Description
1. the essay should be 1.5 space and 10ty size.
2.I m not a native speaker so please try not to use some professional vocabularies.
3.(choose a topic related with environment and argue about it based on the essay and source I uploaded)
thank you
Unformatted Attachment Preview
Kapton water crisis research
Kapton Town is the big city where located on the southern tip of South Africa. It is a
prosperous metropolis, a well-managed global tourist destination responsible for 9.9% of
South Africa's GDP, full of multimillion-dollar beach-front properties, art museums and
two of the world's top 50 restaurants. But because of the government's lack of
management on water resource and perennial drought, Kapton is experiencing a water
crisis now; People are limited to using 13 gallons of water per person per day which also
means that Cape Town becomes the first modern major city in the world to completely
run dry.
People who are living in Kapton city have to use all kinds of way of saving water to
maintain the minimum standard. For example, after they brush their teeth must be
collected and put into a bucket. What's more, not only brushing teeth but in this crisis of
water resources, they collect water resources in various aspects of their lives and then use
the waste water to flush the toilets since they are in the current situation of urban water
resources. The amount of water was used for the toilet is also less than one-third of the
original.
In this article's video, we saw the average amount of water used by each activity in our
daily life. For example, 2-3 gallons persin, 2-5 gallons per mint while we were taking a
shower. That is, some people may take a shower for three minutes, but the same amount
of water can be used for resident of Cape Town one day. As the article said, Cape Town
may be the first major city to suffer from water shortage. If we do not take timely
measures to save water, 3.5 billion people will live in water-scarce areas.
Cape Town is not the only city that facing water crisis in the world. Thousands of regions
around the world are facing the threat of water resources as well. This also shows that we
are all facing different levels of water threats on a global scale, and each of us can
indirectly help these water-poor areas by saving unnecessary waste of water in our daily
life.
Name:
Instructor:
Class:
Sources
https://water.org/our-impact/water-crisis/
http://time.com/cape-town-south-africa-water-crisis/
https://www.cnbc.com/2018/04/11/cape-town-water-crisis-cities-should-prepare-for-waterscarcity.html
https://www.outsideonline.com/2295791/what-does-cape-towns-water-crisis-look
III
III
• • POSITION
PAPER 2-3 pages
Must Be Speustecken, GRAMMAR
4+ REFERENCES
EXPLAIN YOUR POSITION
s
EXPERIN TOPIC
EAS PAPER IS NOT
ABOUT YOUR POSTEX
PAPER DOES NOT EXPLAIN
POSTER
Purchase answer to see full attachment
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
halo buddy, please fin...
Completion Status:
100%
Review
Review
Anonymous
Very useful material for studying!
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Cryptography
HI,I need Network Security Vulnerability and Threat Table, Common Access Card Deployment Strategy, and Email Security Stra ...
Cryptography
HI,I need Network Security Vulnerability and Threat Table, Common Access Card Deployment Strategy, and Email Security Strategy. Create a single report in Word document format. This report should be about 10 pages long, double-spaced, with citations in APA format. Page count does not include diagrams or tables. The report must cover the following:network security and threat tableCommon Access Card deployment strategye-mail security strategyI will include the treat table template and Strategy paper outline. Everything in the suggested outline needs to be in the papers. I highlighed the specific things that needs to be in papers.You are an enterprise security architect for a company in a semiconductor manufacturing industry where maintaining competitive advantage and protecting intellectual property is vital. You're in charge of security operations and strategic security planning. Your responsibilities include devising the security protocols for identification, access, and authorization management. You recently implemented cryptography algorithms to protect the information organization. Leadership is pleased with your efforts and would like you to take protection methods even further. They've asked you to study cyberattacks against different cryptography mechanisms and deploy access control programs to prevent those types of attacks. We'd like you to create plans for future security technology deployments, says one senior manager. And provide documentation so that others can carry out the deployments. A director chimes in, but you should also devise a method for ensuring the identification, integrity, and nonrepudiation of information in transit at rest and in use within the organization. As the enterprise security architect, you are responsible for providing the following deliverables. Create a network security vulnerability and threat table in which you outline the security architecture of the organization, the cryptographic means of protecting the assets of the organizations, the types of known attacks against those protections, and means to ward off the attacks. This document will help you manage the current configuration of the security architecture. Create a Common Access Card, CAC deployment strategy, in which you describe the CAC implementation and deployment and encryption methodology for information security professionals. Create an email security strategy in which you provide the public key, private key hashing methodology to determine the best key management system for your organization. These documents will provide a security overview for the leadership in your company. Encryption uses cryptographic algorithms to obfuscate data. These complex algorithms transform data from human readable plaintext into encrypted cipher text. Encryption uses the principles of substitution and permutation to ensure that data is transformed in a non-deterministic manner by allowing the user to select the password or a key to encrypt a message. The recipient must know the key in order to decrypt the message, translating it back into the human readable plaintext. There are six steps that will lead you through this project. After beginning with the workplace scenario, continue to Step 1: "IT Systems Architecture." The deliverables for this project are as follows: Create a single report in Word document format. This report should be about 10 pages long, double-spaced, with citations in APA format. Page count does not include diagrams or tables. The report must cover the following:network security and threat tableCommon Access Card deployment strategye-mail security strategyIn a Word document, share your lab experience and provide screenshots to demonstrate that you performed the lab. When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission. 1.5: Use sentence structure appropriate to the task, message and audience.1.6: Follow conventions of Standard Written English.1.7: Create neat and professional looking documents appropriate for the project or presentation.2.1: Identify and clearly explain the issue, question, or problem under critical consideration.2.2: Locate and access sufficient information to investigate the issue or problem.2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.2.4: Consider and analyze information in context to the issue or problem.3.2: Employ mathematical or statistical operations and data analysis techniques to arrive at a correct or optimal solution.5.1: Knowledge of procedures, tools, and applications used to keep data or information secure, including public key infrastructure, point-to-point encryption, and smart cards. Step 1: IT Systems Architecture You are a senior-level employee and you must tailor your deliverables to suit your audience: the leadership of the organization. You may choose to use a fictitious organization, or model your organization on an existing organization, including proper citations. Leadership is not familiar with the architecture of the IT systems, nor are they familiar with the types of threats that are likely or the security mechanisms in place to ward off those threats. You will provide this information in tabular format and call it the Network Security and Vulnerability Threat Table. Refer to this threat table template for guidance on creating this document. Before you begin, select the links below to review some material on information security. These resources will help you complete the network security and vulnerability threat table. LAN securityAvailability Now you’re ready to create your table. Include and define the following components of security in the architecture of your organization, and explain if threats to these components are likely, or unlikely: LAN securityidentity managementphysical securitypersonal securityavailabilityprivacy Next, review the different types of cyberattacks described in the following resource: cyberattacks. As you’re reading take note of which attacks are most likely to affect your organization. Then list the security defenses you employ in your organization to mitigate these types of attacks. Include this information in your Network Security and Vulnerability Threat Table. Step 2: Plan of Protection You will have to provide the leadership of your organization with your plan for protecting identity, access, authorization and nonrepudiation of information transmission, storage, and usage. Research scholarly works on nonrepudiation measures and discuss options for protecting the integrity of an organization's information assets, which include files, networks, databases, and e-mail, and include this in your lab report. Step 3: Data Hiding Technologies You will describe to your organization the various cryptographic means of protecting its assets. Select the links below to review encryption techniques and encryption technologies, then provide your organization with a brief overview of each. Encryption Technologies Shift / Caesar cipherPolyalphabetic cipherOne time pad cipher/Vernam cipher/perfect cipherBlock cipherstriple DESRSAAdvanced Encryption Standard (AES)Symmetric encryptionText block coding Data Hiding Technologies Information hiding and steganographyDigital watermarkingMasks and filtering These descriptions will be included in the network security vulnerability and threat table for leadership. Step 4: Creating the Network Security Vulnerability and Threat Table Using the information you've gathered from the previous steps, prepare the network security vulnerability and threat table, in which you outline the following: security architecture of the organizationthe cryptographic means of protecting the assets of the organizationthe types of known attacks against those types of protectionsmeans to ward off the attacks Create your Network Security Vulnerability and Threat Table, and include it in your submission to the organization. Please refer to this threat table template for guidance on creating this document. Step 5: Access Control Based on Smart Card Strategies Smart cards use encryption chips to identify the user, their identity, role, and sometimes use their personal identifiable information (PII). Two examples of smart cards are the federal government’s use of common access cards (CACs), and the financial sector’s use of encryption chips in credit cards. You have completed your threat table, and you've decided that you want to modernize the access control methods for your organization. To that end, you read the following resources to gather some background information on access control and the various encryption schemas associated with the Common Access Card (CAC): Access controlCommon access Card (CAC) You plan to deploy CAC to the company and you are tasked with devising that CAC deployment strategy, which includes the cryptographic solutions used with the CAC. In the Common Access Card Deployment Strategy final deliverable, describe how identity management would be a part of your overall security program and your CAC deployment plan: Create your Common Access Card Deployment Strategy and include it in your submission to the organization. Step 6: The Email Security Strategy After completing the CAC, your next step is to build the Secure Email Strategy for the organization. You will present this tool to your leadership. Provide an overview of the types of public-private key pairing, and show how this provides authentication and nonrepudiation. You will also add hashing, and describe how this added security benefit ensures the integrity of messaging. Begin preparing your strategy by reviewing the following resources that will aid you in becoming well informed on encryption technologies for e-mail: Public Key Infrastructure (PKI)iOS encryptionBlackberry encryption Then start developing your strategy. Define these strong encryption technologies as general principles in secure email: Pretty Good Policy (PGP algorithm) GNU Privacy Guard (GPG)Public Key Infrastructure (PKI)Digital signatureMobile device encryption (e.g., iOS encryption and Blackberry encryption) In your report, also consider how the use of smart card readers tied to computer systems might be beneficial in the future enhancements to system and data access protection. This may help you define long-term solutions for your leadership. Leadership does not know the costs and technical complexity of these email encryption strategies. To further their understanding, compare the complexities of each in relation to the security benefits, and then make a recommendation and a deployment plan. The deliverables for this project are as follows: Create a single report in Word document format. This report should be about 10 pages long, double-spaced, with citations in APA format. Page count does not include diagrams or tables. The report must cover the following:network security and threat tableCommon Access Card deployment strategye-mail security strategyIn a Word document, share your lab experience and provide screenshots to demonstrate that you performed the lab. Submit your deliverables to the assignment folder. Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work. 1.5: Use sentence structure appropriate to the task, message and audience.1.6: Follow conventions of Standard Written English.1.7: Create neat and professional looking documents appropriate for the project or presentation.2.1: Identify and clearly explain the issue, question, or problem under critical consideration.2.2: Locate and access sufficient information to investigate the issue or problem.2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.2.4: Consider and analyze information in context to the issue or problem.3.2: Employ mathematical or statistical operations and data analysis techniques to arrive at a correct or optimal solution.5.1: Knowledge of procedures, tools, and applications used to keep data or information secure, including public key infrastructure, point-to-point encryption, and smart cards. Submission for Network Security Vulnerability and Threat Table, Common Access Card Deployment Strategy, and Email Security Strategy
OL 125O Southern New Hampshire University Tricky Negotiations Discussion & Reponses
View this interactive discussion scenario and answer the question(s) posed at the end of the presentation.
The video link ...
OL 125O Southern New Hampshire University Tricky Negotiations Discussion & Reponses
View this interactive discussion scenario and answer the question(s) posed at the end of the presentation.
The video link includes a notes tab which provides the transcript to the video.
5-3 Discussion: Tricky Negotiations
Antonya Santos posted Feb 5, 2020 11:34 AM
For my first self-assessment how good are you at people skills? I scored a 58. In all honesty I thought my score would be much higher since I have been working with people since the age of 13. I believe I am better working with people and then the self-assessment says. For the second self-assessment how good is your anger management? I scored a 77. I am very aware of what makes me angry and I try to avoid those things in the workplace I will control my anger to an extreme extent, in order to stay professional. I cannot say the same for my personal life but I work on it.
No dealing with the Ed scenario, if I were him I would talk to the staff personally. I would explain to them everyone can't have the day off I don't want to be working on memorial day but guess what I have to do. I will take everyone's personal life into consideration and come up with the best plan possible for the employees who actually need a day off. In my personal life this scenario has happened and life isn't fair all the time I have had to work on days I did not want to whatsoever including my birthday, fourth of July and Memorial Day. I was annoyed when I had to work on my birthday but guess what that's life. When talking to the staff I will pick people who don't have serious commitments on that day and if they don't show up they will get fired. Regarding the I will quit statement, work is an obligation and as a manager I will take into every consideration possible to make sure personal needs are met but at the end of the day a job is a job and staff members have to understand a business can't run without its team members.
POST 1
2nd classmate response needed.5-3: Tricky NegotiationsGabrielle Hernandez posted Feb 6, 2020 4:17 PMHello Everyone,On the first assessment I scored a 56. Seems about right that I can work with other people but there is numerous ways I can improve myself. I have been working by myself in an office for about 5-6 years and finally received help. These modules gave a lot of information to learn how to work with my new co workers and other departments in the future. On the anger assessment I scored a 64. It states I can manage my anger and I need a better understanding and what makes the anger occur. There are many moments I have been frustrated to the point of walking out. I taught myself to be more patient with my family co workers. We tend to bicker but with the help of communicating more there has been a lot less incidents like that. Funny the anger topic came up only because it might be a weak point for myself. Again the module taught me basic ways to work on them personally.Ed is in a tough situation but can be handled in an easy and professional manner. First I would like to state I think there should be a PTO/Vacation policy in place for all employees and noted during the hiring process or probation period. Since there was no policy placed, after the holiday weekend Ed should request a meeting to his supervisors on their thoughts about request time off. In the policy it should be stated the time frame an employee has time to request the days. In this case it sounds like Ed was only given a week or couple days notice. I think Ed should explain to all employees who put in a request that not everyone will be approved. In the explanation Ed needs to state because of the holiday and busy hours it is impossible to keep a store open with on a short staff. Disciplinary actions will be followed if non approved employees don't show up for their shift. Ed should give the seniority and approved reasons to the employees who asked for the days off. Communication and explanation will be the best action Ed can take so he doesn't have as many disappointed employees as it may seem.
Strayer University My Passion for The Environment Essay
Part 1What Is Your Passion?In the article Eight Ways to Find the True Passion in Life That Has Eluded You, Rebecca Burn-Ca ...
Strayer University My Passion for The Environment Essay
Part 1What Is Your Passion?In the article Eight Ways to Find the True Passion in Life That Has Eluded You, Rebecca Burn-Callander outlines 8 steps to discovering your true passion. If you were given the opportunity to dedicate the rest of your life to one specific activity, without having to worry about money, what activity would you choose? How would you impact the world by taking on this activity? What can you conclude?Part 2: Respond to Erica StewartGood morning class,If I could pick one specific activity that I would choose to do without having to worry about money, it would be catering to shelter dogs. Animals (specifically dogs) are my passion, and I love everything about them. I love them so much that I will go volunteer every day just to give the dogs some fun time. I would take this passion and impact the world by fighting to make all shelters no-kill shelters. It is completely inhumane to kill a dog simply because no one wants to adopt them. How is death the right option? Is it space? Is it money? At the end of the day, that is ridiculous and ludicrous. So, I will aspire to make that change in the world one day. Thank you!
BHS Clinical psychology done in 48 hours, no plagiarism
Assignment 4.1: Motivation and Motivation Strategies
Motivation and Motivation Strategies
OBJECTIVES
Describe the theories ...
BHS Clinical psychology done in 48 hours, no plagiarism
Assignment 4.1: Motivation and Motivation Strategies
Motivation and Motivation Strategies
OBJECTIVES
Describe the theories and perspectives on motivation
Identify the different types of motivation and their nature
ASSIGNMENT OVERVIEW
This reaction and response assignment explores theories, perspectives, and types of motivation.
DELIVERABLES
A one-page (12-point font) paper
Step 1 Review the major theories of motivation.
Review the major theories of motivation in this lesson and in at least two articles. For example, you might read these articles:
Theories of Human Motivation
Employee Motivation
Step 2 Answer the questions.
Answer the following questions:
What is motivating you to attend school?
What motivates you generally? Consider the arousal, incentive, and self-determination theories.
Where do you fall in Maslow's Hierarchy of Needs?
What strategies do you use to motivate yourself?
Step 3 Report your findings.
4 pages
Adam Piore Journal Upload 11
The intended audience in this article is individuals who feel that owning more space and stuff defines happiness. In this ...
Adam Piore Journal Upload 11
The intended audience in this article is individuals who feel that owning more space and stuff defines happiness. In this speech, Graham addresses the ...
12 pages
Cards For Math Concepts
To count a group of objects then make a match to the correct number - Label the each of the cups in the egg carton with a ...
Cards For Math Concepts
To count a group of objects then make a match to the correct number - Label the each of the cups in the egg carton with a number
Similar Content
University of The District of Columbia Drama Visual Aid Analysis Paper
SUBMISSION PROPOSAL TO ME ENTITLED “DRAMA PRESENTATION SELECTION.” PROVIDE: TITLE OF ASSIGNMENT: DRAMA VISUAL AID: S...
RUN Manufacturing Sneakers from A Sustainable Factory Essay
This week I would like you to select a design you are familiar with (building, product, clothing, etc.), and explain five ...
Career Institute of Florida Spring Hill Mental Training in Sports Psychology Essay
Analyze research in sport and exercise psychology using applied case studies and real-world scenariosChoose a journal arti...
editing an essay
Part 5 is the final version of your Literature Review. This 1,200 – 1,400-word final draft should include (1) an introdu...
ENG124 Cuyamaca College Comics and Modernism Article Discussion
Now that you have read at least 3 of the 5 12.7 Critical Approach Scholarly Articles, address the following:Which approach...
short answer response
SCS 100 Learning Block 6-2 Short Answer Rubric
Prompt: Reflect on the concepts presented in the video and overview and the...
Business Start Up 1 1
The process of setting up a business and ways of obtaining financial support that will be used to take care of the startin...
Pleasureco.edited
The Pleasure of My Company comparison to Catcher in the Rye An individual may be living in isolation without realizing it,...
Plato Paper 1
This paper is about the link that exists between democracy and tyranny according to the doctrine of Plato. Democracy is of...
Related Tags
Book Guides
The Scarlet Letter
by Nathaniel Hawthorne
The Great Gatsby
by Francis Scott Key Fitzgerald
The Second Sex
by Simone de Beauvoir
A Separate Peace
by John Knowles
Twilight
by Stephenie Meyer
The Road
by Cormac McCarthy
The Odyssey
by Homer
The Grapes of Wrath
by John Steinbeck
Fools Crow
by James Welch
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Cryptography
HI,I need Network Security Vulnerability and Threat Table, Common Access Card Deployment Strategy, and Email Security Stra ...
Cryptography
HI,I need Network Security Vulnerability and Threat Table, Common Access Card Deployment Strategy, and Email Security Strategy. Create a single report in Word document format. This report should be about 10 pages long, double-spaced, with citations in APA format. Page count does not include diagrams or tables. The report must cover the following:network security and threat tableCommon Access Card deployment strategye-mail security strategyI will include the treat table template and Strategy paper outline. Everything in the suggested outline needs to be in the papers. I highlighed the specific things that needs to be in papers.You are an enterprise security architect for a company in a semiconductor manufacturing industry where maintaining competitive advantage and protecting intellectual property is vital. You're in charge of security operations and strategic security planning. Your responsibilities include devising the security protocols for identification, access, and authorization management. You recently implemented cryptography algorithms to protect the information organization. Leadership is pleased with your efforts and would like you to take protection methods even further. They've asked you to study cyberattacks against different cryptography mechanisms and deploy access control programs to prevent those types of attacks. We'd like you to create plans for future security technology deployments, says one senior manager. And provide documentation so that others can carry out the deployments. A director chimes in, but you should also devise a method for ensuring the identification, integrity, and nonrepudiation of information in transit at rest and in use within the organization. As the enterprise security architect, you are responsible for providing the following deliverables. Create a network security vulnerability and threat table in which you outline the security architecture of the organization, the cryptographic means of protecting the assets of the organizations, the types of known attacks against those protections, and means to ward off the attacks. This document will help you manage the current configuration of the security architecture. Create a Common Access Card, CAC deployment strategy, in which you describe the CAC implementation and deployment and encryption methodology for information security professionals. Create an email security strategy in which you provide the public key, private key hashing methodology to determine the best key management system for your organization. These documents will provide a security overview for the leadership in your company. Encryption uses cryptographic algorithms to obfuscate data. These complex algorithms transform data from human readable plaintext into encrypted cipher text. Encryption uses the principles of substitution and permutation to ensure that data is transformed in a non-deterministic manner by allowing the user to select the password or a key to encrypt a message. The recipient must know the key in order to decrypt the message, translating it back into the human readable plaintext. There are six steps that will lead you through this project. After beginning with the workplace scenario, continue to Step 1: "IT Systems Architecture." The deliverables for this project are as follows: Create a single report in Word document format. This report should be about 10 pages long, double-spaced, with citations in APA format. Page count does not include diagrams or tables. The report must cover the following:network security and threat tableCommon Access Card deployment strategye-mail security strategyIn a Word document, share your lab experience and provide screenshots to demonstrate that you performed the lab. When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission. 1.5: Use sentence structure appropriate to the task, message and audience.1.6: Follow conventions of Standard Written English.1.7: Create neat and professional looking documents appropriate for the project or presentation.2.1: Identify and clearly explain the issue, question, or problem under critical consideration.2.2: Locate and access sufficient information to investigate the issue or problem.2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.2.4: Consider and analyze information in context to the issue or problem.3.2: Employ mathematical or statistical operations and data analysis techniques to arrive at a correct or optimal solution.5.1: Knowledge of procedures, tools, and applications used to keep data or information secure, including public key infrastructure, point-to-point encryption, and smart cards. Step 1: IT Systems Architecture You are a senior-level employee and you must tailor your deliverables to suit your audience: the leadership of the organization. You may choose to use a fictitious organization, or model your organization on an existing organization, including proper citations. Leadership is not familiar with the architecture of the IT systems, nor are they familiar with the types of threats that are likely or the security mechanisms in place to ward off those threats. You will provide this information in tabular format and call it the Network Security and Vulnerability Threat Table. Refer to this threat table template for guidance on creating this document. Before you begin, select the links below to review some material on information security. These resources will help you complete the network security and vulnerability threat table. LAN securityAvailability Now you’re ready to create your table. Include and define the following components of security in the architecture of your organization, and explain if threats to these components are likely, or unlikely: LAN securityidentity managementphysical securitypersonal securityavailabilityprivacy Next, review the different types of cyberattacks described in the following resource: cyberattacks. As you’re reading take note of which attacks are most likely to affect your organization. Then list the security defenses you employ in your organization to mitigate these types of attacks. Include this information in your Network Security and Vulnerability Threat Table. Step 2: Plan of Protection You will have to provide the leadership of your organization with your plan for protecting identity, access, authorization and nonrepudiation of information transmission, storage, and usage. Research scholarly works on nonrepudiation measures and discuss options for protecting the integrity of an organization's information assets, which include files, networks, databases, and e-mail, and include this in your lab report. Step 3: Data Hiding Technologies You will describe to your organization the various cryptographic means of protecting its assets. Select the links below to review encryption techniques and encryption technologies, then provide your organization with a brief overview of each. Encryption Technologies Shift / Caesar cipherPolyalphabetic cipherOne time pad cipher/Vernam cipher/perfect cipherBlock cipherstriple DESRSAAdvanced Encryption Standard (AES)Symmetric encryptionText block coding Data Hiding Technologies Information hiding and steganographyDigital watermarkingMasks and filtering These descriptions will be included in the network security vulnerability and threat table for leadership. Step 4: Creating the Network Security Vulnerability and Threat Table Using the information you've gathered from the previous steps, prepare the network security vulnerability and threat table, in which you outline the following: security architecture of the organizationthe cryptographic means of protecting the assets of the organizationthe types of known attacks against those types of protectionsmeans to ward off the attacks Create your Network Security Vulnerability and Threat Table, and include it in your submission to the organization. Please refer to this threat table template for guidance on creating this document. Step 5: Access Control Based on Smart Card Strategies Smart cards use encryption chips to identify the user, their identity, role, and sometimes use their personal identifiable information (PII). Two examples of smart cards are the federal government’s use of common access cards (CACs), and the financial sector’s use of encryption chips in credit cards. You have completed your threat table, and you've decided that you want to modernize the access control methods for your organization. To that end, you read the following resources to gather some background information on access control and the various encryption schemas associated with the Common Access Card (CAC): Access controlCommon access Card (CAC) You plan to deploy CAC to the company and you are tasked with devising that CAC deployment strategy, which includes the cryptographic solutions used with the CAC. In the Common Access Card Deployment Strategy final deliverable, describe how identity management would be a part of your overall security program and your CAC deployment plan: Create your Common Access Card Deployment Strategy and include it in your submission to the organization. Step 6: The Email Security Strategy After completing the CAC, your next step is to build the Secure Email Strategy for the organization. You will present this tool to your leadership. Provide an overview of the types of public-private key pairing, and show how this provides authentication and nonrepudiation. You will also add hashing, and describe how this added security benefit ensures the integrity of messaging. Begin preparing your strategy by reviewing the following resources that will aid you in becoming well informed on encryption technologies for e-mail: Public Key Infrastructure (PKI)iOS encryptionBlackberry encryption Then start developing your strategy. Define these strong encryption technologies as general principles in secure email: Pretty Good Policy (PGP algorithm) GNU Privacy Guard (GPG)Public Key Infrastructure (PKI)Digital signatureMobile device encryption (e.g., iOS encryption and Blackberry encryption) In your report, also consider how the use of smart card readers tied to computer systems might be beneficial in the future enhancements to system and data access protection. This may help you define long-term solutions for your leadership. Leadership does not know the costs and technical complexity of these email encryption strategies. To further their understanding, compare the complexities of each in relation to the security benefits, and then make a recommendation and a deployment plan. The deliverables for this project are as follows: Create a single report in Word document format. This report should be about 10 pages long, double-spaced, with citations in APA format. Page count does not include diagrams or tables. The report must cover the following:network security and threat tableCommon Access Card deployment strategye-mail security strategyIn a Word document, share your lab experience and provide screenshots to demonstrate that you performed the lab. Submit your deliverables to the assignment folder. Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work. 1.5: Use sentence structure appropriate to the task, message and audience.1.6: Follow conventions of Standard Written English.1.7: Create neat and professional looking documents appropriate for the project or presentation.2.1: Identify and clearly explain the issue, question, or problem under critical consideration.2.2: Locate and access sufficient information to investigate the issue or problem.2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.2.4: Consider and analyze information in context to the issue or problem.3.2: Employ mathematical or statistical operations and data analysis techniques to arrive at a correct or optimal solution.5.1: Knowledge of procedures, tools, and applications used to keep data or information secure, including public key infrastructure, point-to-point encryption, and smart cards. Submission for Network Security Vulnerability and Threat Table, Common Access Card Deployment Strategy, and Email Security Strategy
OL 125O Southern New Hampshire University Tricky Negotiations Discussion & Reponses
View this interactive discussion scenario and answer the question(s) posed at the end of the presentation.
The video link ...
OL 125O Southern New Hampshire University Tricky Negotiations Discussion & Reponses
View this interactive discussion scenario and answer the question(s) posed at the end of the presentation.
The video link includes a notes tab which provides the transcript to the video.
5-3 Discussion: Tricky Negotiations
Antonya Santos posted Feb 5, 2020 11:34 AM
For my first self-assessment how good are you at people skills? I scored a 58. In all honesty I thought my score would be much higher since I have been working with people since the age of 13. I believe I am better working with people and then the self-assessment says. For the second self-assessment how good is your anger management? I scored a 77. I am very aware of what makes me angry and I try to avoid those things in the workplace I will control my anger to an extreme extent, in order to stay professional. I cannot say the same for my personal life but I work on it.
No dealing with the Ed scenario, if I were him I would talk to the staff personally. I would explain to them everyone can't have the day off I don't want to be working on memorial day but guess what I have to do. I will take everyone's personal life into consideration and come up with the best plan possible for the employees who actually need a day off. In my personal life this scenario has happened and life isn't fair all the time I have had to work on days I did not want to whatsoever including my birthday, fourth of July and Memorial Day. I was annoyed when I had to work on my birthday but guess what that's life. When talking to the staff I will pick people who don't have serious commitments on that day and if they don't show up they will get fired. Regarding the I will quit statement, work is an obligation and as a manager I will take into every consideration possible to make sure personal needs are met but at the end of the day a job is a job and staff members have to understand a business can't run without its team members.
POST 1
2nd classmate response needed.5-3: Tricky NegotiationsGabrielle Hernandez posted Feb 6, 2020 4:17 PMHello Everyone,On the first assessment I scored a 56. Seems about right that I can work with other people but there is numerous ways I can improve myself. I have been working by myself in an office for about 5-6 years and finally received help. These modules gave a lot of information to learn how to work with my new co workers and other departments in the future. On the anger assessment I scored a 64. It states I can manage my anger and I need a better understanding and what makes the anger occur. There are many moments I have been frustrated to the point of walking out. I taught myself to be more patient with my family co workers. We tend to bicker but with the help of communicating more there has been a lot less incidents like that. Funny the anger topic came up only because it might be a weak point for myself. Again the module taught me basic ways to work on them personally.Ed is in a tough situation but can be handled in an easy and professional manner. First I would like to state I think there should be a PTO/Vacation policy in place for all employees and noted during the hiring process or probation period. Since there was no policy placed, after the holiday weekend Ed should request a meeting to his supervisors on their thoughts about request time off. In the policy it should be stated the time frame an employee has time to request the days. In this case it sounds like Ed was only given a week or couple days notice. I think Ed should explain to all employees who put in a request that not everyone will be approved. In the explanation Ed needs to state because of the holiday and busy hours it is impossible to keep a store open with on a short staff. Disciplinary actions will be followed if non approved employees don't show up for their shift. Ed should give the seniority and approved reasons to the employees who asked for the days off. Communication and explanation will be the best action Ed can take so he doesn't have as many disappointed employees as it may seem.
Strayer University My Passion for The Environment Essay
Part 1What Is Your Passion?In the article Eight Ways to Find the True Passion in Life That Has Eluded You, Rebecca Burn-Ca ...
Strayer University My Passion for The Environment Essay
Part 1What Is Your Passion?In the article Eight Ways to Find the True Passion in Life That Has Eluded You, Rebecca Burn-Callander outlines 8 steps to discovering your true passion. If you were given the opportunity to dedicate the rest of your life to one specific activity, without having to worry about money, what activity would you choose? How would you impact the world by taking on this activity? What can you conclude?Part 2: Respond to Erica StewartGood morning class,If I could pick one specific activity that I would choose to do without having to worry about money, it would be catering to shelter dogs. Animals (specifically dogs) are my passion, and I love everything about them. I love them so much that I will go volunteer every day just to give the dogs some fun time. I would take this passion and impact the world by fighting to make all shelters no-kill shelters. It is completely inhumane to kill a dog simply because no one wants to adopt them. How is death the right option? Is it space? Is it money? At the end of the day, that is ridiculous and ludicrous. So, I will aspire to make that change in the world one day. Thank you!
BHS Clinical psychology done in 48 hours, no plagiarism
Assignment 4.1: Motivation and Motivation Strategies
Motivation and Motivation Strategies
OBJECTIVES
Describe the theories ...
BHS Clinical psychology done in 48 hours, no plagiarism
Assignment 4.1: Motivation and Motivation Strategies
Motivation and Motivation Strategies
OBJECTIVES
Describe the theories and perspectives on motivation
Identify the different types of motivation and their nature
ASSIGNMENT OVERVIEW
This reaction and response assignment explores theories, perspectives, and types of motivation.
DELIVERABLES
A one-page (12-point font) paper
Step 1 Review the major theories of motivation.
Review the major theories of motivation in this lesson and in at least two articles. For example, you might read these articles:
Theories of Human Motivation
Employee Motivation
Step 2 Answer the questions.
Answer the following questions:
What is motivating you to attend school?
What motivates you generally? Consider the arousal, incentive, and self-determination theories.
Where do you fall in Maslow's Hierarchy of Needs?
What strategies do you use to motivate yourself?
Step 3 Report your findings.
4 pages
Adam Piore Journal Upload 11
The intended audience in this article is individuals who feel that owning more space and stuff defines happiness. In this ...
Adam Piore Journal Upload 11
The intended audience in this article is individuals who feel that owning more space and stuff defines happiness. In this speech, Graham addresses the ...
12 pages
Cards For Math Concepts
To count a group of objects then make a match to the correct number - Label the each of the cups in the egg carton with a ...
Cards For Math Concepts
To count a group of objects then make a match to the correct number - Label the each of the cups in the egg carton with a number
Earn money selling
your Study Documents