leadership 232

Create a chart comparing at least 3 leadership models . In a 250-word response, reflect on how these models compare to your personal results (Diplomatic Leadership) in the Week 1 leadership style evaluation.

cjus630 proactive law enforcement issues and best practices

As the 21st century approaches, changing societal issues and priorities present new challenges to the law enforcement community. Society demands remedies to rising crime rates, drug use, and traffic fatalities/injuries, and communities want increased police visibility. However, law enforcement agencies, in most cases, are expected to do this with current or static resources and budgets. As a result, law enforcement administrators are searching for new ways to do business and for more efficient and effective uses of existing resources. Proactive law enforcement is an effective tool that can assist in meeting these new challenges.

Based on your credible research from the Internet, respond to the following:

  • What major characteristics identify the proactive police agency?
  • If you had to prioritize the changes needed within the police department to convert from a reactive form of policing to one that is more proactive, what would your priorities be?
  • What do you see as the greatest impediment to implementing a proactive style of policing?
  • What do you see as the greatest benefit of implementing a proactive style of policing?

Use references.

please follow the instructions 44

ANNOTATED BIBLIOGRAPHY – ERM

This assignment will be one of several throughout your college program that we use to help you prepare for the dissertation process. One of the core competencies necessary to succeed in a doctoral program is the ability to identify other research that pertains to your own. This means you’ll have to identify similar research, read the papers, and assimilate prior work into your own research. An annotated bibliography helps you develop and hone these research skills.

Your paper will be an annotated bibliography, specifically focusing on implementing Enterprise Risk Management (ERM). Choose a “theme” (i.e. ERM in higher education, manufacturing., etc.), and make sure that all your resources relate to your theme.

You paper must be in correct APA format, use correct grammar, and will need to include at least seven (7) resources, ALL of which must:

1) Be current. Published within the last few years.

2) Be peer-reviewed.

3) Relate directly to Defense in depth in the context of protecting National Infrastructure.

Remember that an annotation is not the same as an abstract. Abstracts are descriptive. Your annotations are to be evaluative and critical. Give me enough information for me to decide if I’m interested enough to read the paper, and also how you perceive the paper. Don’t go skimpy on these annotations, but DO NOT write too much here. Quality is far more important that quantity. This exercise is for each of you to demonstrate that you can identify, categorize, and digest multiple research papers.

Every resource you choose must be peer reviewed. That means the paper must have undergone a formal peer review before being published in a journal or presented at a conference. You must ensure that your resources have undergone rigorous reviews. In most cases, you can find out the review process for a conference or journal by visiting the appropriate web site. Do not simply assume that a resource is peer reviewed – check it out.

Here are a few URLs with additional information: (I strongly suggest that you look at these. Really.)

https://sites.umuc.edu/library/libhow/bibliography…

https://www.bethel.edu/library/research/apa-annobib-sixth.pdf

http://libguides.enc.edu/writing_basics/annotatedb… <<<< Check out the “Rules! rules! rules!” section

http://guides.library.cornell.edu/annotatedbibliog…

https://owl.english.purdue.edu/owl/resource/614/03…

ethics in accounting 23

Assignment: Ethics in Accounting


Due Week 9 and worth 170 points

Effective financial reporting depends on sound ethical behavior. Financial scandals in accounting and the businesses world have resulted in legislation to ensure adequate disclosures and honesty and integrity in financial reporting. A sound economy is contingent on truthful and reliable financial reporting.

Instructions:

  • Read the following scenario.
  • Answer the questions that follow. This will be a 2-3 page submission in a question and answer format (also in paragraph form). An introduction and conclusion is not required.
  • Refer back to your textbook for guidance on how to think through the scenario.

You have been recently hired as an assistant controller for XYZ Industries, a large, publically held manufacturing company. Your immediate supervisor is the controller who also reports directly to the VP of Finance. The controller has assigned you the task of preparing the year-end adjusting entries. In the receivables area, you have prepared an aging accounts receivable and have applied historical percentages to the balances of each of the age categories. The analysis indicates that an appropriate estimated balance for the allowance for uncollectible accounts is $180,000. The existing balance in the allowance account prior to any adjusting entry is a $20,000 credit balance.

After showing your analysis to the controller, he tells you to change the aging category of a large account from over 120 days to current status and to prepare a new invoice to the customer with a revised date that agrees with the new category. This will change the required allowance for uncollectible accounts from $180,000 to $135,000. Tactfully, you ask the controller for an explanation for the change and he tells you “We need the extra income, the bottom line is too low.”

Required:

In a 2-3 page paper, discuss the following:

  1. Consider what you have learned relative to ethics and financial reporting. What is the rationale for the calculations/process used to estimate the $180,000 uncollectible allowance?
  2. How do you think the misstatement of funds will impact the income statement and balance sheet?
  3. What is the ethical dilemma you face? What are the ethical considerations? Consider your options and responsibilities as assistant controller.
  4. Identify the key internal and external stakeholders. What are the negative impacts that can happen if you do not follow the instructions of your supervisor?
  5. What are the potential consequences if you do comply with your supervisor’s instructions? Who will be negatively impacted?

Additional Requirements:

  • Use at least one (1) quality academic resource (in addition to your textbook) for this assignment. Note: Wikipedia and similar websites do not qualify as academic resources. You have access to Strayer University’s Online Library at https://research.strayer.edu and the iCampus University Library Research page at https://icampus.strayer.edu/library/research.

Your assignment must follow these formatting requirements:

  • Your paper should be double spaced (Arial or Times Roman 12 pt font) and follow general Strayer Writing Standards (SWS) as they relate to references and citations. Please take a moment to review the SWS documentation for details (more information and an example is included in the Strayer Writing Standards menu link located in your Blackboard).
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

intrusion detection and intrusion prevention

Instructions

You may use your notes, assigned readings, Library resources, other published materials, the LEO online class site for this course, and Internet sources, keeping in mind your responsibility to give proper attribution to sources of material you use in your responses.

For the short answer section, bear in mind that a clear concise response that directly answers the question asked is always preferable to providing large volumes of potentially relevant information in the hope that the “right” answer will somehow be included. Please be sure to read each question carefully to be sure you know what is being asked so that you can answer the question completely.

When composing your answers to the essay questions, be thorough. Each essay asks you to consider multiple ideas and to actually address more than one subordinate questions, so make sure your answers are complete. Be sure to identify any assumptions you are making in developing your answers and describe how your answer would change if the assumptions were different.

While composing your answers to the essay questions, be very careful to cite your sources. It is easy to get careless and forget to footnote a source. Remember, failure to cite sources constitutes an academic integrity violation. Use APA style for citations and references.

Part 2: Snort Rule Analysis. (5 responses at 2 points each)

Examine the following Snort rule, designed to detect attempts by an organization’s employees to access a gambling website in violation of acceptable use policy. This rule is syntactically valid and will produce alerts when a user visits the Powerball lottery website with a web browser. With an eye towards minimizing false positives, identify five ways the rule could be improved to more specifically target employees accessing the Powerball website.

alert ip any any -> $EXTERNAL_NET any (msg:”Acceptable use violation – Gambling – Powerball”; flow:stateless; content:”powerball”; nocase; sid:3333333; rev:1;)

Improvements:

Part 3: Short Answer Questions. (10 questions at 5 points each)

  1. Define and differentiate false positive and false negative. Which is worse, and why? Give one example of each, drawn from any context that demonstrates your understanding of the terms.

Answer:

  1. Explain the following Snort rule. What sort of attack is it intended to detect? What network traffic pattern information is it looking for?

alert ip any any -> any any (msg:”BAD-TRAFFIC same SRC/DST”; sameip; reference:bugtraq,2666; reference:cve,1999-0016; reference:url,www.cert.org/advisories/CA-1997-28.html; classtype:bad-unknown; sid:527; rev:8;)

Answer:

  1. What are the key differences between user-centric and target-centric monitoring in behavioral data forensics? Is one perspective preferred over the other? If so, what are some of the advantages of the preferred choice, or disadvantages of the non-preferred choice?

Answer:

  1. Write a rule using Snort syntax to detect an internal user executing a Windows “tracert” command to identify the network path to an external destination. Identify what changes, if any, and revise/rewrite the rule to make it work effectively for a Unix/Linux “traceroute”.

Answer:

  1. Most network IDS tools are designed to optimize performance analyzing traffic using a variety of protocols specific to TCP/IP wired networks. Describe at least two intrusion detection scenarios where other, specialized types of intrusion monitoring and analysis are called for (that is, where typical NIDS like Snort are not appropriate or effective), explaining what limitations exist in conventional NIDS that make them insufficient to provide effective intrusion detection in the environments corresponding to these scenarios.

Answer:

  1. What is a multi-event signature? Provide at least two examples of multi-event signature activities or patterns that might be monitored with an intrusion detection system.

Answer:

  1. What are the operational requirements necessary to perform anomaly-based intrusion detection? How does the information gathered about network traffic by anomaly-based IDS tools differ from the information gathered by signature-based NIDS?

Answer:

  1. Many people perceive intrusion detection to be a constant, all-the-time security function. Identify and describe at least two “part-time” intrusion detection operational models, and for each give an example of a usage scenario that would call for part-time monitoring.

Answer:

  1. Are organizations legally obligated to use intrusion detection capabilities? Why or why not?

Answer:

  1. Imagine you are tasked with monitoring network communication in an organization that uses encrypted transmission channels. What are the limitations of using intrusion detection systems in this environment? What methods would you employ to accomplish this task?

Answer:

Part 4: Essay Questions. Maximum length: 3 double-spaced pages each, excluding references. (Two questions at 15 points each)

  1. In 2003, a well-publicized report from IT analyst firm Gartner predicted that the market for stand-alone IDS tools would soon disappear and urged Gartner clients to cease investing in IDS tools in favor of firewalls. Clearly, this prediction has not come true, due in part to significant increases in the technological capability, processing speed, and accuracy of IDS tools in the more than 15 years since the erroneous prediction.

Contemporary enterprises have a wide array of network and platform security tools from which to choose, and as we have seen in this course there is substantial overlap in the capabilities of different categories of tools such as firewalls, IDS, anti-malware, vulnerability scanners, and so forth. What factors would exert the most influence on an organization and lead it to choose to implement IDS technology? In your response please identify potential benefits of IDS, potential drawbacks, and any considerations about an organization’s operating environment that might drive its decision.

  1. Beginning about 10 years ago, the U.S. Department of Homeland Security established programs intended to expand the government’s intrusion detection capabilities, in particular citing a need to move to mandatory real-time intrusion detection for federal government networks. The current manifestation of this goal is the Einstein program, which is now in widespread use across the government and received some negative (and partly inaccurate) publicity in early reports of the large-scale data breach announced in 2015 involving systems operated by the U.S. Office of Personnel Management. [The current administration has de-emphasized this and other security initiatives promoted by the previous administration. See the brief description of Initiative #3 of the Comprehensive National Cybersecurity Initiative (http://nsarchive.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-034.pdf).]

Using what we have learned in this course and your own knowledge of IDS operational models, requirements, and other characteristics associated with selecting and using the most appropriate types of intrusion detection and prevention, what is your response to the government’s approach of trying to implement comprehensive intrusion detection and prevention for all network traffic to or from U.S. government agencies? What are some of the key obstacles faced in rolling out an intrusion detection capability of this sort? Identify and describe at least three (3) challenges that DHS should consider with its Einstein deployment.

orientalism

Watch this video and answer the following question

https://www.youtube.com/watch?v=fVC8EYd_Z_g

1. What is orientalism, according to said?

2. How did the Orientalist view of the middle east origanated and spread.

3. What were some of the stereotypes of arabs and “orientals” that Said described?

4.How/Why, according to edward Said, is the United States Particulary prone to this way of viewing and depicting the middle east and entertainment media?

5. What harm does Orientalism do, according to Said?

6. What signs of Orientalism do you see today?

7. How/why is Said’s concept helpful and relevant in terms of studying culture?

6 7 page research paper on memory from psychology

Hello everyone I have a 6-7 page research paper to do on “Memory” or any other topic that is in the textbook. I have attached the textbook down bellow. It can be any topic from chapters 1-14. This research paper has to be in APA style. I will be providing all the instructions for it.

process mapping 1

Assume you drank a cup of coffee or tea this morning. Did you make it yourself or did you buy it? Draw a detailed process map illustrating the activity involved in making/obtaining your beverage. Use the appropriate process symbols. Be sure to take into account decision points and input and outputs. Explain the decision points and processes involved.

The link below is to an article that will be of assistance to you in completing your week five project on creating a Process Map.

https://creately.com/blog/diagrams/process-mapping-guide/

complete computer class task south

Background:

Over the past 4 weeks, you have been working with the various applications of Microsoft Office and learned a bit about your computer. In this final week, you are going to take what you’ve learned and apply it to a final project for class.

Final Assignment Instructions:

You are going to create your final project by creating it in the Microsoft Office application of your choice – Word, PowerPoint, or Excel.

Create a document that would be considered relevant to the field that you’re going to school for. This document can use real or fictitious information. This document should be deemed as useful – for example if you choose Microsoft Word, consider writing a short training document. For Microsoft Excel, you can create an Excel spreadsheet discussing a set of data of your choice or a budget. For Microsoft PowerPoint, create a presentation about a topic relevant to your field or a fictitious (or real) project you’d like to work on.

Make sure to include all of the elements below in your selected format. These are listed below:

Microsoft Word

Your document must include:

  • Minimum of 3 pages
  • Page or art border
  • Page header
  • Page Footer
  • Two different fonts
  • Two different font sizes
  • Colored font at some point in the document
  • Underlined or bolded text
  • At least 1 inserted image
  • 1 table (any size)
  • Bullet points
  • Indentation

Microsoft PowerPoint

In your 6-7 slide presentation, you must include the following elements at least once:

  • Picture
  • Shape
  • Word Art
  • Table
  • Use of Speaker Notes

The following must be applied to the whole document:

  • Design of your choice
  • Transitions between on each slide
  • Animation on each slide
  • Header or footer

Microsoft Excel

In your spreadsheet, you must include the following elements at least once:

  • Create a header row
  • Create 2 new worksheets
  • Color code and name the worksheets
  • Use the Merge and Center feature
  • Use cell shading
  • Apply cell borders
  • Insert an image
  • Apply at least 3 different formulas (one including the SUM function)
  • Create a chart of your choice and place it on the second worksheet

history questions part 2

1) The protections offered all Americans in the Constitution, and specified in the Equal Protection and Due Process clauses of the 14th amendment, needed to be incorporated into the individual state constitutions. Explain how the Supreme Court carried out the Incorporation Doctrine. Use the court cases discussed in class.

2) Racial segregation, as it developed after the Civil War, was of two types, De Facto and De Jure. Discuss these two terms and how they apply to the civil rights movement in the United States. A complete answer should address issues such as (but not limited to): Where and how did each type manifest itself, which court cases or laws sought to uphold, curb or eliminate them, and how did the major civil rights organizations seek to address this problem. Draw upon your readings, class lecture and the “Eyes on the Prize” video for your answer.

Answer the questions completely