire personnel effectively. Choose one activity you proposed and justify how it would support personnel security functions.

3. “Designing Effective Physical Security” Please respond to the following:

  • Outline three parameters that should be considered when designing and implementing physical security into the information protection scheme. Suggest two activities that could be performed to address these parameters and explain how.
  • Suggest three activities that could be performed to ensure that physical security plans are adequate. Describe two measures that you could perform in order to evaluate the installed physical security.

4. “Planning Procurements Effectively” Please respond to the following:

  • Select what you believe to be the top-three benefits of making a business and assurance case prior to proceeding with a procurement plan. Support your response with a rationale. Describe potential challenges that the procurement process may experience by not having a proper business and assurance case.
  • Recommend two practices that should be performed when administering procurement contracts and explain why you recommend them. Determine how these practices will ensure that subcontractors fully comply with the requirements of the contract within your recommendation.

5. “Meeting Compliance Requirements” Please respond to the following:

  • Propose three factors that should be considered when designing policies for legal and regulatory compliance. Determine how each factor would minimize liability for the organization.
  • Outline the steps required in order to define what is needed to meet compliance requirements. Determine the most important step in this process and support your answer with a rationale.

6. “Developing Risk Management Best Practices” Please respond to the following:

  • Analyze a well-designed risk management plan to determine how it can prevent risk and control residual risk. Identify what you believe to be the most important step in the risk management process and explain why.
  • Construct two examples that demonstrate how qualitative and quantitative methods could be applied to measure risk and prioritize risk responses. Recommend two factors that should be considered when prioritizing risk responses.
 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

Introduction to Information security

Exercise – Chapter 1 (pg. 45)

  1. Look up “the paper that started the study of computer security.” Prepare a summary of the key points. What in this paper specifically addresses security in previously unexamined areas?

Exercise – Chapter 2 (pg. 117)

  • 1.Consider that an individual threat agent, like a hacker, can be a factor in more than one threat category. If a hacker breaks into a network, copies a few files, defaces a Web page, and steals credit card numbers, how many different threat categories does the attack fall into? Explain each threat category.
 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"